🙄
p1k4chu@p1k4chu-host
  • About Me
  • Tools
    • Defensive Tools
      • H0neyTr4p
    • Offensive Tools
      • Ransomware Simulator - PyRan
  • Security Research
    • AI Security Research
      • Attacking using (and defending against) Input manipulation attacks against AI
      • (Ab)using AI to attack M365 and other services to conduct plethora of attacks
    • Cloud Security Research
      • Azure Storage Account Security - Attack & Defend: Part 1
      • Attack and Defend Azure Serial Console - Part 1
      • Azure Serial Console Attack and Defense - Part 2
    • Adversarial Tradecraft Research & Detection
      • RDP Exfil - The technique that works almost every time
      • Smishing Traid targets India with large scale "India Post" themed iMessage phish texts
      • Quick Assist: Friend or Foe? How adversaries can exploit this tool and how can you defend?
      • EDR Silencer - Embracing the Silence
      • Dissecting & Detecting Lsass Shtinkering
      • Detecting malicious OOB: Part -1: Hunting for OOB server - Interact.sh
      • Abusing Windows VPN for EXFIL
      • Analyzing Nobelium's HTML Dropper - EnvyScout
    • Web & Mobile App Sec
      • [CVE-2015-2300] ENL-Newsletter CSRF Full Disclosure
      • Yandex Mobile App vulnerable to Insecure Data storage
      • Bug on paypal worth 1000$
      • Session fixation bug on coinbase.
      • CyanogenMod (In)Secure Folder Lock !
  • Security Talk
    • Review of CRTP - Pentester Academy
    • Review of Hacking and Securing Kubernetes
Powered by GitBook
On this page

Was this helpful?

  1. Security Research
  2. Web & Mobile App Sec

CyanogenMod (In)Secure Folder Lock !

PreviousSession fixation bug on coinbase.NextReview of CRTP - Pentester Academy

Last updated 1 year ago

Was this helpful?

********

This is an older post (written around ~2015) and ported from my old blog. Please excuse if there are any mistakes or inaccuracies. If you find any issues, please head over to the home page > contact me. Thanks.

********

Hey Guys, As others in the Hacker’s community,I’m also a lover of OpenSource and also our dear friend Android :-) . From a couple of days, I’ve started getting interested into Android Dev stuff and thats where I heard the name CyanogenMod Roms.. CM 12, Oh Yeah one of the best roms I’ve ever seen.

I was really fascinated by the powerful features of CyanogenMod and starting falling in love with it. Being exposed to the hackers community, I prefer my surroundings to be secure and I see everything in a security prespective. There I saw an awesome feature called folder lock. I’ve googled about that and saw that it was one of the loved features of CM. Here are some of the snapshots of how folder lock looks like in CM

Snapshot of how folder lock looks like

So The main question arises is “ Is this really secure enough ? I mean does this really protect ?” Well, I found a simple bypass for this.

You can simply open the PlayStore application and search for the application you want to open and on the right side you can see an option called “Open”. Just click on that and your done! Even though the application is secured by folder lock, the application opens!

Hilarious & Simple isn’t it?! I don’t think I need to explain the technical reasons behind this.. Want to learn more? Shoot a mail at pbssubhash [at] gmail.com

Mitigation ? :- Just encrypt even the play store app & Switch off USB Debugging too :P

At the first sight I found this and want to share it with all my folks in the InfoSec community so that they could secure themselves.

Didn’t report anyone. Yet anyone can submit this bug to the CM dev’s because they’ve done really great job.

Will be blogging anymore bugs I encounter/discover :-) Looks like someone else has identified this Would like to give appropriate credits to them :-) and would like to thank Anand for letting me know about this.! Bye for now!

https://forums.oneplus.net/threads/lock-folder-disappeared-leaving-apps-unreachable.94367/?hc_location=ufi#post-4610060
http://www.reddit.com/r/cyanogenmod/comments/2abb6y/m8_question_what_does_protected_apps_do/?hc_location=ufi