Andump (Dump sensitive info)

Git: https://github.com/enderphan94/andump

This is the repository for Andump. If you are looking for the Andump website. Click here.

License: GPL v3

For Android Data Forensic

The different data storage options available on Android:

  • Internal file storage: Store app-private files on the device file system.
  • External file storage: Store files on the shared external file system. This is usually for shared user files, such as photos.
  • Shared preferences: Store private primitive data in key-value pairs.
  • Databases: Store structured data in a private database.

For Library checking:

More here https://enderphan.e-cyber.ee/library/soft-link#object-persistence

Donations

You can help (or thank) the author of Andump by making a donation, if you feel like doing so

paypal

Plan

  1. Dump data from Sandbox and external enclaves
  2. Print all sensitive data along with its file location
  3. Based on the rules file, this needs to be updated

Internal:

  1. /data/data

External:

  1. /mnt/sdcard/Android/data is a softlink to /sdcard/

Shared Preferences SQLite Databases Realm Databases Internal Storage External Storage

Version

Versions

Installation

./install.sh

Usage

-ls                   : List installed package
-p <packagename>      : Check if sensitive data stored in internal & external data
-l true -f <file.apk> : Check if insecure library is set
-h                    : Help

Example

For Data Forensic: ./andump.sh -p com.google.android

For Unreliable libraries: ./andump.sh -l true -d /home/appcode