Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

MAL: Strings

Premium room

Investigating "strings" within an application and why these values are important!

easy

45 min

27,948

User profile photo.

To access material, start machines and answer questions login.

You are here amongst the Malware series:

3. MP: Strings

What are "strings"?

From a programming perspective, "strings" is the term given for data handled by an application. At a broader view, these pieces of data are used to store information such as text to numerical values.

For example, let's say we have an application such as a calculator. A user will have to input two numerical values (e.g. 1 and 5) combined with an operator (e.g. + or plus) addition in this case. These values will be stored as "strings".

However "strings" can be stored within the application itself - where no input is necessary from the user. For example, using the example of usernames and passwords is a great representation of the many types of information that may be stored as a "string".


Why are "strings" important?

We're all security-minded people here and know that writing down passwords isn't a very smart thing to do. However, developers are not quite so likeminded and often leave credentials in applications which are often essential i.e. An application that server needs to know the IP address of it. Arguably, an IP address is trivial in comparison to the sensitivity of a password - but both would be stored as strings.

There are a plethora of examples of companies storing sensitive information such as passwords within their applications. For example, Intellian (opens in new tab), a satellite-communications focused company had the disclosure of their "Aptus Web 1.24" application retaining a default passcode of “12345678”.

Illustrated below is an example of an Android Application containing sensitive credentials within strings:

(Credit: Ezequiel., Skullarmy (opens in new tab))

Time for a bit of research to solve the questions below!

Answer the questions below
What is the name of the account that had the passcode of "12345678" in the intellian example discussed above?

What is the CVE entry disclosed by the company "Teradata" in their "Viewpoint" Application that has a password within a string?

According to OWASP's list of "Top Ten IoT" vulnerabilities, name the ranking this vulnerability would fall within, represented as text.

Ready to learn Cyber Security?

The MAL: Strings room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.