🔥 40% Off Crucial Exams Memberships — Deal ends today!

45 minutes, 56 seconds remaining!

Certified Ethical Hacker (CEH) Practice Question

During a mobile application penetration test you have physical access to an employee's Android 8.1 handset. USB debugging is enabled, but the device is unrooted and the banking app under review is not marked as debuggable. You need to obtain the app's SQLite database located in /data/data/com.acme.bank/databases/. Which technique will let you retrieve the file without rooting or modifying the device?

  • Install Frida on the phone and use frida-trace to hook SQLiteOpenHelper calls, capturing the database contents during runtime.

  • Flash a custom recovery image to gain temporary root access, then copy the database from /data/data/com.acme.bank/databases.

  • Run "adb pull /data/data/com.acme.bank/databases/credentials.db" to copy the file directly from the device.

  • Execute "adb backup -noapk com.acme.bank", convert the resulting .ab file to a tar archive with Android Backup Extractor, and extract the database locally.

Certified Ethical Hacker (CEH)
Mobile Platform, IoT, and OT Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot