Open ahoog42 opened 9 years ago
there are also cached pinned certs to look at on Android for some highly privileged apps like the Play store app.
root@shamu:/data/data/com.android.vending # ls app_sslcache
android.clients.google.com.443
books.google.com.443
lh3.ggpht.com.443
lh3.googleusercontent.com.443
lh4.ggpht.com.443
lh4.googleusercontent.com.443
lh5.ggpht.com.443
lh5.googleusercontent.com.443
lh6.ggpht.com.443
lh6.googleusercontent.com.443
safebrowsing.google.com.443
wallet.google.com.443
app_sslcache
seems to be managed by SSLSessionCache and these folders exist in the app's /data/data
dir so these are also interesting to look at for incident response with regard to trusted certificates.
Probably relevant in an IR analysis.
This can be useful for mobile forensics, and also, it can be good to spot vulnerabilities in non-updated devices (which trust certificates that has been leaked or considered insecure). Also, it can be interesting for analyzing cheap phones where no firmware is available.