ADB, Android, Android Application, Anti-Debugging, Damn-Vulnerable-Bank, Downloads, Hacking Tools, vulnerabilities, Vulnerable

Damn-Vulnerable-Bank – Vulnerable Banking Application For Android

Damn Vulnerable Bank Android Application aims to provide an interface for everyone to get a detailed understanding with internals and security aspects of android application.

How to Use Application

  • Clone the repository and run the Backend Server as per instructions in the link.
  • We have released the Apk so after downloading install it via adb or manual.
  • After Installation open the App and add Backend IP in Homescreen
  • Test running status by pressing health check
  • Now create an account by signup option and then login with your credentials
  • Now you can see the dashboard and perform banking operations
  • Login as admin to approve beneficiary
  • The database is pre-populated with a few users for quick exploration.
UsernamePasswordAccount NumberBeneficiariesAdmin privileges
user1password1111111222222, 333333, 444444No


  • Sign up
  • Login
  • My profile interface
  • Change password
  • Settings interface to update backend URL
  • Add fingerprint check before transferring/viewing funds
  • Add pin check before transferring/viewing funds
  • View balance
  • Transfer money
    • Via manual entry
    • Via QR scan
  • Add beneficiary
  • Delete beneficiary
  • View beneficiary
  • View transactions history
  • Download transactions history

Building the Apk with Obfuscation

  • Go to Build options and select Generate Signed Bundled/Apk
  • Then select Apk as option and click next
  • Now we need a keystore to sign an apk
  • Create a new keystore and remember its password
  • After creating select that keystore and enter password
  • Now select Build variant as Release and signature version as V2
  • Now we can build the apk successfully

List of vulnerabilities in the application

To keep things crisp and interesting, we hidden this section. Do not toggle this button if you want a fun and challenging experience. Try to explore the application, find all the possible vulnerabilities and then cross check your findings with this list.

Spoiler Alert

Backend to-do

  • Add profile and change-password routes
  • Create different secrets for admin and other users
  • Add dynamic generation of secrets to verify JWT tokens
  • Introduce bug in jwt verification
  • Find a way to store database and mount it while using docker
  • Dockerize environment


Thanks to these amazing people

Source : KitPloit – PenTest Tools!

Previous ArticleNext Article
Send this to a friend