Skip to main content

All Questions

Filter by
Sorted by
Tagged with
1 vote
0 answers
154 views

MobSF Android Activity APK Pentest

it is my first time with MobSF and Android APK assessment. I have found something while testing a specific APK and I am trying to understand the concept behind it: Under HARDCODED_SECRETS in MobSF, ...
Mr John's user avatar
  • 11
0 votes
0 answers
219 views

Requiring Google Mobile Service token

I'm pentesting an android application written in Cordova and while inspecting the network traffic I found some interesting endpoint that I would like to test. However, this endpoint need a tokenID (ex....
LLL's user avatar
  • 101
0 votes
0 answers
513 views

Is it possibile to interact with firebase database using credentials obtained from an APK?

during the static analysis while pentesting an android application I found the following information to connect to a firebase instance. <string name="google_app_id">1:**REDACTED**:...
LLL's user avatar
  • 101
0 votes
0 answers
2k views

Bypassing SSL pinning Using Frida issue

I am a penetration tester, and I was doing some SSL pinning bypass using Frida. I have pushed all the required files and certificates, and burp is intercepting traffic from the Android Studio ...
JavaFreak's user avatar
1 vote
1 answer
155 views

What is the impact of controling the content of a webview in Android?

I'm learning android application pen testing and I'm kinda lost about what can do an attacker that control the content of a webview ? I guess if there is no javascript enabled there is no impact, ...
Neolex's user avatar
  • 394
1 vote
2 answers
231 views

Monitoring the HTTP(S) calls being made from android App

I want to test for security vulnerabilities in an Android App and hence want to monitor all HTTP(S) calls being made from an Android App. I have setup BurpSuit in my Laptop and have also set up the ...
Rajesh K's user avatar
3 votes
1 answer
574 views

Is sending an object created via intent.getSerializableExtra to handler.postDelayed leading to Code Execution?

I'm new to android pentesting and I would like to know : if sending an object created via the result of intent.getSerializableExtra("EXTRA_TEST"); to handler.postDelayed(TheObject,500) could lead ...
Neolex's user avatar
  • 394
0 votes
1 answer
884 views

How to check vulnerable component and its version in any APK?

I have given an app to test, on which I ran a quick scan in composition tool like Protecode, It shows all component (like okhttp, protobuf,okhttp etc.) used and existing vulnerability. My question is,...
Chandan Kumar's user avatar
1 vote
0 answers
127 views

Can an attacker spoof content provider, backup manager or wallpaper manager in Android?

We need a backup of SMSes, apps, device settings, wallpapers and contacts of the device through our designed app. So, is it possible for an attacker to spoof, tamper, impersonate source data (SMSes, ...
Chandan Kumar's user avatar
0 votes
1 answer
1k views

Android x86 vs Android on Qemu ARM

Situation: Emulating Android devices for pen-testing Problem: Choosing between emulating Android x86 or emulating Android on Qemu runing on ARM Question: In terms of vulnerabilities/exploitability, ...
Timothy Wong's user avatar
1 vote
2 answers
191 views

What tests can be performed on mobile apps to determine if they are secure?

My company is looking to work with a potential client's backend provider in order to make an app for them. To do this, we need to use their API. We've spoken to this company and they are worried about ...
D Roberts's user avatar
1 vote
2 answers
1k views

Android application interception issue

I'm a newbie to android pen testing and started off with an application. The app uses HTTPS and works fine without configuring any proxy. When a proxy like a burp suite is configured, the app ...
testlab testlab1's user avatar
2 votes
1 answer
4k views

io.fabric.ApiKey. What and why?

While decompiling an APK file for Android, I have found an io.fabric.ApiKey key and value stored in manifest file. My questions are: Can we use the API key with malicious intends? Is it ok to be ...
Lucian Nitescu's user avatar
4 votes
1 answer
222 views

Google App Script as public gateway for database (spreadsheet)

I've created a google app script that takes a POST request and writes to a google spreadsheet. In parallel, I've also made an Android app that sends HTTP requests to this google app script. I did it ...
Francky Vincent's user avatar
1 vote
1 answer
448 views

Application does't connect to Charles proxy

I need to check an android app for vulnerabilities. I have to intercept encrypted data sent to the server. This application uses certificate which is placed in res/raw directory, so it is a resource ...
datafile4's user avatar
1 vote
2 answers
2k views

Application bypassing proxy setting

I am testing an Android application and found that it is bypassing/disregarding the proxy set (Burp proxy with root certificate installed and Certificate pinning disabled). I can intercept https ...
x0rcist's user avatar
  • 11
6 votes
3 answers
3k views

Can I test my own network?

I'm currently trying to enter the field of information security and I was just wondering if there was anything barring me from testing my own network for security vulnerabilities? I only have a couple ...
fritz's user avatar
  • 83
0 votes
1 answer
506 views

Android client side data encoding/encryption bypass

I am working on Android application security project where Android application sends all data in encryption from client side only. I assume that there must be a file at client side which might be ...
FrOgY's user avatar
  • 329
-1 votes
1 answer
281 views

Regarding Mobile Application Penetration Testing

I am new in mobile application penetration testing. Just curious to know, whether we need to perform the penetration testing on rooted devices or non rooted devices. Why and why not? I have searched ...
Acid's user avatar
  • 11
1 vote
1 answer
1k views

Is there a backdoor in the hardware of our smartphones?

I don't know for you but I always felt like Android especially is not safe. Is somebody - the government or other - able to listen to my microphone, or access my hard drive remotely ? I'm wondering ...
tobiak777's user avatar
  • 113
3 votes
1 answer
4k views

SSL traffic manipulation through ettercap MitM and iptables

I am trying to understand the relation between some tools and concepts used for MitM on a wifi network and how https transaction (over this wifi network) between an android app and the respective ...
qre0ct's user avatar
  • 1,522
5 votes
1 answer
2k views

How to root a virtual device in android-sdk?

I was amused to see no one have ever asked such a question here before. After a little research in google I found only a few links to root a device in avd. Somewhere I also read that the sdk is ...
Anandu M Das's user avatar
  • 2,097
10 votes
3 answers
19k views

Android/iOS application security testing checklist

According to OWASP, we have a list of top ten mobile application vulnerabilities. But we are damn sure that the number of vulnerabilities on mobile apps, especially android apps are far more than ...
Anandu M Das's user avatar
  • 2,097
3 votes
1 answer
1k views

Java org.xmlpull.v1.XmlPullParser and XML External Entity (XXE) Processing Attacks

I'm evaluating the security of an Android application and the application is using the XmlPullParser included with Android. I'm having some difficulty getting any common attacks to work, but I want ...
Ben Holland's user avatar
3 votes
2 answers
5k views

How to simulate man in the middle attack in android emulator?

I am new to pen-testing. Yesterday i analysed one android application using dex2jar application and i saw an android application implemented https connection using empty trust manager. class miTM ...
user3160055's user avatar
1 vote
1 answer
282 views

Where do I get "Mercury" by MWR InfoSecurity? [closed]

Mercury is a really great tool for android pen-testing as well as android forensics. However, they stopped its development and now I get redirected to some product called drozer. Does anyone know ...
Pervy Sage's user avatar
23 votes
7 answers
66k views

How do you capture ALL the traffic from an Android app?

I want to capture all the traffic from an Android app for its pen-testing. How do I do that? Here's what I've already tried: I installed the app on an emulator and started the emulator with a http-...
Pervy Sage's user avatar
2 votes
2 answers
2k views

Test Android Secure Encrypted Traffic

For testing android traffic encryption I have configured a VPN client in my phone. What simple test I can perform in my home wifi network to verify that the traffic is really encrypted and secure?
user avatar
2 votes
1 answer
802 views

Android Application penetration testing

Have problem intercepting HTTPS requests of android application.certificates in android are kept under /system/etc/security/cacerts/ which is different from its previos version of os in cacerts.bks ...
dany's user avatar
  • 193
5 votes
5 answers
15k views

Nexus 7 (Or any other good android tablets) For pen testing

I'm considering investing in an android tablet for pen testing. Does anyone know how capable they are with pen testing? Can they compile code or forward packets? Are any applications that work on ...
November's user avatar
  • 505
15 votes
4 answers
5k views

Tools to help test the security of Android applications [closed]

What are some decent frameworks to test the security of Android applications? With frameworks I mean either software based to automatically scan these applications or a guide (like OWASP has for ...
Lucas Kauffman's user avatar
4 votes
3 answers
916 views

Android Pen Testing

I have been pen testing a random android app that uses POST method to send data to a remote server using HTTPS. I have set up a proxy and am able to intercept the traffic, however the POST method ...
Shahrukh's user avatar
15 votes
3 answers
5k views

iOS/Android Pen-Test

This question might be vague, that is because I am not sure where to start. There are a lot of books and courses on pentest focusing on networks, systems, and OS such as windows, yet I haven't been ...
Rick Rhodes's user avatar
  • 1,102