All Questions
Tagged with android penetration-test
33 questions
1
vote
0
answers
154
views
MobSF Android Activity APK Pentest
it is my first time with MobSF and Android APK assessment. I have found something while testing a specific APK and I am trying to understand the concept behind it:
Under HARDCODED_SECRETS in MobSF, ...
0
votes
0
answers
219
views
Requiring Google Mobile Service token
I'm pentesting an android application written in Cordova and while inspecting the network traffic I found some interesting endpoint that I would like to test.
However, this endpoint need a tokenID (ex....
0
votes
0
answers
513
views
Is it possibile to interact with firebase database using credentials obtained from an APK?
during the static analysis while pentesting an android application I found the following information to connect to a firebase instance.
<string name="google_app_id">1:**REDACTED**:...
0
votes
0
answers
2k
views
Bypassing SSL pinning Using Frida issue
I am a penetration tester, and I was doing some SSL pinning bypass using Frida.
I have pushed all the required files and certificates, and burp is intercepting traffic from the Android Studio ...
1
vote
1
answer
155
views
What is the impact of controling the content of a webview in Android?
I'm learning android application pen testing and I'm kinda lost about what can do an attacker that control the content of a webview ?
I guess if there is no javascript enabled there is no impact, ...
1
vote
2
answers
231
views
Monitoring the HTTP(S) calls being made from android App
I want to test for security vulnerabilities in an Android App and hence want to monitor all HTTP(S) calls being made from an Android App.
I have setup BurpSuit in my Laptop and have also set up the ...
3
votes
1
answer
574
views
Is sending an object created via intent.getSerializableExtra to handler.postDelayed leading to Code Execution?
I'm new to android pentesting and I would like to know :
if sending an object created via the result of intent.getSerializableExtra("EXTRA_TEST");
to handler.postDelayed(TheObject,500) could lead ...
0
votes
1
answer
884
views
How to check vulnerable component and its version in any APK?
I have given an app to test, on which I ran a quick scan in composition tool like Protecode, It shows all component (like okhttp, protobuf,okhttp etc.) used and existing vulnerability.
My question is,...
1
vote
0
answers
127
views
Can an attacker spoof content provider, backup manager or wallpaper manager in Android?
We need a backup of SMSes, apps, device settings, wallpapers and contacts of the device through our designed app.
So, is it possible for an attacker to spoof, tamper, impersonate source data (SMSes, ...
0
votes
1
answer
1k
views
Android x86 vs Android on Qemu ARM
Situation: Emulating Android devices for pen-testing
Problem: Choosing between emulating Android x86 or emulating Android on Qemu runing on ARM
Question: In terms of vulnerabilities/exploitability, ...
1
vote
2
answers
191
views
What tests can be performed on mobile apps to determine if they are secure?
My company is looking to work with a potential client's backend provider in order to make an app for them. To do this, we need to use their API. We've spoken to this company and they are worried about ...
1
vote
2
answers
1k
views
Android application interception issue
I'm a newbie to android pen testing and started off with an application.
The app uses HTTPS and works fine without configuring any proxy.
When a proxy like a burp suite is configured, the app ...
2
votes
1
answer
4k
views
io.fabric.ApiKey. What and why?
While decompiling an APK file for Android, I have found an io.fabric.ApiKey key and value stored in manifest file.
My questions are:
Can we use the API key with malicious intends?
Is it ok to be ...
4
votes
1
answer
222
views
Google App Script as public gateway for database (spreadsheet)
I've created a google app script that takes a POST request and writes to a google spreadsheet. In parallel, I've also made an Android app that sends HTTP requests to this google app script.
I did it ...
1
vote
1
answer
448
views
Application does't connect to Charles proxy
I need to check an android app for vulnerabilities. I have to intercept encrypted data sent to the server. This application uses certificate which is placed in res/raw directory, so it is a resource ...
1
vote
2
answers
2k
views
Application bypassing proxy setting
I am testing an Android application and found that it is bypassing/disregarding the proxy set (Burp proxy with root certificate installed and Certificate pinning disabled).
I can intercept https ...
6
votes
3
answers
3k
views
Can I test my own network?
I'm currently trying to enter the field of information security and I was just wondering if there was anything barring me from testing my own network for security vulnerabilities? I only have a couple ...
0
votes
1
answer
506
views
Android client side data encoding/encryption bypass
I am working on Android application security project where Android application sends all data in encryption from client side only. I assume that there must be a file at client side which might be ...
-1
votes
1
answer
281
views
Regarding Mobile Application Penetration Testing
I am new in mobile application penetration testing. Just curious to know, whether we need to perform the penetration testing on rooted devices or non rooted devices.
Why and why not? I have searched ...
1
vote
1
answer
1k
views
Is there a backdoor in the hardware of our smartphones?
I don't know for you but I always felt like Android especially is not safe. Is somebody - the government or other - able to listen to my microphone, or access my hard drive remotely ?
I'm wondering ...
3
votes
1
answer
4k
views
SSL traffic manipulation through ettercap MitM and iptables
I am trying to understand the relation between some tools and concepts used for MitM on a wifi network and how https transaction (over this wifi network) between an android app and the respective ...
5
votes
1
answer
2k
views
How to root a virtual device in android-sdk?
I was amused to see no one have ever asked such a question here before. After a little research in google I found only a few links to root a device in avd. Somewhere I also read that the sdk is ...
10
votes
3
answers
19k
views
Android/iOS application security testing checklist
According to OWASP, we have a list of top ten mobile application vulnerabilities.
But we are damn sure that the number of vulnerabilities on mobile apps, especially android apps are far more than ...
3
votes
1
answer
1k
views
Java org.xmlpull.v1.XmlPullParser and XML External Entity (XXE) Processing Attacks
I'm evaluating the security of an Android application and the application is using the XmlPullParser included with Android.
I'm having some difficulty getting any common attacks to work, but I want ...
3
votes
2
answers
5k
views
How to simulate man in the middle attack in android emulator?
I am new to pen-testing. Yesterday i analysed one android application using dex2jar application and i saw an android application implemented https connection using empty trust manager.
class miTM ...
1
vote
1
answer
282
views
Where do I get "Mercury" by MWR InfoSecurity? [closed]
Mercury is a really great tool for android pen-testing as well as android forensics. However, they stopped its development and now I get redirected to some product called drozer. Does anyone know ...
23
votes
7
answers
66k
views
How do you capture ALL the traffic from an Android app?
I want to capture all the traffic from an Android app for its pen-testing. How do I do that?
Here's what I've already tried:
I installed the app on an emulator and started the emulator with a http-...
2
votes
2
answers
2k
views
Test Android Secure Encrypted Traffic
For testing android traffic encryption I have configured a VPN client in my phone. What simple test I can perform in my home wifi network to verify that the traffic is really encrypted and secure?
2
votes
1
answer
802
views
Android Application penetration testing
Have problem intercepting HTTPS requests of android application.certificates in android are kept under /system/etc/security/cacerts/ which is different from its previos version of os in cacerts.bks ...
5
votes
5
answers
15k
views
Nexus 7 (Or any other good android tablets) For pen testing
I'm considering investing in an android tablet for pen testing. Does anyone know how capable they are with pen testing? Can they compile code or forward packets? Are any applications that work on ...
15
votes
4
answers
5k
views
Tools to help test the security of Android applications [closed]
What are some decent frameworks to test the security of Android applications?
With frameworks I mean either software based to automatically scan these applications or a guide (like OWASP has for ...
4
votes
3
answers
916
views
Android Pen Testing
I have been pen testing a random android app that uses POST method to send data to a remote server using HTTPS.
I have set up a proxy and am able to intercept the traffic, however the POST method ...
15
votes
3
answers
5k
views
iOS/Android Pen-Test
This question might be vague, that is because I am not sure where to start.
There are a lot of books and courses on pentest focusing on networks, systems, and OS such as windows, yet I haven't been ...