😏Android Basic Security Testing

Basic Security Testing

Useful tools to install on the host device:

  • ADB - Android Debugging Interface

AVD is more recommended than other emulators. Also AVD provides HW simulation. It is advised to use one of the devices with the Play Store pre-installed.

Include the -s option if you have multiple devices attached

Used for exploring/manipulating files from an app Sandbox, while the app running

  • Termux - Android terminal and Linux environment - Includes package manager

  • FileZilla - Acess files via SFTP

  • gplaycli - Google Paly Store APK downloader

  • Via ADB:

How to enbale Instant Apps

List all installed packages with ADB:

List all third-party apps with ADB:

Use frida-ps -Uai to get all apps (-a) currently installed (-i) on the connected USB device (-U):

  • Objection - Retrieve libraries with objection

  • Objection - Retrieve app directory information

Monitoring System Logs

  • Android-CertKiller - Patches the .APK with a user defined certificate or simply remove the certificate pinning from the .APK and repackages the .APK

  • MagiskTrustUserCerts - Add user-installed certificates to the list of system trusted CA's

Usually in Xamarin and Flutter applications, which don't use the proxy settings from the Android OS

Bypass using:

  • Frida - Overload isProxySet

  • iptables

  • bettercap - MITM

  • keytool - Use keytool to add your proxy certificate to the truststore

Last updated