[A]ndroid [A]pplication [P]entest [G]uide
  • AAPG
  • 1. MANUAL STATIC ANALYSIS
    • 1.1 Decompile APK
    • 1.2 Check certificate
    • 1.3 Analyze AndroidManifest.xml
    • 1.4 Source Code Analysis
  • 2. AUTOMATED STATIC ANALYSIS
  • 3. MANUAL DYNAMIC ANALYSIS
    • 3.1 Install application & use it
    • 3.2 Bypass detections
    • 3.3 Analyze local storage
    • 3.4 Attack surface
      • 3.4.1 Activities
      • 3.4.2 ContentProvider
      • 3.4.3 Services
    • 3.5 Log analysis
    • 3.6 More HOW and WHAT! (still work in progress)
  • 4. APK TAMPERING
    • 4.1 DIY - Simple Reverse Meterpreter (Non-Xamarin)
    • 4.2 Quick Proof-of-Concept (Meterpreter)
Powered by GitBook
On this page
  • General information
  • Used tools

Was this helpful?

AAPG

[A]ndroid [A]pplication [P]entest [G]uide

Next1. MANUAL STATIC ANALYSIS

Last updated 5 years ago

Was this helpful?

General information

My primary goal with this repo is to define a comprehensive Android application penetration testing guide.

This is an operational guide with the intention to assist you while performing a penetration-test and NOT an educational guide (sorry guys ). I will provide what I've learned / will learn at work and share it here with you. To improve this guide, I would highly appreciate your help with everything you have successfully used in the wild and/or experienced so far at work.

Used tools

    • AUR package (yay -S android-apktool)

    • I personally recommend installing android-studio it comes with the SDK - including all platform-tools:

      • sudo pacman -S andriod-studio

    • sudo pacman -S bettercap

  • - .NET decompiler (in case of Xamarin Apps)

All recommendations are based on my personal experience only.

🤓
🤷‍♂️
apktool
dex2jar
jd-gui
jadx
adb
bettercap
dnSpy
enjarify
apk decompiler for lazy