[A]ndroid [A]pplication [P]entest [G]uide
CtrlK
  • AAPG
  • 1. MANUAL STATIC ANALYSIS
    • 1.1 Decompile APK
    • 1.2 Check certificate
    • 1.3 Analyze AndroidManifest.xml
    • 1.4 Source Code Analysis
  • 2. AUTOMATED STATIC ANALYSIS
  • 3. MANUAL DYNAMIC ANALYSIS
    • 3.1 Install application & use it
    • 3.2 Bypass detections
    • 3.3 Analyze local storage
    • 3.4 Attack surface
      • 3.4.1 Activities
      • 3.4.2 ContentProvider
      • 3.4.3 Services
    • 3.5 Log analysis
    • 3.6 More HOW and WHAT! (still work in progress)
  • 4. APK TAMPERING
    • 4.1 DIY - Simple Reverse Meterpreter (Non-Xamarin)
    • 4.2 Quick Proof-of-Concept (Meterpreter)
Powered by GitBook
On this page
  • AT THE BEGINNING
  • INFO
  • THINGS TO REPORT
  • MORE DETAILS

Was this helpful?

  1. 3. MANUAL DYNAMIC ANALYSIS

3.4 Attack surface

AT THE BEGINNING

within drozer shell:

run app.package.attacksurface com.x.x.x

INFO

  • The command above lists:

    • Activities

    • ContentProvider

    • BroadcastReceiver

    • Services

THINGS TO REPORT

  • If "is debuggable" output shows up (allows attaching a debugger to a process, using adb, and stepping through the code)

MORE DETAILS

  • How to use drozer (translation needed)

  • Using drozer for application security assessment

  • Android app hacking w/ drozer

Previous3.3 Analyze local storageNext3.4.1 Activities

Last updated 5 years ago

Was this helpful?