[A]ndroid [A]pplication [P]entest [G]uide
  • AAPG
  • 1. MANUAL STATIC ANALYSIS
    • 1.1 Decompile APK
    • 1.2 Check certificate
    • 1.3 Analyze AndroidManifest.xml
    • 1.4 Source Code Analysis
  • 2. AUTOMATED STATIC ANALYSIS
  • 3. MANUAL DYNAMIC ANALYSIS
    • 3.1 Install application & use it
    • 3.2 Bypass detections
    • 3.3 Analyze local storage
    • 3.4 Attack surface
      • 3.4.1 Activities
      • 3.4.2 ContentProvider
      • 3.4.3 Services
    • 3.5 Log analysis
    • 3.6 More HOW and WHAT! (still work in progress)
  • 4. APK TAMPERING
    • 4.1 DIY - Simple Reverse Meterpreter (Non-Xamarin)
    • 4.2 Quick Proof-of-Concept (Meterpreter)
Powered by GitBook
On this page
  • 3.5.1 LIVE LOGGING
  • ADB
  • INFO
  • 3.5.2 THINGS TO REPORT

Was this helpful?

  1. 3. MANUAL DYNAMIC ANALYSIS

3.5 Log analysis

3.5.1 LIVE LOGGING

ADB

adb shell ps | grep "<com.x.x.x-name>"

or

adb logcat | grep <process-ID-of-app>

or

adb logcat | grep "$(adb shell ps | grep com.x.x.x | awk '{print $2}')"

INFO

Check if the app created its own logfile: /data/data/com.x.x.x/

3.5.2 THINGS TO REPORT

Sensitive data was exposed within logs/log-files (i.e: "user bob tried to login in with secretpw123")

Previous3.4.3 ServicesNext3.6 More HOW and WHAT! (still work in progress)

Last updated 5 years ago

Was this helpful?