Skip to content

Commit 82b1550

Browse files
committed
android.md modified.
1 parent aea86b4 commit 82b1550

File tree

1 file changed

+35
-2
lines changed

1 file changed

+35
-2
lines changed

mobile/android.md

+35-2
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,9 @@
1818
| `record_mic` | The record_mic command records audio. Good for listening to a phone conversation, as well as other uses. |
1919
| `send_sms` | The send_sms command allows you to send an SMS message. Keep in mind the phone will keep a copy of it, too. |
2020

21+
Other commands:
22+
23+
2124
#### Way to change password of services.
2225
You can recover password for some services (like gmail, twitter and facebook) by receiving SMS message.
2326
First, click "forgot password" and select SMS options. Then use the command `dump_sms` and you will have
@@ -26,8 +29,34 @@ verification code. Insert the code and change the password.
2629

2730

2831
## Other post-exploitation tools
29-
- Pupy: https://github.com/n1nj4sec/pupy
30-
- TheFatRat: https://github.com/Screetsec/TheFatRat
32+
#### Pupy:
33+
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) and post-exploitation tool mainly written in python. It features a all-in-memory execution guideline and leaves very low footprint. Pupy can communicate using various transports, migrate into processes (reflective injection), load remote python code, python packages and python C-extensions from memory.
34+
35+
#### TheFatRat:
36+
An easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection.
37+
38+
#### Xenotix-APK-Reverser
39+
Xenotix APK Reverser is an OpenSource Android Application Package (APK) decompiler and disassembler powered by dex2jar, baksmali and jd-core Released under Apache License.
40+
41+
#### DynamoRIO
42+
DynamoRIO is a runtime code manipulation system that supports code transformations on any part of a program, while it executes. DynamoRIO exports an interface for building dynamic tools for a wide variety of uses: program analysis and understanding, profiling, instrumentation, optimization, translation, etc. Unlike many dynamic tool systems, DynamoRIO is not limited to insertion of callouts/trampolines and allows arbitrary modifications to application instructions via a powerful IA-32/AMD64/ARM/AArch64 instruction manipulation library. DynamoRIO provides efficient, transparent, and comprehensive manipulation of unmodified applications running on stock operating systems (Windows, Linux, or Android) and commodity IA-32, AMD64, ARM, and AArch64 hardware.
43+
44+
We can run DynamoRIO based plugin to detect any post exploitation privilege escalation. E.g., java.lang.Runtime.exec("su") is generally used for getting su privileges using setuid(0) system call. These functions is detected using a global call.
45+
46+
47+
## Methodology
48+
#### Steps
49+
1. Application Mapping
50+
In this first phase, the focus relies on understanding the application logic and what exactly the application does. This involves some manual test where we do some basic operations such as install the APK on the phone, login and comprehend the functionality of the app.
51+
52+
1. Client Attacks
53+
This is one of the most challenging and exciting parts of the pentest assessment. Android apps are packed as an APK, also known as Android Package Kit or Android Application Package. Our mission as Pen testers is to verify how well protected the application has been created and designed against known threat actors.Android Mobile applications are distributed through platforms like Google Play. Since the application is fully installed on the client, it becomes vulnerable to any attacks coming from the client.
54+
55+
1. Network Attacks
56+
As we need to identify vulnerabilities in the Client, is also essential to verify how secure is the communication between the Client and the Server by evaluating the traffic. For this purpose, using tools like Attack proxies, evaluating potential SSL issues, and executing Wireshark Data package inspection is an essential part of the assessment.
57+
58+
1. Server Attacks
59+
Last but not least, issues at the Server level will impact the security of the application. Insecure implementation such as misconfigurations , vulnerabilities and issues at API or Database level, affect also the security of an application
3160

3261

3362
# Refernce:
@@ -41,3 +70,7 @@ verification code. Insert the code and change the password.
4170
- http://www.hackingarticles.in/hack-call-logs-sms-camera-remote-android-phone-using-metasploit/
4271
- https://android.stackexchange.com/questions/60906/terminal-on-real-android-device-from-pc
4372
- https://github.com/n1nj4sec/pupy
73+
- https://github.com/Screetsec/TheFatRat
74+
- https://github.com/ajinabraham/Xenotix-APK-Reverser
75+
- https://www.owasp.org/index.php/Android_Testing_Cheat_Sheet
76+
- http://www.dynamorio.org

0 commit comments

Comments
 (0)