Android APK Checklist

Reading time: 6 minutes

tip

Leer en oefen AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Leer en oefen GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Leer en oefen Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Ondersteun HackTricks

Learn Android fundamentals

Static Analysis

  • Kontroleer die gebruik van obfuscation, en kyk of die toestel geroot is, of 'n emulator gebruik word, plus anti-tampering kontroles. Read this for more info.
  • Gevoelige toepassings (soos bank-apps) moet nagaan of die toestel geroot is en toepaslike maatreΓ«ls tref.
  • Soek vir interesting strings (wagwoorde, URLs, API, encryption, backdoors, tokens, Bluetooth uuids...).
  • Spesiale aandag aan firebase APIs.
  • Read the manifest:
  • Kontroleer of die toepassing in debug-modus is en probeer dit "exploit"
  • Kontroleer of die APK backups toelaat
  • Exported Activities
  • Unity Runtime: exported UnityPlayerActivity/UnityPlayerGameActivity with a unity CLI extras bridge. Toets -xrsdk-pre-init-library <abs-path> vir pre-init dlopen() RCE. See Intent Injection β†’ Unity Runtime.
  • Content Providers
  • Exposed services
  • Broadcast Receivers
  • URL Schemes
  • Is the application saving data insecurely internally or externally?
  • Is there any password hard coded or saved in disk? Is the app using insecurely crypto algorithms?
  • Is al die libraries compiled using the PIE flag?
  • Moet nie vergeet dat daar 'n klompie static Android Analyzers is wat jou baie kan help gedurende hierdie fase nie.
  • android:exported mandatory on Android 12+ – verkeerd geconfigureerde exported components kan lei tot eksterne intent-aanroepe.
  • Hersien Network Security Config (networkSecurityConfig XML) vir cleartextTrafficPermitted="true" of domein-spesifieke overrides.
  • Kyk vir calls na Play Integrity / SafetyNet / DeviceCheck – bepaal of custom attestation gehook of gebypass kan word.
  • Inspekteer App Links / Deep Links (android:autoVerify) vir intent-redirection of open-redirect probleme.
  • Identifiseer gebruik van WebView.addJavascriptInterface of loadData*() wat tot RCE / XSS binne die app kan lei.
  • Analyseer cross-platform bundles (Flutter libapp.so, React-Native JS bundles, Capacitor/Ionic assets). Dedicated tooling:
  • flutter-packer, fluttersign, rn-differ
  • Skandeer third-party native libraries vir bekende CVEs (bv., libwebp CVE-2023-4863, libpng, ens.).
  • Evalueer SEMgrep Mobile rules, Pithus en die nuutste MobSF β‰₯ 3.9 AI-assisted scan resultate vir addisionele bevindinge.

Dynamic Analysis

Some obfuscation/Deobfuscation information

Verwysings

tip

Leer en oefen AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Leer en oefen GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Leer en oefen Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Ondersteun HackTricks