Friday, April 11, 2025
HomeAndroidAndroid Application Penetration Testing – Part 5

Android Application Penetration Testing – Part 5

Published on

SIEM as a Service

Follow Us on Google News

Android Components

Three of the four component types—activities, services, and broadcast receivers—are activated by an asynchronous message called an intent.

Activating Components

Intents bind individual components to each other at run-time (you can think of them as the messengers that request an action from other components), whether the component belongs to your app or to other.

Broadcast Receiver

Broadcast receivers don’t display a user interface, they may create a status bar notification to alert the user when a broadcast event occurs.

- Advertisement - Google News

Also read Android Application Penetration Testing – Part 1

System Events

An application can be registered to receive broadcasts occurred by system events such as BOOT COMPLETE, SMS RECEIVED, BATTERY LOW, etc. When an application is registered for an SMS RECEIVED event, its receiver will be invoked every time a new SMS is received.

Custom Broadcasts

Apart from the system-generated events, an application also can generate custom broadcast intents for which we can register a receiver.

More commonly, though, a broadcast receiver is just a “gateway” to other components and is intended to do a very minimal amount of work.

For instance, it might initiate a service to perform some work based on the event.An application may register a receiver for the low battery message for example, and change its behavior based on that information.

Example:

A broadcast receiver “MyBroadCastReceiver” is registered in the AndroidManifest.xml file.Broadcast receivers are generally registered in the following format. The code seems insecure since the receiver is exported.

Android Application Penetration Testing

Also Read Android Application Penetration Testing – Part 2

Services

A service is a component that runs in the background to perform long-running operations or to perform work for remote processes.

A service does not provide a user interface, neither component, such as an activity, can start the service and let it run or bind to it in order to interact with it.

For example, a service might play music in the background while the user is in a different application, or it might fetch data over the network without blocking user interaction with an activity.

The three different types of services:

Scheduled-A service is scheduled when an API such as the Job Scheduler, introduced in Android 5.0 (API level 21), launches the service.

Started– A service is started when an application component (such as an activity) calls start Service ().

Bound– A service is bound when an application component binds to it by calling bind Service ().

Service in the manifest Declare all services in your application’s manifest file, just as for activities and other components.

<Manifest … >

<application … >
<service android: name=”.Example Service” />

</application>
</manifest>

Android Application Penetration Testing
          Services

Activity

To be simple an activity represents a single screen with a user interface. For Example, one activity for Login and another activity after login has been successful.

Activity serves as the entry point for a user’s interaction with an app and is also central to how a user navigates within an app or between apps.

Also Read Android Application Penetration Testing – Part 3

The Activity class provides a number of callbacks that allow the activity to know that a state has changed: that the system is creating, stopping, or resuming an activity, or destroying the process in which the activity resides.

Android Application Penetration Testing
                    Example of activities

Content Provider

Content Provider component supplies data from one application to others on request.

You can store the data in the file system, a Sq-Lite database, on the web, or any other persistent storage location your app can access.

Through the content provider, other apps can query or even modify the data (if the content provider allows it).

Content Provider is useful in cases when an app wants to share data with another app.

Android Application Penetration Testing

Also Read Android Application Penetration Testing – Part 4

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Jenkins Docker Vulnerability Allows Hackers to Hijack Network Traffic

A newly disclosed vulnerability affecting Jenkins Docker images has raised serious concerns about network...

Microsoft Issues Urgent Patch to Fix Office Update Crash

Microsoft has released an urgent patch for Office 2016 to address a critical issue...

Shuckworm Group Leverages GammaSteel Malware in Targeted PowerShell Attacks

The Russia-linked cyber-espionage group known as Shuckworm (also identified as Gamaredon or Armageddon) has...

ViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users

AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Google Patches Actively Exploited Android 0-Day Vulnerability

Google has issued critical security updates to address a recently discovered zero-day vulnerability actively...

Threat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

In a sophisticated cybercrime operation, the Smishing Triad, a China-based group, has been identified...

Everest Ransomware Gang’s Leak Site Hacked and Defaced

TechCrunch has uncovered a concerning development in consumer-grade spyware: a stealthy Android monitoring app...