Friday, November 1, 2024
HomeAndroidAndroid Application Penetration Testing Part - 4

Android Application Penetration Testing Part – 4

Published on

Malware protection

As per my last article(Part 1), ( Part 2), (part-3) we had a look at basic architecture and penetration testing tools and ADB. Now let’s see some entry points for Android application Penetration testing.

From the perspective of security, the manifest file is usually the first thing that a penetration tester will check on an engagement.

c

- Advertisement - SIEM as a Service

Android Manifest File

  • It provides all details about an Android application
  • It names the Java package for the application
  • It declares all permissions
  • It describes Android applications components
  • It contains a declaration of a minimum level of API that application requires
  • minimum Android version required to run the program
  • services

We will use insecurebank.apk application to demonstrate

Allow debuggable: true

If an application is marked as debuggable then any attacker can access the application data by assuming the privileges of that application or can run arbitrary code under that application permission. In the case of a non-debuggable application, an attacker would first need to root the device to extract any data.

Java Debug Wire Protocol is the central link between the Debugger and the JVM instance

Without a rooted phone it is possible to extract the data or run an arbitrary code using application permission

             Before app start   after app start    

Above is the shell access of my personal phone which is not rooted.

Allow backup: true 

This setting defines whether application data can be backed up and restored by a user who has enabled usb debugging. Therefore applications that handle and store sensitive information such as card details, passwords etc. should have this setting set too false to prevent such risks

Open terminal

– Adb backup –apk –shared (apk name)

Cat backup.ab zlib-flate -uncompress > backup_compressed.tar

Permissions

Permission is a restriction that limits access to a part of the code or to data on the device.

Applications that have permission to copy data to external storage should be reviewed to ensure that no sensitive information is stored.

All the permissions that the application requests should be reviewed to ensure that they don’t introduce a security risk.

There are four values that can be used with this attribute:

  • Normal
  • Dangerous
  • Signature
  • Signature Or System

Example-

<Permission>

Android: protectionLevel=”signature”

</permission>

Intents

These are the components that are used to bind two or more different Android components together. Intents could be used to perform a variety of tasks, such as starting an action, switching activities, and starting services.

Intents can be used to launch an activity, send it to any interested broadcast receiver components, and communicate with a background service. Intents messages should be reviewed to ensure that they don’t contain any sensitive information that could be intercepted.

<Intent-filter>

<action android: name=”string” />

<category android: name=”string” />

</intent-filter>

Explicit intents connect one activity to another in the same application. These intents designate the target component by its name and they are typically used for application-internal messages – such as an activity launching a sister activity when a user clicks a button.

Implicit intents do not name a target and the field for the component name is left blank. Implicit intents are often used to activate components in other applications. For example, if we want to show the user a location on a map, we can use an implicit intent to request that another capable app show a specified location on a map.

You can follow us on LinkedinTwitter, and Facebook for daily Cybersecurity updates also you can take the Android Hacking and Penetration Testing Course to keep yourself self-updated.

Also Read

Latest articles

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

ErrorFather Hackers Attacking & Control Android Device Remotely

The Cerberus Android banking trojan, which gained notoriety in 2019 for its ability to...

TrickMo Malware Targets Android Devices to Steal Unlock Patterns and PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further...

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...