2022-05-01 13:25:53 +00:00
|
|
|
|
# Android APK Checklist
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
|
|
|
|
<details>
|
|
|
|
|
|
2024-02-09 01:27:24 +00:00
|
|
|
|
<summary><strong>从零开始学习AWS黑客技术,成为专家</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE(HackTricks AWS红队专家)</strong></a><strong>!</strong></summary>
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-03-24 13:16:57 +00:00
|
|
|
|
* 您在**网络安全公司**工作吗? 想要在HackTricks中看到您的**公司广告**吗? 或者想要访问**PEASS的最新版本或下载HackTricks的PDF**吗? 请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
|
|
|
|
* 探索[**PEASS家族**](https://opensea.io/collection/the-peass-family),我们独家的[**NFTs**](https://opensea.io/collection/the-peass-family)收藏品
|
2024-03-24 12:24:51 +00:00
|
|
|
|
* 获取[**官方PEASS和HackTricks周边产品**](https://peass.creator-spring.com)
|
2024-03-24 13:16:57 +00:00
|
|
|
|
* **加入** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord群**](https://discord.gg/hRep4RUj7f) 或 [**电报群**](https://t.me/peass) 或 **关注**我的**Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**。**
|
|
|
|
|
* **通过向[hacktricks repo](https://github.com/carlospolop/hacktricks)和[hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)提交PR来分享您的黑客技巧**。
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
|
|
|
|
</details>
|
|
|
|
|
|
2024-03-14 23:34:01 +00:00
|
|
|
|
**Try Hard Security Group**
|
|
|
|
|
|
2024-03-24 13:16:57 +00:00
|
|
|
|
<figure><img src="../.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg" alt=""><figcaption></figcaption></figure>
|
2024-03-14 23:34:01 +00:00
|
|
|
|
|
|
|
|
|
{% embed url="https://discord.gg/tryhardsecurity" %}
|
|
|
|
|
|
|
|
|
|
***
|
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
### [学习Android基础知识](android-app-pentesting/#2-android-application-fundamentals)
|
|
|
|
|
|
|
|
|
|
* [ ] [基础知识](android-app-pentesting/#fundamentals-review)
|
2024-03-24 12:24:51 +00:00
|
|
|
|
* [ ] [Dalvik和Smali](android-app-pentesting/#dalvik--smali)
|
2023-08-03 19:12:22 +00:00
|
|
|
|
* [ ] [入口点](android-app-pentesting/#application-entry-points)
|
|
|
|
|
* [ ] [活动](android-app-pentesting/#launcher-activity)
|
|
|
|
|
* [ ] [URL方案](android-app-pentesting/#url-schemes)
|
|
|
|
|
* [ ] [内容提供者](android-app-pentesting/#services)
|
|
|
|
|
* [ ] [服务](android-app-pentesting/#services-1)
|
|
|
|
|
* [ ] [广播接收器](android-app-pentesting/#broadcast-receivers)
|
|
|
|
|
* [ ] [意图](android-app-pentesting/#intents)
|
|
|
|
|
* [ ] [意图过滤器](android-app-pentesting/#intent-filter)
|
|
|
|
|
* [ ] [其他组件](android-app-pentesting/#other-app-components)
|
2024-03-24 13:16:57 +00:00
|
|
|
|
* [ ] [如何使用ADB](android-app-pentesting/#adb-android-debug-bridge)
|
|
|
|
|
* [ ] [如何修改Smali](android-app-pentesting/#smali)
|
2023-08-03 19:12:22 +00:00
|
|
|
|
|
|
|
|
|
### [静态分析](android-app-pentesting/#static-analysis)
|
|
|
|
|
|
2024-03-24 13:16:57 +00:00
|
|
|
|
* [ ] 检查是否使用了[混淆](android-checklist.md#some-obfuscation-deobfuscation-information),检查是否注意到手机是否已root,是否正在使用模拟器以及反篡改检查。[阅读更多信息](android-app-pentesting/#other-checks)。
|
2024-02-07 05:49:16 +00:00
|
|
|
|
* [ ] 敏感应用程序(如银行应用)应检查手机是否已root,并应相应地采取行动。
|
2024-03-09 13:32:43 +00:00
|
|
|
|
* [ ] 搜索[有趣的字符串](android-app-pentesting/#looking-for-interesting-info)(密码、URL、API、加密、后门、令牌、蓝牙uuid等)。
|
2024-03-14 23:34:01 +00:00
|
|
|
|
* [ ] 特别关注[firebase ](android-app-pentesting/#firebase)API。
|
2023-08-03 19:12:22 +00:00
|
|
|
|
* [ ] [阅读清单:](android-app-pentesting/#basic-understanding-of-the-application-manifest-xml)
|
2024-03-14 23:34:01 +00:00
|
|
|
|
* [ ] 检查应用是否处于调试模式,并尝试“利用”它
|
2023-08-03 19:12:22 +00:00
|
|
|
|
* [ ] 检查APK是否允许备份
|
|
|
|
|
* [ ] 导出的活动
|
|
|
|
|
* [ ] 内容提供者
|
|
|
|
|
* [ ] 暴露的服务
|
|
|
|
|
* [ ] 广播接收器
|
|
|
|
|
* [ ] URL方案
|
2024-03-14 23:34:01 +00:00
|
|
|
|
* [ ] 应用程序是否[在内部或外部不安全地保存数据](android-app-pentesting/#insecure-data-storage)?
|
2024-02-09 01:27:24 +00:00
|
|
|
|
* [ ] 是否有[硬编码的密码或保存在磁盘上的密码](android-app-pentesting/#poorkeymanagementprocesses)?应用程序是否[使用不安全的加密算法](android-app-pentesting/#useofinsecureandordeprecatedalgorithms)?
|
2023-08-03 19:12:22 +00:00
|
|
|
|
* [ ] 所有使用PIE标志编译的库?
|
2024-02-09 01:27:24 +00:00
|
|
|
|
* [ ] 不要忘记有许多[静态Android分析工具](android-app-pentesting/#automatic-analysis)可以在此阶段帮助您很多。
|
2023-08-03 19:12:22 +00:00
|
|
|
|
|
|
|
|
|
### [动态分析](android-app-pentesting/#dynamic-analysis)
|
|
|
|
|
|
2024-02-09 01:27:24 +00:00
|
|
|
|
* [ ] 准备环境([在线](android-app-pentesting/#online-dynamic-analysis),[本地虚拟机或物理](android-app-pentesting/#local-dynamic-analysis))
|
2024-02-07 05:49:16 +00:00
|
|
|
|
* [ ] 是否存在[意外数据泄漏](android-app-pentesting/#unintended-data-leakage)(日志记录、复制/粘贴、崩溃日志)?
|
2024-03-09 13:32:43 +00:00
|
|
|
|
* [ ] [保存在SQLite数据库中的机密信息](android-app-pentesting/#sqlite-dbs)?
|
2023-08-03 19:12:22 +00:00
|
|
|
|
* [ ] [可利用的暴露活动](android-app-pentesting/#exploiting-exported-activities-authorisation-bypass)?
|
|
|
|
|
* [ ] [可利用的内容提供者](android-app-pentesting/#exploiting-content-providers-accessing-and-manipulating-sensitive-information)?
|
|
|
|
|
* [ ] [可利用的暴露服务](android-app-pentesting/#exploiting-services)?
|
|
|
|
|
* [ ] [可利用的广播接收器](android-app-pentesting/#exploiting-broadcast-receivers)?
|
2024-02-07 05:49:16 +00:00
|
|
|
|
* [ ] 应用程序是否[以明文传输信息/使用弱算法](android-app-pentesting/#insufficient-transport-layer-protection)?是否可能进行中间人攻击?
|
2023-08-03 19:12:22 +00:00
|
|
|
|
* [ ] [检查HTTP/HTTPS流量](android-app-pentesting/#inspecting-http-traffic)
|
2024-03-24 12:24:51 +00:00
|
|
|
|
* [ ] 这一点非常重要,因为如果您可以捕获HTTP流量,您可以搜索常见的Web漏洞(Hacktricks有大量关于Web漏洞的信息)。
|
2024-02-08 03:56:12 +00:00
|
|
|
|
* [ ] 检查可能存在的[Android客户端注入](android-app-pentesting/#android-client-side-injections-and-others)(可能一些静态代码分析会有所帮助)
|
2024-03-14 23:34:01 +00:00
|
|
|
|
* [ ] [Frida](android-app-pentesting/#frida):只用Frida,用它从应用程序中获取有趣的动态数据(也许会有一些密码...)
|
2024-02-07 05:49:16 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
### 一些混淆/反混淆信息
|
|
|
|
|
|
2024-02-07 05:49:16 +00:00
|
|
|
|
* [ ] [在此处阅读](android-app-pentesting/#obfuscating-deobfuscating-code)
|
2024-03-14 23:34:01 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
**Try Hard Security Group**
|
|
|
|
|
|
2024-03-24 13:16:57 +00:00
|
|
|
|
<figure><img src="../.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg" alt=""><figcaption></figcaption></figure>
|
2024-03-14 23:34:01 +00:00
|
|
|
|
|
|
|
|
|
{% embed url="https://discord.gg/tryhardsecurity" %}
|
|
|
|
|
|
|
|
|
|
<details>
|
|
|
|
|
|
|
|
|
|
<summary><strong>从零开始学习AWS黑客技术,成为专家</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE(HackTricks AWS红队专家)</strong></a><strong>!</strong></summary>
|
|
|
|
|
|
2024-03-24 13:16:57 +00:00
|
|
|
|
* 您在**网络安全公司**工作吗? 想要在HackTricks中看到您的**公司广告**吗? 或者想要访问**PEASS的最新版本或下载HackTricks的PDF**吗? 请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
|
|
|
|
* 探索[**PEASS家族**](https://opensea.io/collection/the-peass-family),我们独家的[**NFTs**](https://opensea.io/collection/the-peass-family)收藏品
|
2024-03-24 12:24:51 +00:00
|
|
|
|
* 获取[**官方PEASS和HackTricks周边产品**](https://peass.creator-spring.com)
|
2024-03-24 13:16:57 +00:00
|
|
|
|
* **加入** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord群**](https://discord.gg/hRep4RUj7f) 或 [**电报群**](https://t.me/peass) 或 **关注**我的**Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**。**
|
|
|
|
|
* **通过向[hacktricks repo](https://github.com/carlospolop/hacktricks)和[hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)提交PR来分享您的黑客技巧**。
|
2024-03-14 23:34:01 +00:00
|
|
|
|
|
|
|
|
|
</details>
|