mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-22 20:53:37 +00:00
94 lines
7.1 KiB
Markdown
94 lines
7.1 KiB
Markdown
# Android APK Kontrollys
|
|
|
|
<details>
|
|
|
|
<summary><strong>Leer AWS-hacking vanaf nul tot held met</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (HackTricks AWS Red Team Expert)</strong></a><strong>!</strong></summary>
|
|
|
|
* Werk jy in 'n **cybersecurity-maatskappy**? Wil jy jou **maatskappy geadverteer sien in HackTricks**? of wil jy toegang hê tot die **nuutste weergawe van die PEASS of laai HackTricks in PDF af**? Kyk na die [**INSKRYWINGSPLANNE**](https://github.com/sponsors/carlospolop)!
|
|
* Ontdek [**Die PEASS Familie**](https://opensea.io/collection/the-peass-family), ons versameling eksklusiewe [**NFT's**](https://opensea.io/collection/the-peass-family)
|
|
* Kry die [**amptelike PEASS & HackTricks swag**](https://peass.creator-spring.com)
|
|
* **Sluit aan by die** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord-groep**](https://discord.gg/hRep4RUj7f) of die [**telegram-groep**](https://t.me/peass) of **volg** my op **Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
|
|
* **Deel jou hacktruuks deur PR's in te dien by die [hacktricks-opslag](https://github.com/carlospolop/hacktricks) en [hacktricks-cloud-opslag](https://github.com/carlospolop/hacktricks-cloud)**.
|
|
|
|
</details>
|
|
|
|
**Try Hard Security Group**
|
|
|
|
<figure><img src="../.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg" alt=""><figcaption></figcaption></figure>
|
|
|
|
{% embed url="https://discord.gg/tryhardsecurity" %}
|
|
|
|
***
|
|
|
|
### [Leer Android grondbeginsels](android-app-pentesting/#2-android-application-fundamentals)
|
|
|
|
* [ ] [Basies](android-app-pentesting/#fundamentals-review)
|
|
* [ ] [Dalvik & Smali](android-app-pentesting/#dalvik--smali)
|
|
* [ ] [Inkommende punte](android-app-pentesting/#application-entry-points)
|
|
* [ ] [Aktiwiteite](android-app-pentesting/#launcher-activity)
|
|
* [ ] [URL-skemas](android-app-pentesting/#url-schemes)
|
|
* [ ] [Inhoudsverskaffers](android-app-pentesting/#services)
|
|
* [ ] [Dienste](android-app-pentesting/#services-1)
|
|
* [ ] [Uitsaai-ontvangers](android-app-pentesting/#broadcast-receivers)
|
|
* [ ] [Intents](android-app-pentesting/#intents)
|
|
* [ ] [Intent-filter](android-app-pentesting/#intent-filter)
|
|
* [ ] [Ander komponente](android-app-pentesting/#other-app-components)
|
|
* [ ] [Hoe om ADB te gebruik](android-app-pentesting/#adb-android-debug-bridge)
|
|
* [ ] [Hoe om Smali te wysig](android-app-pentesting/#smali)
|
|
|
|
### [Statiese Analise](android-app-pentesting/#static-analysis)
|
|
|
|
* [ ] Kontroleer vir die gebruik van [obfuskasie](android-checklist.md#some-obfuscation-deobfuscation-information), kontroleer vir aantekeninge of die foon gewortel is, of 'n emulator gebruik word en teen-bedrog kontroles. [Lees hierdie vir meer inligting](android-app-pentesting/#other-checks).
|
|
* [ ] Sensitiewe toepassings (soos banktoepassings) moet nagaan of die foon gewortel is en moet daarna optree.
|
|
* [ ] Soek na [interessante strings](android-app-pentesting/#looking-for-interesting-info) (wagwoorde, URL's, API, enkripsie, agterdeure, tokens, Bluetooth-uuid's...).
|
|
* [ ] Spesiale aandag aan [firebase ](android-app-pentesting/#firebase)API's.
|
|
* [ ] [Lees die manifest:](android-app-pentesting/#basic-understanding-of-the-application-manifest-xml)
|
|
* [ ] Kontroleer of die toepassing in foutopsporingsmodus is en probeer om dit "uit te buit"
|
|
* [ ] Kontroleer of die APK rugsteune toelaat
|
|
* [ ] Uitgevoerde aktiwiteite
|
|
* [ ] Inhoudsverskaffers
|
|
* [ ] Blootgestelde dienste
|
|
* [ ] Uitsaai-ontvangers
|
|
* [ ] URL-skemas
|
|
* [ ] Berg die toepassing data onveilig intern of ekstern op](android-app-pentesting/#insecure-data-storage)?
|
|
* [ ] Is daar enige [hardgekooide wagwoord of op die skyf gestoor](android-app-pentesting/#poorkeymanagementprocesses)? Gebruik die app [onveilige kriptografie-algoritmes](android-app-pentesting/#useofinsecureandordeprecatedalgorithms)?
|
|
* [ ] Is al die biblioteke saamgestel met die PIE-vlag?
|
|
* [ ] Moet nie vergeet dat daar 'n klomp [statische Android-analise-instrumente](android-app-pentesting/#automatic-analysis) is wat jou baie kan help gedurende hierdie fase.
|
|
|
|
### [Dinamiese Analise](android-app-pentesting/#dynamic-analysis)
|
|
|
|
* [ ] Berei die omgewing voor ([aanlyn](android-app-pentesting/#online-dynamic-analysis), [plaaslike VM of fisies](android-app-pentesting/#local-dynamic-analysis))
|
|
* [ ] Is daar enige [onbedoelde datalek](android-app-pentesting/#unintended-data-leakage) (log, kopie/plak, aflooplogboeke)?
|
|
* [ ] [Vertroulike inligting wat in SQLite-databasisse gestoor word](android-app-pentesting/#sqlite-dbs)?
|
|
* [ ] [Uitbuitbare blootgestelde aktiwiteite](android-app-pentesting/#exploiting-exported-activities-authorisation-bypass)?
|
|
* [ ] [Uitbuitbare inhoudsverskaffers](android-app-pentesting/#exploiting-content-providers-accessing-and-manipulating-sensitive-information)?
|
|
* [ ] [Uitbuitbare blootgestelde dienste](android-app-pentesting/#exploiting-services)?
|
|
* [ ] [Uitbuitbare uitsaai-ontvangers](android-app-pentesting/#exploiting-broadcast-receivers)?
|
|
* [ ] Stuur die toepassing inligting in die oop teks/deur swak algoritmes te gebruik](android-app-pentesting/#insufficient-transport-layer-protection)? is 'n MitM moontlik?
|
|
* [ ] [Inspekteer HTTP/HTTPS-verkeer](android-app-pentesting/#inspecting-http-traffic)
|
|
* [ ] Hierdie is baie belangrik, want as jy die HTTP-verkeer kan vasvang, kan jy soek na algemene Web-kwesbaarhede (Hacktricks het baie inligting oor Web-kwesbaarhede).
|
|
* [ ] Kontroleer vir moontlike [Android-kliëntkant-inspuitings](android-app-pentesting/#android-client-side-injections-and-others) (waarskynlik sal 'n bietjie statiese kode-analise hier help)
|
|
* [ ] [Frida](android-app-pentesting/#frida): Net Frida, gebruik dit om interessante dinamiese data van die toepassing te verkry (miskien sommige wagwoorde...)
|
|
|
|
### Sommige obfuskasie/Deobfuscation-inligting
|
|
|
|
* [ ] [Lees hier](android-app-pentesting/#obfuscating-deobfuscating-code)
|
|
|
|
|
|
**Try Hard Security Group**
|
|
|
|
<figure><img src="../.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg" alt=""><figcaption></figcaption></figure>
|
|
|
|
{% embed url="https://discord.gg/tryhardsecurity" %}
|
|
|
|
<details>
|
|
|
|
<summary><strong>Leer AWS-hacking vanaf nul tot held met</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (HackTricks AWS Red Team Expert)</strong></a><strong>!</strong></summary>
|
|
|
|
* Werk jy in 'n **cybersecurity-maatskappy**? Wil jy jou **maatskappy geadverteer sien in HackTricks**? of wil jy toegang hê tot die **nuutste weergawe van die PEASS of laai HackTricks in PDF af**? Kyk na die [**INSKRYWINGSPLANNE**](https://github.com/sponsors/carlospolop)!
|
|
* Ontdek [**Die PEASS Familie**](https://opensea.io/collection/the-peass-family), ons versameling eksklusiewe [**NFT's**](https://opensea.io/collection/the-peass-family)
|
|
* Kry die [**amptelike PEASS & HackTricks swag**](https://peass.creator-spring.com)
|
|
* **Sluit aan by die** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord-groep**](https://discord.gg/hRep4RUj7f) of die [**telegram-groep**](https://t.me/peass) of **volg** my op **Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
|
|
* **Deel jou hacktruuks deur PR's in te dien by die [hacktricks-opslag](https://github.com/carlospolop/hacktricks) en [hacktricks-cloud-opslag](https://github.com/carlospolop/hacktricks-cloud)**.
|
|
|
|
</details>
|