hacktricks/mobile-pentesting/android-checklist.md

94 lines
7.1 KiB
Markdown

# Android APK Kontrollys
<details>
<summary><strong>Leer AWS-hacking vanaf nul tot held met</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (HackTricks AWS Red Team Expert)</strong></a><strong>!</strong></summary>
* Werk jy in 'n **cybersecurity-maatskappy**? Wil jy jou **maatskappy geadverteer sien in HackTricks**? of wil jy toegang hê tot die **nuutste weergawe van die PEASS of laai HackTricks in PDF af**? Kyk na die [**INSKRYWINGSPLANNE**](https://github.com/sponsors/carlospolop)!
* Ontdek [**Die PEASS Familie**](https://opensea.io/collection/the-peass-family), ons versameling eksklusiewe [**NFT's**](https://opensea.io/collection/the-peass-family)
* Kry die [**amptelike PEASS & HackTricks swag**](https://peass.creator-spring.com)
* **Sluit aan by die** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord-groep**](https://discord.gg/hRep4RUj7f) of die [**telegram-groep**](https://t.me/peass) of **volg** my op **Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
* **Deel jou hacktruuks deur PR's in te dien by die [hacktricks-opslag](https://github.com/carlospolop/hacktricks) en [hacktricks-cloud-opslag](https://github.com/carlospolop/hacktricks-cloud)**.
</details>
**Try Hard Security Group**
<figure><img src="../.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg" alt=""><figcaption></figcaption></figure>
{% embed url="https://discord.gg/tryhardsecurity" %}
***
### [Leer Android grondbeginsels](android-app-pentesting/#2-android-application-fundamentals)
* [ ] [Basies](android-app-pentesting/#fundamentals-review)
* [ ] [Dalvik & Smali](android-app-pentesting/#dalvik--smali)
* [ ] [Inkommende punte](android-app-pentesting/#application-entry-points)
* [ ] [Aktiwiteite](android-app-pentesting/#launcher-activity)
* [ ] [URL-skemas](android-app-pentesting/#url-schemes)
* [ ] [Inhoudsverskaffers](android-app-pentesting/#services)
* [ ] [Dienste](android-app-pentesting/#services-1)
* [ ] [Uitsaai-ontvangers](android-app-pentesting/#broadcast-receivers)
* [ ] [Intents](android-app-pentesting/#intents)
* [ ] [Intent-filter](android-app-pentesting/#intent-filter)
* [ ] [Ander komponente](android-app-pentesting/#other-app-components)
* [ ] [Hoe om ADB te gebruik](android-app-pentesting/#adb-android-debug-bridge)
* [ ] [Hoe om Smali te wysig](android-app-pentesting/#smali)
### [Statiese Analise](android-app-pentesting/#static-analysis)
* [ ] Kontroleer vir die gebruik van [obfuskasie](android-checklist.md#some-obfuscation-deobfuscation-information), kontroleer vir aantekeninge of die foon gewortel is, of 'n emulator gebruik word en teen-bedrog kontroles. [Lees hierdie vir meer inligting](android-app-pentesting/#other-checks).
* [ ] Sensitiewe toepassings (soos banktoepassings) moet nagaan of die foon gewortel is en moet daarna optree.
* [ ] Soek na [interessante strings](android-app-pentesting/#looking-for-interesting-info) (wagwoorde, URL's, API, enkripsie, agterdeure, tokens, Bluetooth-uuid's...).
* [ ] Spesiale aandag aan [firebase ](android-app-pentesting/#firebase)API's.
* [ ] [Lees die manifest:](android-app-pentesting/#basic-understanding-of-the-application-manifest-xml)
* [ ] Kontroleer of die toepassing in foutopsporingsmodus is en probeer om dit "uit te buit"
* [ ] Kontroleer of die APK rugsteune toelaat
* [ ] Uitgevoerde aktiwiteite
* [ ] Inhoudsverskaffers
* [ ] Blootgestelde dienste
* [ ] Uitsaai-ontvangers
* [ ] URL-skemas
* [ ] Berg die toepassing data onveilig intern of ekstern op](android-app-pentesting/#insecure-data-storage)?
* [ ] Is daar enige [hardgekooide wagwoord of op die skyf gestoor](android-app-pentesting/#poorkeymanagementprocesses)? Gebruik die app [onveilige kriptografie-algoritmes](android-app-pentesting/#useofinsecureandordeprecatedalgorithms)?
* [ ] Is al die biblioteke saamgestel met die PIE-vlag?
* [ ] Moet nie vergeet dat daar 'n klomp [statische Android-analise-instrumente](android-app-pentesting/#automatic-analysis) is wat jou baie kan help gedurende hierdie fase.
### [Dinamiese Analise](android-app-pentesting/#dynamic-analysis)
* [ ] Berei die omgewing voor ([aanlyn](android-app-pentesting/#online-dynamic-analysis), [plaaslike VM of fisies](android-app-pentesting/#local-dynamic-analysis))
* [ ] Is daar enige [onbedoelde datalek](android-app-pentesting/#unintended-data-leakage) (log, kopie/plak, aflooplogboeke)?
* [ ] [Vertroulike inligting wat in SQLite-databasisse gestoor word](android-app-pentesting/#sqlite-dbs)?
* [ ] [Uitbuitbare blootgestelde aktiwiteite](android-app-pentesting/#exploiting-exported-activities-authorisation-bypass)?
* [ ] [Uitbuitbare inhoudsverskaffers](android-app-pentesting/#exploiting-content-providers-accessing-and-manipulating-sensitive-information)?
* [ ] [Uitbuitbare blootgestelde dienste](android-app-pentesting/#exploiting-services)?
* [ ] [Uitbuitbare uitsaai-ontvangers](android-app-pentesting/#exploiting-broadcast-receivers)?
* [ ] Stuur die toepassing inligting in die oop teks/deur swak algoritmes te gebruik](android-app-pentesting/#insufficient-transport-layer-protection)? is 'n MitM moontlik?
* [ ] [Inspekteer HTTP/HTTPS-verkeer](android-app-pentesting/#inspecting-http-traffic)
* [ ] Hierdie is baie belangrik, want as jy die HTTP-verkeer kan vasvang, kan jy soek na algemene Web-kwesbaarhede (Hacktricks het baie inligting oor Web-kwesbaarhede).
* [ ] Kontroleer vir moontlike [Android-kliëntkant-inspuitings](android-app-pentesting/#android-client-side-injections-and-others) (waarskynlik sal 'n bietjie statiese kode-analise hier help)
* [ ] [Frida](android-app-pentesting/#frida): Net Frida, gebruik dit om interessante dinamiese data van die toepassing te verkry (miskien sommige wagwoorde...)
### Sommige obfuskasie/Deobfuscation-inligting
* [ ] [Lees hier](android-app-pentesting/#obfuscating-deobfuscating-code)
**Try Hard Security Group**
<figure><img src="../.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg" alt=""><figcaption></figcaption></figure>
{% embed url="https://discord.gg/tryhardsecurity" %}
<details>
<summary><strong>Leer AWS-hacking vanaf nul tot held met</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (HackTricks AWS Red Team Expert)</strong></a><strong>!</strong></summary>
* Werk jy in 'n **cybersecurity-maatskappy**? Wil jy jou **maatskappy geadverteer sien in HackTricks**? of wil jy toegang hê tot die **nuutste weergawe van die PEASS of laai HackTricks in PDF af**? Kyk na die [**INSKRYWINGSPLANNE**](https://github.com/sponsors/carlospolop)!
* Ontdek [**Die PEASS Familie**](https://opensea.io/collection/the-peass-family), ons versameling eksklusiewe [**NFT's**](https://opensea.io/collection/the-peass-family)
* Kry die [**amptelike PEASS & HackTricks swag**](https://peass.creator-spring.com)
* **Sluit aan by die** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord-groep**](https://discord.gg/hRep4RUj7f) of die [**telegram-groep**](https://t.me/peass) of **volg** my op **Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
* **Deel jou hacktruuks deur PR's in te dien by die [hacktricks-opslag](https://github.com/carlospolop/hacktricks) en [hacktricks-cloud-opslag](https://github.com/carlospolop/hacktricks-cloud)**.
</details>