10 KiB
从零到英雄学习 AWS 黑客攻击,通过 htARTE (HackTricks AWS Red Team Expert)!
支持 HackTricks 的其他方式:
- 如果您想在 HackTricks 中看到您的公司广告 或 下载 HackTricks 的 PDF,请查看 订阅计划!
- 获取 官方 PEASS & HackTricks 商品
- 发现 PEASS 家族,我们独家的 NFT 集合
- 加入 💬 Discord 群组 或 telegram 群组 或在 Twitter 🐦 上 关注 我 @carlospolopm。
- 通过向 HackTricks 和 HackTricks Cloud github 仓库提交 PR 来分享您的黑客技巧。
Adb 通常位于:
#Windows
C:\Users\<username>\AppData\Local\Android\sdk\platform-tools\adb.exe
#MacOS
/Users/<username>/Library/Android/sdk/platform-tools/adb
信息来源于: http://adbshell.com/
连接
adb devices
这将列出已连接的设备;如果出现“_**unathorised**_”,这意味着您需要**解锁**您的**手机**并**接受**连接。
这向设备指示它必须在端口5555上启动一个adb服务器:
adb tcpip 5555
连接到该IP和该端口:
adb connect <IP>:<PORT>
如果您在虚拟Android软件中(如Genymotion)遇到以下错误:
adb server version (41) doesn't match this client (36); killing...
这是因为您尝试连接到一个版本不同的ADB服务器。只需尝试找到软件正在使用的adb二进制文件(转到`C:\Program Files\Genymobile\Genymotion`并搜索adb.exe)
## 多个设备
当您发现**有多个设备连接到您的计算机**时,您将需要**指定在哪一个设备上**运行adb命令。
adb devices
List of devices attached
10.10.10.247:42135 offline
127.0.0.1:5555 device
adb -s 127.0.0.1:5555 shell
x86_64:/ # whoami
root
端口隧道
如果adb 端口仅在安卓设备的localhost可访问,但你可以通过SSH访问,你可以转发端口5555并通过adb连接:
ssh -i ssh_key username@10.10.10.10 -L 5555:127.0.0.1:5555 -p 2222
adb connect 127.0.0.1:5555
包管理器
安装/卸载
adb install [选项] <路径>
adb install test.apk
adb install -l test.apk forward lock application
adb install -r test.apk replace existing application
adb install -t test.apk allow test packages
adb install -s test.apk install application on sdcard
adb install -d test.apk allow version code downgrade
adb install -p test.apk partial application install
adb uninstall [选项] <PACKAGE>
adb uninstall com.test.app
adb uninstall -k com.test.app Keep the data and cache directories around after package removal.
包
打印所有包,可选仅打印包名中包含<FILTER>文本的包。
adb shell pm list packages [options] <FILTER-STR>
adb shell pm list packages <FILTER-STR>
adb shell pm list packages -f <FILTER-STR> #See their associated file.
adb shell pm list packages -d <FILTER-STR> #Filter to only show disabled packages.
adb shell pm list packages -e <FILTER-STR> #Filter to only show enabled packages.
adb shell pm list packages -s <FILTER-STR> #Filter to only show system packages.
adb shell pm list packages -3 <FILTER-STR> #Filter to only show third party packages.
adb shell pm list packages -i <FILTER-STR> #See the installer for the packages.
adb shell pm list packages -u <FILTER-STR> #Also include uninstalled packages.
adb shell pm list packages --user <USER_ID> <FILTER-STR> #The user space to query.
adb shell pm path <PACKAGE>
打印给定应用的APK路径。
adb shell pm path com.android.phone
adb shell pm clear <PACKAGE>
删除与包关联的所有数据。
adb shell pm clear com.test.abc
文件管理器
adb pull <remote> [local]
从模拟器/设备下载指定文件到您的电脑。
adb pull /sdcard/demo.mp4 ./
adb push <local> <remote>
将指定文件从您的计算机上传到模拟器/设备。
adb push test.apk /sdcard
截屏/录屏
adb shell screencap <filename>
对设备显示屏进行截图。
adb shell screencap /sdcard/screen.png
adb shell screenrecord [options] <filename>
录制运行Android 4.4(API 级别 19)及更高版本设备的显示屏。
adb shell screenrecord /sdcard/demo.mp4
adb shell screenrecord --size <WIDTHxHEIGHT>
adb shell screenrecord --bit-rate <RATE>
adb shell screenrecord --time-limit <TIME> #Sets the maximum recording time, in seconds. The default and maximum value is 180 (3 minutes).
adb shell screenrecord --rotate # Rotates 90 degrees
adb shell screenrecord --verbose
(press Ctrl-C to stop recording)
您可以使用adb pull下载文件(图片和视频)
Shell
adb shell
获取设备内的shell
adb shell
adb shell <CMD>
在设备内执行命令
adb shell ls
pm
以下命令在 shell 内执行
pm list packages #List installed packages
pm path <package name> #Get the path to the apk file of tha package
am start [<options>] #Start an activity. Whiout options you can see the help menu
am startservice [<options>] #Start a service. Whiout options you can see the help menu
am broadcast [<options>] #Send a broadcast. Whiout options you can see the help menu
input [text|keyevent] #Send keystrokes to device
进程
如果您想获取应用程序进程的PID,可以执行:
adb shell ps
并搜索您的应用程序
或者您可以执行
adb shell pidof com.your.application
And it will print the PID of the application
系统
adb root
重启具有 root 权限的 adbd 守护进程。然后,您需要再次连接到 ADB 服务器,您将获得 root 权限(如果可用)。
adb sideload <update.zip>
刷写/恢复Android update.zip包。
日志
Logcat
要仅过滤一个应用程序的消息,获取应用程序的PID,并使用grep(linux/macos)或findstr(windows)来过滤logcat的输出:
adb logcat | grep 4526
adb logcat | findstr 4526
adb logcat [选项] [过滤规格]
adb logcat
备注:按 Ctrl-C 停止监控
adb logcat *:V lowest priority, filter to only show Verbose level
adb logcat *:D filter to only show Debug level
adb logcat *:I filter to only show Info level
adb logcat *:W filter to only show Warning level
adb logcat *:E filter to only show Error level
adb logcat *:F filter to only show Fatal level
adb logcat *:S Silent, highest priority, on which nothing is ever printed
adb logcat -b <缓冲区>
adb logcat -b radio View the buffer that contains radio/telephony related messages.
adb logcat -b event View the buffer containing events-related messages.
adb logcat -b main default
adb logcat -c Clears the entire log and exits.
adb logcat -d Dumps the log to the screen and exits.
adb logcat -f test.logs Writes log message output to test.logs .
adb logcat -g Prints the size of the specified log buffer and exits.
adb logcat -n <count> Sets the maximum number of rotated logs to <count>.
dumpsys
转储系统数据
adb shell dumpsys [选项]
adb shell dumpsys
adb shell dumpsys meminfo
adb shell dumpsys battery
备注:一部已启用开发者选项、运行 Android 5.0 或更高版本的移动设备。
adb shell dumpsys batterystats collects battery data from your device
备注:Battery Historian 将数据转换成 HTML 可视化。步骤 1 adb shell dumpsys batterystats > batterystats.txt 步骤 2 python historian.py batterystats.txt > batterystats.html
adb shell dumpsys batterystats --reset erases old collection data
adb shell dumpsys activity
备份
使用adb从安卓设备中备份。
adb backup [-apk] [-shared] [-system] [-all] -f file.backup
# -apk -- Include APK from Third partie's applications
# -shared -- Include removable storage
# -system -- Include system Applciations
# -all -- Include all the applications
adb shell pm list packages -f -3 #List packages
adb backup -f myapp_backup.ab -apk com.myapp # backup on one device
adb restore myapp_backup.ab # restore to the same or any other device
如果您想检查备份的内容:
( printf "\x1f\x8b\x08\x00\x00\x00\x00\x00" ; tail -c +25 myapp_backup.ab ) | tar xfvz -
从零开始学习AWS黑客攻击直至成为专家,通过 htARTE (HackTricks AWS Red Team Expert)!
支持HackTricks的其他方式:
- 如果您希望在HackTricks中看到您的公司广告或下载HackTricks的PDF版本,请查看订阅计划!
- 获取官方PEASS & HackTricks商品
- 发现PEASS家族,我们独家的NFTs系列
- 加入 💬 Discord群组或telegram群组或在Twitter 🐦 上关注我 @carlospolopm。
- 通过向 HackTricks 和 HackTricks Cloud github仓库提交PR来分享您的黑客技巧。