Skip to content

Instantly share code, notes, and snippets.

@thevillagehacker
Created March 23, 2021 06:00
Show Gist options
  • Star 15 You must be signed in to star a gist
  • Fork 1 You must be signed in to fork a gist
  • Save thevillagehacker/4d44572180d8baf220fad168a3bc1d08 to your computer and use it in GitHub Desktop.
Save thevillagehacker/4d44572180d8baf220fad168a3bc1d08 to your computer and use it in GitHub Desktop.

Android Pentesting

Android Pentesting Sources from Hacking articles

Oneliner to extract url from apk

apktool -d com.uber -o uberAPK; grep -Phro "(https?://)[\w\,-/]+[\"\']" uberAPK/ | sed 's#"##g' | anew | grep -v "w3\|android\|github\|schemes.android\|google\|goo.gl"

Looking for an easy way to open arbitrary URLs in Android apps?

  1. Download jadx decompiler and install adb
  2. Open AndroidManifest.xml
  3. Find all browser activities (must contain )
  4. Run "adb shell am start -n app_package_name/component_name -a android.intent.action.VIEW -d http://google.com" for each of the activities (or any of your domains). Also track in Burp any requests to http://google.com or your domain
  5. If a domain is opened, it means you found a vulnerability! Now inspect the request if it contains any auth tokens (if yes, it means you've got an account takeover!). No? Try different techniques to obtain any PII. In the worst case you will get a reward like for an XSS
  6. If you can just open arbitrary links in an app. And use http://google.com (remove the space) in the 4 step.

SSL Pinning via Frida

TikTok Click RCE

Android Reverse Engineering

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment