Android APK Checklist
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Check for the use of obfuscation, checks for noting if the mobile was rooted, if an emulator is being used and anti-tampering checks. Read this for more info.
Sensitive applications (like bank apps) should check if the mobile is rooted and should actuate in consequence.
Search for interesting strings (passwords, URLs, API, encryption, backdoors, tokens, Bluetooth uuids...).
Special attention to firebase APIs.
Check if the application is in debug mode and try to "exploit" it
Check if the APK allows backups
Exported Activities
Content Providers
Exposed services
Broadcast Receivers
URL Schemes
Is the application saving data insecurely internally or externally?
Is there any password hard coded or saved in disk? Is the app using insecurely crypto algorithms?
All the libraries compiled using the PIE flag?
Don't forget that there is a bunch of static Android Analyzers that can help you a lot during this phase.
Prepare the environment (online, local VM or physical)
Is there any unintended data leakage (logging, copy/paste, crash logs)?
Is the application transmitting information in clear text/using weak algorithms? is a MitM possible?
This one is really important, because if you can capture the HTTP traffic you can search for common Web vulnerabilities (Hacktricks has a lot of information about Web vulns).
Check for possible Android Client Side Injections (probably some static code analysis will help here)
Frida: Just Frida, use it to obtain interesting dynamic data from the application (maybe some passwords...)
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)