React Native Application

Support HackTricks

Uchambuzi wa Programu ya React Native

Ili kuthibitisha kama programu ilijengwa kwenye mfumo wa React Native, fuata hatua hizi:

  1. Badilisha jina la faili la APK kwa kiambishi cha zip na uondoe kwenye folda mpya kwa kutumia amri cp com.example.apk example-apk.zip na unzip -qq example-apk.zip -d ReactNative.

  2. Tembea kwenye folda mpya iliyoundwa ya ReactNative na pata folda ya mali. Ndani ya folda hii, unapaswa kupata faili index.android.bundle, ambayo ina JavaScript ya React katika muundo wa minified.

  3. Tumia amri find . -print | grep -i ".bundle$" kutafuta faili la JavaScript.

Ili kuchambua zaidi msimbo wa JavaScript, tengeneza faili lililo na jina index.html katika saraka hiyo hiyo lenye msimbo ufuatao:

<script src="./index.android.bundle"></script>

You can upload the file to https://spaceraccoon.github.io/webpack-exploder/ or follow these steps:

  1. Fungua faili la index.html katika Google Chrome.

  2. Fungua Developer Toolbar kwa kubonyeza Command+Option+J kwa OS X au Control+Shift+J kwa Windows.

  3. Bonyeza "Sources" katika Developer Toolbar. Unapaswa kuona faili la JavaScript ambalo limegawanywa katika folda na faili, likiunda bundle kuu.

If you find a file called index.android.bundle.map, you will be able to analyze the source code in an unminified format. Map files contain source mapping, which allows you to map minified identifiers.

To search for sensitive credentials and endpoints, follow these steps:

  1. Tambua maneno muhimu nyeti ili kuchambua msimbo wa JavaScript. Programu za React Native mara nyingi hutumia huduma za watu wengine kama Firebase, AWS S3 service endpoints, funguo za kibinafsi, n.k.

  2. Katika kesi hii maalum, programu ilionekana ikitumia huduma ya Dialogflow. Tafuta muundo unaohusiana na usanidi wake.

  3. Ilikuwa na bahati kwamba akreditif nyeti zilizowekwa kwa mikono zilipatikana katika msimbo wa JavaScript wakati wa mchakato wa recon.

References

Support HackTricks

Last updated