Android Penetration Testing Part 8

A presentation at Android Penetration Testing Part 8 in March 2022 in India by Raja Nagori

Slide 1

Slide 1

Android Application Penetration Testing Raja Nagori

Slide 2

Slide 2

Static Analysis

Slide 3

Slide 3

• Extension is .xml • You’ll get basic information about the application • SDK version Android manifest file • Permission • Activities • Content Providers • Intent

Slide 4

Slide 4

• Doesn’t have any extension unfortunately • It defines what data and hardware component can be need at the runtime • Camera Permission • Internet • Access external storage • Bluetooth • ETC.

Slide 5

Slide 5

• It also do not have any extension too • UI element of the application or different screen in the application. (take example of Gpay) • First screen will show you Gpay Logo. Activities • Second will ask you the Fingerprint. • Third will display all the payment you did in past. NOTE: 1. Here INTENT is changing from one screen to other. 2. If you see exported=“True”

Slide 6

Slide 6

• Usually find in resources/strings.xml • Threat Vector Finding Hardcoded Strings • Login Bypass • URL’s Exposed • API Keys Exposed • Firebase URL’s

Slide 7

Slide 7

See you on next chapter of this series