Aseem Shrey Profile picture
Feb 18 11 tweets 9 min read
7 Things To Get Started With Android Pentesting :

A Thread 🧵👇
1️⃣ Get the APK
Download from :
apkpure.com
apkmirror.com
aptoide.en.aptoide.com
en.uptodown.com/android
apps.evozi.com/apk-downloader/ (Downloads from PlayStore)
Note: These are 3rd party sites, hence, install only on your testing device/emulator.
↪ Get apk from your own device using android adb :

Find app in PlayStore using a 'browser'. URL of the app contains the package name.

1. Connect your device to your laptop.
2. Enable 'USB debugging' on your device

Run the commands : stackoverflow.com/a/18003462
2️⃣ Decompile the APK

Use the following tools :
1. apktool - ibotpeaches.github.io/Apktool/instal…
Command : apktool d app.apk
Decompiles to folder.

2. jadx - github.com/skylot/jadx
Command : jadx-gui app.apk
Decompiles in GUI
3️⃣ Setup Emulator/Device

1. Rooted device - Use Magisk with it's modules for awesome features like hide root status from other apps, specially financial apps github.com/topjohnwu/Magi…

2. Genymotion - Smoothest emulator
blog.yeswehack.com/yeswerhackers/…
→ Setting up genymotion video :

→ Install BURP cert on the device : portswigger.net/support/instal…
4️⃣ Static Analysis of the app

2. mobileAudit - github.com/mpast/mobileAu…
3. Deobfuscating Apps :
- apk-deguard.com
- github.com/Gyoonus/deoptf…
1. MobSF - github.com/MobSF/Mobile-S…
5️⃣ Dynamic Analysis of app

1. MobSF - github.com/MobSF/Mobile-S…
2. qark - github.com/linkedin/qark
3. frida - frida.re ⬅ Very crucial in complex android app testing, decrypting strings, in-memory strings etc
4. Objection - github.com/sensepost/obje… ⬅ SSL Unpinning
6️⃣ Getting started resources :

1. Detailed blog : infosecwriteups.com/android-app-se…
2. Mobile App Pentesting Series : youtube.com/playlist?list=…
3. github.com/B3nac/Android-…
4. Infosec android writeups - infosecwriteups.com/tagged/android
5. h1 android writeups - infosecwriteups.com/hacker101-ctf-…
For the whole Mobile App Pentesting Series, subscribe here : youtube.com/playlist?list=…

✌️😀

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Aseem Shrey

Aseem Shrey Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @AseemShrey

Jun 17, 2021
Android Hacking | Deeplink Issues | What, Why & How

➤ What, Why, How of Deeplink ?
➤ Hacking Deeplinks - Insecure URL Validation
➤ Finding, exploiting and fixing them
➤ Demo

#android #hacking #bugbounty #hackingsimplified
🧵👇
1. What's a Deeplink ?

In context of mobile apps, deeplinks are URLs that send users to a certain point in the app.

For example : If you click this :

fb://profile/100009566573630

It would open my facebook profile on your FB mobile app.

Hosted Link : bl.ocks.org/LuD1161/raw/1c… Image
2. Why are they used ?

Increase user engagement on the app.

e.g. Email Marketing
A company can have their deeplink URIs sent in emails and would want to redirect users into the app from there.

Detailed Read : clevertap.com/blog/5-reasons…
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

:(