featured.webp
Table of Contents

Android Pentesting

Android Pentesting Sources from Hacking articles

Oneliner to extract url from apk

apktool -d com.uber -o uberAPK; grep -Phro "(https?://)[\w\,-/]+[\"\']" uberAPK/ | sed 's#"##g' | anew | grep -v "w3\|android\|github\|schemes.android\|google\|goo.gl"

Looking for an easy way to open arbitrary URLs in Android apps?

  1. Download jadx decompiler and install adb
  2. Open AndroidManifest.xml
  3. Find all browser activities (must contain )
  4. Run “adb shell am start -n app_package_name/component_name -a android.intent.action.VIEW -d http://google.com” for each of the activities (or any of your domains). Also track in Burp any requests to http://google.com or your domain
  5. If a domain is opened, it means you found a vulnerability! Now inspect the request if it contains any auth tokens (if yes, it means you’ve got an account takeover!). No? Try different techniques to obtain any PII. In the worst case you will get a reward like for an XSS
  6. If you can just open arbitrary links in an app. And use http://google.com (remove the space) in the 4 step.

SSL Pinning via Frida

TikTok Click RCE

Android Reverse Engineering