📘
Hacktricks
  • GitHub: Welcome to the page where you will find each trick/technique/whatev
  • About the author
  • Getting Started in Hacking
  • Pentesting Methodology
  • External Recon Methodology
  • Phishing Methodology
  • Exfiltration
  • Tunneling and Port Forwarding
  • Brute Force - CheatSheet
  • Search Exploits
  • shells
    • Shells (Linux, Windows, MSFVenom)
  • linux-unix
    • Checklist - Linux Privilege Escalation
    • Linux Privilege Escalation
    • Useful Linux Commands
    • Linux Environment Variables
  • macos
    • MacOS Security & Privilege Escalation
  • windows
    • Checklist - Local Windows Privilege Escalation
    • Windows Local Privilege Escalation
    • Active Directory Methodology
    • NTLM
    • Stealing Credentials
    • Authentication, Credentials, UAC and EFS
    • Basic CMD for Pentesters
    • Basic PowerShell for Pentesters
    • AV Bypass
  • mobile-apps-pentesting
    • Android APK Checklist
    • Android Applications Pentesting
    • iOS Pentesting Checklist
    • iOS Pentesting
  • pentesting
    • Pentesting Network
  • Stargazers
  • blob
    • master
      • hacktricks/LICENSE.md at master
  • network
    • Forks
  • Issues
  • Pull requests
  • Actions
  • Projects
  • GitHub: Welcome to the page where you will find each trick/technique/whatev
  • Build software better, together
  • Pulse
  • tree
    • Build software better, together
    • GitHub at 1e46f267c2ce5c79bb9a8a146f468f214419f708
    • master
      • .gitbook
        • hacktricks/.gitbook/assets at master
      • hacktricks/.github at master
      • a.i.-exploiting
        • hacktricks/a.i.-exploiting/bra.i.nsmasher-presentation at master
      • hacktricks/backdoors at master
      • hacktricks/blockchain at master
      • hacktricks/cloud-security at master
  • Branches
  • Releases
  • Commits
    • Commits
  • Commits
  • commit
    • GitBook: [master] one page modified@1e46f26
    • GitBook: [master] 3 pages and 6 assets modified@e741d40
    • Update FUNDING.yml@c7e5a37
    • GitBook: [master] one page modified@5b5b28a
    • GitBook: [master] 511 pages and one asset modified@73a4b96
Powered by GitBook
On this page

Was this helpful?

  1. mobile-apps-pentesting

Android APK Checklist

Previousmobile-apps-pentestingNextAndroid Applications Pentesting

Last updated 3 years ago

Was this helpful?

Do you use Hacktricks every day? Did you find the book very useful? Would you like to receive extra help with cybersecurity questions? Would you like to find more and higher quality content on Hacktricks? so we can dedicate more time to it and also get access to the Hacktricks private group where you will get the help you need and much more!

If you want to know about my latest modifications/additions or you have any suggestion for HackTricks or PEASS, join the ​, or follow me on Twitter ​. If you want to share some tricks with the community you can also submit pull requests to that will be reflected in this book and don't forget to give ⭐ on github to motivate me to continue developing this book.

  • Check for the use of , checks for noting if the mobile was rooted, if an emulator is being used and anti-tampering checks. .

  • Sensitive applications (like bank apps) should check if the mobile is rooted and should actuate in consequence.

  • Search for (passwords, URLs, API, encryption, backdoors, tokens, Bluetooth uuids...).

    • Special attention to APIs.

  • ​​

    • Check if the application is in debug mode and try to "exploit" it

    • Check if the APK allows backups

    • Exported Activities

    • Content Providers

    • Exposed services

    • Broadcast Receivers

    • URL Schemes

  • All the libraries compiled using the PIE flag?

  • Don't forget that there is a bunch of that can help you a lot during this phase.

  • Prepare the environment (, )

  • Is there any (logging, copy/paste, crash logs)?

  • ​​

    • This one is really important, because if you can capture the HTTP traffic you can search for common Web vulnerabilities (Hacktricks has a lot of information about Web vulns).

  • Check for possible (probably some static code analysis will help here)

  • ​: Just Frida, use it to obtain interesting dynamic data from the application (maybe some passwords...)

Some obfuscation/Deobfuscation information

​

Last updated 4 months ago

If you want to know about my latest modifications/additions or you have any suggestion for HackTricks or PEASS, join the , or follow me on Twitter ​. If you want to share some tricks with the community you can also submit pull requests to that will be reflected in this book. Don't forget to give ⭐ on the github to motivate me to continue developing this book.

​​

Support Hacktricks through github sponsors
💬
telegram group
🐦
@carlospolopm
https://github.com/carlospolop/hacktricks
obfuscation
Read this for more info
interesting strings
firebase
Read the manifest:
static Android Analyzers
online
local VM or physical
unintended data leakage
Inspect HTTP/HTTPS traffic
Android Client Side Injections
Frida
💬
PEASS & HackTricks telegram group here
🐦
@carlospolopm
https://github.com/carlospolop/hacktricks
Buy me a coffee here