Android-Architecture
Intro-To-Mobile-Pentesting
Youtube Videos In English :
BitsPlease
Insider Learners
Hacking Simplified
Youtube Videos In Hindi :
Fortify Solutions
Ubaid Ahmed
Android Security Internals An In-Depth Guide to Android's Security Architecture
Learning Pentesting for Android Devices A practical guide
Android Security Attacks and Defenses
Android SSL Pinning Bypass
Testing-Frida
Testing-Drozer
ADB-Command-Cheatsheet
Automated-Analysis-Using-MobSF
Testing-Webview-Attacks
Deep-Link-Exploitation
https://apk-dl.com/
https://en.uptodown.com/
https://en.aptoide.com/
https://www.apkmirror.com/
https://f-droid.org/en/
https://en.softonic.com/
https://androidapksfree.com/
Appie
Appie Framework is a popular open-source framework used for Android application penetration testing. It provides a comprehensive, self-contained environment specifically designed to facilitate testing of Android applications
This repository provides a comprehensive guide on how to use the Objection tool for mobile security testing. Objection is a runtime mobile exploration toolkit, powered by Frida, designed to help penetration testers assess the security of mobile applications without requiring a jailbreak or root access.
Introduction
Features
Installation
Prerequisites
Installing Objection
Basic Usage
Starting Objection
Common Commands
Advanced Usage
Bypassing SSL Pinning
Interacting with the File System
Manipulating Application Data
Troubleshooting
Contributing
License
Objection is a powerful tool that allows security researchers to explore and test the security of mobile applications at runtime. It provides an easy-to-use interface for tasks like bypassing SSL pinning, manipulating application data, exploring the file system, and much more. Objection is particularly useful because it works on both Android and iOS devices without the need for root or jailbreak.
Bypass SSL Pinning: Easily disable SSL pinning in mobile apps to intercept network traffic.
File System Exploration: Access and manipulate the file system of the mobile app at runtime.
Runtime Manipulation: Modify application behavior and data while the app is running.
Cross-Platform: Supports both Android and iOS devices.
Before installing Objection, ensure that you have the following installed on your system:
Python 3.x: Objection is a Python-based tool and requires Python 3.x to run.
Frida: Objection uses Frida under the hood. You can install Frida using pip:
pip install frida-tools
ADB (Android Debug Bridge): Required for interacting with Android devices.
You can install Objection using pip:
pip install objection
After installation, verify that Objection is installed correctly by running:
objection --help
To start using Objection with a mobile application, first ensure that the app is running on the device. Then, launch Objection using the following command:
objection -gexplore
Replace
with the actual package name of the mobile app (e.g., com.example.app
).
Bypass SSL Pinning:
android sslpinning disable
This command disables SSL pinning, allowing you to intercept HTTPS traffic.
Explore the File System:
android fs ls /
Lists the files and directories in the root directory of the app's file system.
Dumping SQLite Databases:
android sqlite list android sqlite dump
Lists and dumps the contents of SQLite databases used by the app.
Inspecting Keychain/Shared Preferences:
android prefs list ios keychain dump
Lists and dumps shared preferences on Android or keychain data on iOS.
Objection makes it easy to bypass SSL pinning in mobile applications, which is useful for intercepting and analyzing HTTPS traffic during security assessments. Simply use the following command:
android sslpinning disable
You can explore and manipulate the file system of the app directly from the Objection command line:
List Files:
android fs ls /data/data/com.example.app/files/
Download a File:
android fs download /data/data/com.example.app/files/secret.txt
Objection allows you to modify the data used by the app at runtime:
Change the Value of a Variable:
android hooking set class_variable com.example.app.ClassName variableName newValue
Trigger a Function:
android hooking call com.example.app.ClassName methodName arg1,arg2
Objection Not Connecting: Ensure that your device is properly connected via USB and that ADB is running for Android devices. For iOS, ensure that Frida is correctly installed on the device.
SSL Pinning Not Disabled: Some apps may implement SSL pinning in ways that are resistant to Objection's default bypass method. In such cases, you may need to use custom Frida scripts.
workbook.securityboat.in
book.hacktricks.xyz
blog.softwaroid.com
xmind.app
hackinarticles
InsecureShopApp : https://www.insecureshopapp.com GitHub : https://github.com/hax0rgb/InsecureShop
Allsafe
InjuredAndroid
HpAndro1337
KGB_Messenger
More about android mobile CTF chalenges : Awesome-Mobile-CTF
Android-Security & Malware
Youtube