Index
A
- active traffic analysis
- about / Active analysis
- performing / Active analysis
- Activities, Android application
- about / Android application teardown
- Activity Manager
- about / Android startup process
- ADB
- about / Android Debug Bridge
- using / Android Debug Bridge
- adb
- about / Digging deeper into Android
- adb daemon (adbd) / Android startup process
- adb pull command / Using dd to extract data
- adb shell
- about / Digging deeper into Android
- Address Space Layout Randomization (ASLR) / Simple stack-based buffer overflow
- ad libraries vulnerabilities
- about / Vulnerabilities in ad libraries
- ADT bundle
- AFLogical
- about / Using AFLogical to extract contacts, calls, and text messages
- downloading / Using AFLogical to extract contacts, calls, and text messages
- used, for extracting key components from device / Using AFLogical to extract contacts, calls, and text messages
- Andriller
- about / Using Andriller to extract an application's data
- used, for extracting app data / Using Andriller to extract an application's data
- Android
- architecture / Introduction to Android
- security / Introduction to Android
- libc / Introduction to Android
- bionic / Introduction to Android
- permission model / Sandboxing and the permission model
- application signing / Application signing
- startup process / Android startup process
- WebView vulnerability / Android WebView vulnerability
- Android application
- about / Android application teardown
- files and folders / Android application teardown
- Activities / Android application teardown
- Services / Android application teardown
- Broadcast Receivers / Android application teardown
- Shared Preferences / Android application teardown
- Intents / Android application teardown
- Content providers / Android application teardown
- reversing, Apktool used / Using Apktool to reverse an Android application
- auditing / Auditing Android applications
- analyzing, SQLite used / Analyzing a simple application using SQLite
- Android architecture
- about / Introduction to Android
- Hardware Abstraction Layer / Introduction to Android
- Android Platform Stack / Introduction to Android
- Surface Manager library / Introduction to Android
- Media Framework library / Introduction to Android
- SQLite library / Introduction to Android
- WebKit library / Introduction to Android
- OpenGL library / Introduction to Android
- graphical representation / Introduction to Android
- Android attacks
- WebView vulnerability / Android WebView vulnerability
- infected legitimate APKs / Infecting legitimate APKs
- ad libraries vulnerabilities / Vulnerabilities in ad libraries
- XAS vulnerability / Cross-Application Scripting in Android
- Android exploitation
- ARM architecture / Introduction to ARM architecture
- environment, setting up / Setting up the environment
- simple stack-based buffer overflow / Simple stack-based buffer overflow
- return-oriented programming / Return-oriented programming
- root exploits / Android root exploits
- Android exploits
- Exploid / Android root exploits
- Gingerbreak / Android root exploits
- RageAgainstTheCage / Android root exploits
- Zimperlich / Android root exploits
- KillingInTheNameOf / Android root exploits
- Android filesystem partitions
- about / Android filesystem partitions
- AndroidManifest.xml
- Android Package (APK)
- about / Digging deeper into Android
- Android Pentest
- development environment, setting up / Setting up the development environment
- useful utilities / Useful utilities for Android Pentest
- ADB / Android Debug Bridge
- Burp Suite / Burp Suite
- APKTool / APKTool
- Android Runtime
- Core Libraries / Introduction to Android
- Dalvik Virtual Machine / Introduction to Android
- Android SDK
- about / Digging deeper into Android
- Android traffic interception
- about / Android traffic interception
- Android virtual device
- creating / Creating an Android virtual device
- APKTool
- about / APKTool
- downloading / APKTool
- configuring / APKTool, Using Apktool to reverse an Android application
- used, for reversing Android application / Using Apktool to reverse an Android application
- app data
- extracting, Andriller used / Using Andriller to extract an application's data
- extracting, AFLogical used / Using AFLogical to extract contacts, calls, and text messages
- extracting, backup used / Using backup to extract an application's data
- application databases
- dumping manually / Dumping application databases manually
- application signing
- about / Application signing
- ARM architecture
- about / Introduction to ARM architecture
- general purpose registers / Introduction to ARM architecture
- Stack Pointer (SP) / Introduction to ARM architecture
- Link Register (LR) / Introduction to ARM architecture
- Program Counter (PC) / Introduction to ARM architecture
- execution modes / Execution modes
- Attify's Vulnerable App sample pentest report
- about / Attify's Vulnerable App
B
- backup
- used, for extracting app data / Using backup to extract an application's data
- bionic / Introduction to Android
- bootup process
- working / Android startup process
- about / Android startup process
- Bouncy Castle / Other ways to intercept SSL traffic
- Broadcast Receiver
- about / Android startup process
- Broadcast Receivers, Android application
- about / Android application teardown
- Broken Cryptography vulnerability / OWASP top 10 vulnerabilities for mobiles
- BrowserActivity
- build.prop file / Android startup process
- burp proxy
- about / Burp Suite
- Burp Suite
- about / Burp Suite
- proxy settings, configuring / Burp Suite
- BusyBox App
- installing / Using dd to extract data
C
- CA signing / Application signing
- Charles Proxy
- client-side attacks
- about / Client-side injection attacks
- Client Side Injection vulnerability / OWASP top 10 vulnerabilities for mobiles
- ClockwordMod Recovery image
- Complex Instruction Set Computing (CISC) / Introduction to ARM architecture
- content provider
- using / Content provider leakage
- defining / Content provider leakage
- Content providers, Android application
- about / Android application teardown
- custom recovery image
- about / Using a custom recovery image
- using / Using a custom recovery image
- CyanogenMod / Using a custom recovery image
D
- .dex file
- about / Reversing an Android application
- Dalvik Virtual Machine
- about / Introduction to Android
- DashO / OWASP top 10 vulnerabilities for mobiles
- dd utility
- about / Using dd to extract data
- used, for extracting data / Using dd to extract data
- development environment, Android Pentesting
- setting up / Setting up the development environment
- device rooting / Digging deeper into Android
- dex2jar tool
- used, for reversing Android application / Reversing an Android application
- downloading / Reversing an Android application
- dmesg / Logging the logcat
- Dolphin browser HD
- Drozer application / Content provider leakage
E
- emulator
- execution modes, ARM
- ARM mode / Execution modes
- Thumb mode / Execution modes
- Exploid / Android root exploits
F
- filesystem
- about / Filesystems
- fine-grained permission model
- forensics
- about / Types of forensics
- logical acquisition / Types of forensics
- physical acquisition / Types of forensics
G
- getprop / Logging the logcat
- Gingerbreak / Android root exploits
- GitHub repo
- Google Bouncer / Application signing
- Group ID (GID)
H
- HTTPS Proxy interception
- proxy, setting up in Firefox / HTTPS Proxy interception
- performing / HTTPS Proxy interception
I
- IEF
- Improper Session Handling vulnerability / OWASP top 10 vulnerabilities for mobiles
- inet group
- infected legitimate APKs
- about / Infecting legitimate APKs
- Insecure Data Storage vulnerability / OWASP top 10 vulnerabilities for mobiles
- insecure file storage
- about / Insecure file storage
- vulnerability, checking / Insecure file storage
- path traversal vulnerability / Path traversal vulnerability or local file inclusion
- local file inclusion / Path traversal vulnerability or local file inclusion
- client-side injection attacks / Client-side injection attacks
- Insufficient Transport Layer Protection vulnerability / OWASP top 10 vulnerabilities for mobiles
- Intents, Android application
- about / Android application teardown
J
- .jar file
- about / Reversing an Android application
- jarsigner / Application signing
- Java Development Kit (JDK)
- downloading / Setting up the development environment
- installing / Setting up the development environment
- Java Virtual Machine
- about / Introduction to Android
- JD-GUI
- URL / Reversing an Android application
- downloading / Reversing an Android application
- installing / Reversing an Android application
K
- keytool / Application signing
- KillingInTheNameOf / Android root exploits
L
- Lack of Binary Protections vulnerability / OWASP top 10 vulnerabilities for mobiles
- libc / Introduction to Android
- Linux kernel / Introduction to Android
- logcat / Android Debug Bridge
- logging / Logging the logcat
- dump, capturing / Logging the logcat
- using / Logging the logcat
- logical acquisition, forensics / Types of forensics
M
- MITMProxy
- MonkeyRunner / Android Debug Bridge
N
- NetworkMiner
O
- OWASP
- OWASP mobile project
- security issues / OWASP top 10 vulnerabilities for mobiles
- OWASP top 10 guide for mobile
- OWASP vulnerability
- Weak Server Side Controls / OWASP top 10 vulnerabilities for mobiles
- Insecure Data Storage / OWASP top 10 vulnerabilities for mobiles
- Unintended Data Leakage / OWASP top 10 vulnerabilities for mobiles
- poor Authorization and Authentication / OWASP top 10 vulnerabilities for mobiles
- Broken Cryptography / OWASP top 10 vulnerabilities for mobiles
- Client Side Injection / OWASP top 10 vulnerabilities for mobiles
- Security Decisions Via Untrusted Inputs / OWASP top 10 vulnerabilities for mobiles
- Improper Session Handling / OWASP top 10 vulnerabilities for mobiles
- Lack of Binary Protections / OWASP top 10 vulnerabilities for mobiles
- Oxygen Suite
P
- passive traffic analysis
- performing / Passive analysis
- path traversal vulnerability
- penetrat report
- about / Basics of a penetration testing report
- writing / Writing the pentest report
- executive summary / Executive summary
- vulnerabilities / Vulnerabilities
- scope of the work / Scope of the work
- tools used / Tools used
- methodologies, testing / Testing methodologies followed
- recommendations / Recommendations
- conclusion / Conclusion
- appendix / Appendix
- physical acquisition, forensics / Types of forensics
- pipelining / Introduction to ARM architecture
- Poor Authorization and Authentication vulnerability / OWASP top 10 vulnerabilities for mobiles
- ProGuard / OWASP top 10 vulnerabilities for mobiles
- ps
- about / Digging deeper into Android
Q
- QEMU / Setting up the environment
R
- RageAgainstTheCage / Android root exploits
- Reduced Instruction Set Computing (RISC) / Introduction to ARM architecture
- return-oriented programming (ROP)
- about / Return-oriented programming
- root exploits
- about / Android root exploits
S
- sandboxing
- security
- about / Introduction to Android
- Security Decisions Via Untrusted Inputs vulnerability / OWASP top 10 vulnerabilities for mobiles
- security vulnerability, SQLite
- about / Security vulnerability
- sensitive files
- extracting, from traffic data / Extracting sensitive files with packet capture
- Services, Android application
- about / Android application teardown
- Shared Preferences, Android application
- about / Android application teardown
- Sieve / Client-side injection attacks
- simple stack-based buffer overflow
- smali / Using Apktool to reverse an Android application
- SQLite
- used, for analyzing Android application / Analyzing a simple application using SQLite
- security vulnerability / Security vulnerability
- sqlite3 / Analyzing a simple application using SQLite
- SSL Traffic interception
- performing / Other ways to intercept SSL traffic
- su mode / Digging deeper into Android
T
- tcpdump / Passive analysis
- The Sleuth Kit (TSK)
- traffic analysis, Android devices
- Android traffic interception / Android traffic interception
- ways / Ways to analyze Android traffic
- Passive analysis / Ways to analyze Android traffic
- Active analysis / Ways to analyze Android traffic
- HTTPS Proxy interception / HTTPS Proxy interception
U
- Uniform Resource Identifier (URI) / Content provider leakage
- Unintended Data Leakage vulnerability / OWASP top 10 vulnerabilities for mobiles
- User ID (UID)
- about / Digging deeper into Android
V
- Virtuous Ten Studio (VTS) / Using Apktool to reverse an Android application
- volume daemon (vold) / Android startup process
W
- WebView
- about / Android WebView vulnerability
- using, in Android app / Using WebView in the application
- WebView vulnerability
- about / Android WebView vulnerability
- identifying / Identifying the vulnerability
- man-in-the-middle attack / Identifying the vulnerability
- Wireshark
- URL / Passive analysis
- about / Passive analysis
- used, for extracting files from traffic data / Extracting sensitive files with packet capture
- workspace
X
- XAS vulnerability
- XDA-Developers forum
Y
- Yet Another Flash File System 2 (YAFFS2) / Types of forensics
Z
- Zimperlich / Android root exploits
- Zygote
- about / Android startup process