Application of mobile app security in penetration testing

Source: Internet
Author: User
Tags app service zip extension

Http://netsecurity.51cto.com/art/201403/433726_all.htm

In the past, security enthusiasts often studied the local security of the app, such as remote control, application cracking, information stealing, and so on, most of them have not paid attention to the security of the app server, so there are so many security loopholes.

Mobile apps mostly interact with the server through Web API services, a pattern that binds mobile security to web security. Mobile app in the way of Web services to interact with the service side, the server is also a display information site, common Web vulnerabilities in this also exist, such as SQL injection, file upload, middleware/server vulnerability, etc., but because some apps are not directly embedded in the Web page in the app, Instead, the API interface is used to return JOSN data, causing the scanner crawler to not crawl the link.

It's the embarrassing thing about the encyclopedia. List of embarrassing things, contet field content is irrelevant to me-_-| | |

Then I try to find the app Server vulnerability, the two methods currently thought:

1. Anti-compilation app 2.http[s] Agent grab Bag

Then someone should ask questions, these two ways to get the link is fragmented, also not good to find loopholes ah, my side of the use of the way is to put all the crawl link directly to the Multi-engine Web vulnerability scanner, scanner can be batch scan SQL injection and so on, in addition to these vulnerabilities, there are a lot of information available.

First, anti-compilation app

There are two kinds of anti-compilation methods, Dex2jar and Apktool, two tools to decompile the effect is not the same, Dex2jar decompile the Java source code, Apktool decompile the Java assembly code.

1. Dex2jar Anti-compilation

Tool: Dex2jar+jdgui

Method:

A. Modify apk to zip extension

B. Extract the Classes.dex file

C. Using Dex2jar to Decompile (Dex2jar.bat classes.dex)

Finally decompile the source code such as. Although some classes are proguard.cfg confused by configuration, they are still available.

2. Apktool Anti-compilation

Tool: Apktool

This tool is relatively simple, directly (Apktool D apkfile) can decompile the apk file, decompile things for Smali disassembly code, RES resource file, assets configuration file, Lib library file, We can search directly for Smali files and resource files to find links and so on.

Use the app to find your website real IP

In addition to the app service side of the vulnerability, there is a more fun way to use, through the collection of sub-domain IP in the app to find the real IP of the target site, according to experience, most of the app's interface is not using services such as CDN.

Embarrassing Encyclopedia Real IP

Second, Http[s] agent grab Bag

This method uses the agent on the mobile device to interact with the server through manual operation.

Steps:

A. On the capture machine to open the agent, testing can be used burp, need to automate the submission of the scan task can write their own agent, mobile device settings proxy server.

B. To operate the app on a mobile device, the agent-side crawl is as follows.

Summarize:

The whole idea has been very clear, then actually to do is to let this process automation, anti-compilation after a problem, the URL is not necessarily complete, many URLs are stitching up, I try to write a set of analysis engine, automated anti-compilation, and then through the analysis of the source code, stitching the full API URL, and then the vulnerability scan.

Is a dome, ready to be written in Python and put on the server.

Application of mobile app security in penetration testing

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.