Android APK Checklist
Last updated
Last updated
If you want to know about my latest modifications/additions or you have any suggestion for HackTricks or PEASS, join the , or follow me on Twitter . If you want to share some tricks with the community you can also submit pull requests to **[) **that will be reflected in this book. Don't forget to give ⭐ on the github** to motivate me to continue developing this book.
Sensitive applications (like bank apps) should check if the mobile is rooted and should actuate in consequence.
Check if the application is in debug mode and try to "exploit" it
Check if the APK allows backups
Exported Activities
Content Providers
Exposed services
Broadcast Receivers
URL Schemes
All the libraries compiled using the PIE flag?
This one is really important, because if you can capture the HTTP traffic you can search for common Web vulnerabilities (Hacktricks has a lot of information about Web vulns).
Check for the use of , checks for noting if the mobile was rooted, if an emulator is being used and anti-tampering checks. .
Search for (passwords, URLs, API, encryption, backdoors, tokens, Bluetooth uuids...).
Special attention to APIs.
Is the application s?
Is there any ? Is the app ?
Don't forget that there is a bunch of that can help you a lot during this phase.
Prepare the environment (, )
Is there any (logging, copy/paste, crash logs)?
?
?
?
?
?
Is the application ? is a MitM possible?
Check for possible (probably some static code analysis will help here)
: Just Frida, use it to obtain interesting dynamic data from the application (maybe some passwords...)
If you want to know about my latest modifications/additions or you have any suggestion for HackTricks or PEASS, join the , or follow me on Twitter . If you want to share some tricks with the community you can also submit pull requests to **[) **that will be reflected in this book. Don't forget to give ⭐ on the github** to motivate me to continue developing this book.
****