hacktricks/mobile-pentesting/android-app-pentesting/android-applications-basics.md

474 lines
34 KiB
Markdown
Raw Permalink Normal View History

2022-04-29 01:27:22 +02:00
# Android Applications Basics
2022-04-28 18:01:33 +02:00
<details>
2023-04-25 20:35:28 +02:00
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></a> - <a href="https://www.youtube.com/@hacktricks_LIVE"><strong>🎥 Youtube 🎥</strong></a></summary>
2022-04-28 18:01:33 +02:00
2022-09-09 13:57:02 +02:00
* Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
* Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
* Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
* **Join the** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** [**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/hacktricks\_live)**.**
2023-01-02 13:00:18 +01:00
* **Share your hacking tricks by submitting PRs to the** [**hacktricks repo**](https://github.com/carlospolop/hacktricks) **and** [**hacktricks-cloud repo**](https://github.com/carlospolop/hacktricks-cloud).
2022-04-28 18:01:33 +02:00
</details>
2023-09-03 01:51:32 +02:00
<figure><img src="/.gitbook/assets/image (675).png" alt=""><figcaption></figcaption></figure>
2022-10-28 01:22:18 +02:00
2023-09-03 01:48:41 +02:00
Find vulnerabilities that matter most so you can fix them faster. Intruder tracks your attack surface, runs proactive threat scans, finds issues across your whole tech stack, from APIs to web apps and cloud systems. [**Try it for free**](https://www.intruder.io/?utm\_source=referral\&utm\_campaign=hacktricks) today.
2023-02-27 10:28:45 +01:00
2023-09-03 01:48:41 +02:00
{% embed url="https://www.intruder.io/?utm_campaign=hacktricks&utm_source=referral" %}
2023-02-27 10:28:45 +01:00
2023-09-03 01:48:41 +02:00
***
2022-10-28 01:22:18 +02:00
2022-05-01 15:25:53 +02:00
## Android Security Model
2021-04-21 16:06:28 +02:00
**There are two layers:**
* The **OS**, which keeps installed applications isolated from one another.
* The **application itself**, which allows developers to **expose certain functionalities** and configures application capabilities.
2022-05-01 15:25:53 +02:00
### UID Separation
2021-04-21 16:06:28 +02:00
**Each application is assigned a specific User ID**. This is done during the installation of the app so t**he app can only interact with files owned by its User ID or shared** files. Therefore, only the app itself, certain components of the OS and the root user can access the apps data.
2022-05-01 15:25:53 +02:00
### UID Sharing
2021-04-21 16:06:28 +02:00
**Two applications can be configured to use the same UID**. This can be useful to share information, but if one of them is compromised the data of both applications will be compromised. This is why this behaviour is **discourage**.\
2021-04-21 16:06:28 +02:00
**To share the same UID, applications must define the same `android:sharedUserId` value in their manifests.**
2022-05-01 15:25:53 +02:00
### Sandboxing
2021-04-21 16:06:28 +02:00
2021-11-30 17:46:07 +01:00
The **Android Application Sandbox** allows to run **each application** as a **separate process under a separate user ID**. Each process has its own virtual machine, so an apps code runs in isolation from other apps.\
From Android 5.0(L) **SELinux** is enforced. Basically, SELinux denied all process interactions and then created policies to **allow only the expected interactions between them**.
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### Permissions
2021-04-21 16:06:28 +02:00
2021-11-30 17:46:07 +01:00
When you installs an **app and it ask for permissions**, the app is asking for the permissions configured in the **`uses-permission`** elements in the **AndroidManifest.xml** file. The **uses-permission** element indicates the name of the requested permission inside the **name** **attribute.** It also has the **maxSdkVersion** attribute which stops asking for permissions on versions higher than the one specified.\
Note that android applications don't need to ask for all the permissions at the beginning, they can also **ask for permissions dynamically** but all the permissions must be **declared** in the **manifest.**
2021-04-21 16:06:28 +02:00
When an app exposes functionality it can limit the **access to only apps that have a specified permission**.\
2021-04-21 16:06:28 +02:00
A permission element has three attributes:
* The **name** of the permission
* The **permission-group** attribute, which allows for grouping related permissions.
* The **protection-level** which indicates how the permissions are granted. There are four types:
* **Normal**: Used when there are **no known threats** to the app. The user is **not required to approve i**t.
* **Dangerous**: Indicates the permission grants the requesting application some **elevated access**. **Users are requested to approve them**.
* **Signature**: Only **apps signed by the same certificate as the one** exporting the component can be granted permission. This is the strongest type of protection.
* **SignatureOrSystem**: Only **apps signed by the same certificate as the one** exporting the component or **apps running with system-level access** can be granted permissions
2022-05-01 15:25:53 +02:00
## Pre-Installed Applications
2021-04-21 16:06:28 +02:00
2021-11-30 17:46:07 +01:00
These apps are generally found in the **`/system/app`** or **`/system/priv-app`** directories and some of them are **optimised** (you may not even find the `classes.dex` file). Theses applications are worth checking because some times they are **running with too many permissions** (as root).
2021-04-21 16:06:28 +02:00
* The ones shipped with the **AOSP** (Android OpenSource Project) **ROM**
2021-04-21 16:06:28 +02:00
* Added by the device **manufacturer**
* Added by the cell **phone provider** (if purchased from them)
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
## Rooting
2021-04-21 16:06:28 +02:00
In order to obtain root access into a physical android device you generally need to **exploit** 1 or 2 **vulnerabilities** which use to be **specific** for the **device** and **version**.\
2021-04-21 16:06:28 +02:00
Once the exploit has worked, usually the Linux `su` binary is copied into a location specified in the user's PATH env variable like `/system/xbin`.
2021-11-30 17:46:07 +01:00
Once the su binary is configured, another Android app is used to interface with the `su` binary and **process requests for root access** like **Superuser** and **SuperSU** (available in Google Play store).
2021-04-21 16:06:28 +02:00
{% hint style="danger" %}
Note that the rooting process is very dangerous and can damage severely the device
{% endhint %}
2022-05-01 15:25:53 +02:00
### ROMs
2021-04-21 16:06:28 +02:00
It's possible to **replace the OS installing a custom firmware**. Doing this it's possible to extend the usefulness of an old device, bypass software restrictions or gain access to the latest Android code.\
2021-04-21 16:06:28 +02:00
**OmniROM** and **LineageOS** are two of the most popular firmwares to use.
2021-11-30 17:46:07 +01:00
Note that **not always is necessary to root the device** to install a custom firmware. **Some manufacturers allow** the unlocking of their bootloaders in a well-documented and safe manner.
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### Implications
2021-04-21 16:06:28 +02:00
Once a device is rooted, any app could request access as root. If a malicious application gets it, it can will have access to almost everything and it will be able to damage the phone.
2022-05-01 15:25:53 +02:00
## Android Application Fundamentals <a href="#2-android-application-fundamentals" id="2-android-application-fundamentals"></a>
2021-04-21 16:06:28 +02:00
2021-10-19 02:01:07 +02:00
This introduction is taken from [https://maddiestone.github.io/AndroidAppRE/app\_fundamentals.html](https://maddiestone.github.io/AndroidAppRE/app\_fundamentals.html)
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### Fundamentals Review <a href="#fundamentals-review" id="fundamentals-review"></a>
2021-04-21 16:06:28 +02:00
* Android applications are in the _APK file format_. **APK is basically a ZIP file**. (You can rename the file extension to .zip and use unzip to open and see its contents.)
* APK Contents (Not exhaustive)
2021-04-21 16:06:28 +02:00
* **AndroidManifest.xml**
* resources.arsc/strings.xml
* resources.arsc: a file containing precompiled resources, such as binary XML for example.
2021-10-19 02:01:07 +02:00
* res/xml/files\_paths.xml
2021-04-21 16:06:28 +02:00
* META-INF/
* Certificate lives here!
* **classes.dex**
* Dalvik bytecode for application in the DEX file format. **This is the Java (or Kotlin) code** compiled that the application will run by default.
2021-04-21 16:06:28 +02:00
* lib/
* Native libraries for the application, by default, live here! Under the lib/ directory, there are the cpu-specific directories.
* `armeabi`: compiled code for all ARM based processors only
* `armeabi-v7a`: compiled code for all ARMv7 and above based processors only
* `x86`: compiled code for X86
* `mips`: compiled code for MIPS processors only
* assets/
* Any other files that may be needed by the app.
* Additional native libraries or DEX files may be included here. This can happen especially when malware authors want to try and “hide” additional code, native or Dalvik, by not including it in the default locations.
2022-04-06 00:24:52 +02:00
* res/
2021-04-21 16:06:28 +02:00
* the directory containing resources not compiled into resources.arsc
2022-05-01 15:25:53 +02:00
### **Dalvik & Smali**
2021-04-21 16:06:28 +02:00
2022-04-06 10:57:29 +02:00
Most Android applications are written in Java. Kotlin is also supported and interoperable with Java. For ease, for the rest of this workshop, when I refer to “Java”, you can assume that I mean “Java or Kotlin”. **Instead of the Java code being run in Java Virtual Machine** (JVM) like desktop applications, in Android, the **Java is compiled to the \_Dalvik Executable (DEX) bytecode**\_\*\* format\*\*. For earlier versions of Android, the bytecode was translated by the Dalvik virtual machine. For more recent versions of Android, the Android Runtime (ART) is used.\
If developers, write in Java and the code is compiled to DEX bytecode, to reverse engineer, we work the opposite direction.\
2022-04-06 10:57:29 +02:00
\\
2021-04-21 16:06:28 +02:00
![Flowchart of Developer's process. Java to DEX bytecode](https://maddiestone.github.io/AndroidAppRE/images/DevelopersFlow.jpg)
2021-04-21 16:06:28 +02:00
![Flowchart of Reverse Engineer's process. DEX bytecode to SMALI to Decompiled Java](https://maddiestone.github.io/AndroidAppRE/images/ReversersFlow.jpg)
2021-04-21 16:06:28 +02:00
**Smali is the human readable version of Dalvik bytecode**. Technically, Smali and baksmali are the name of the tools (assembler and disassembler, respectively), but in Android, we often use the term “Smali” to refer to instructions. If youve done reverse engineering or computer architecture on compiled C/C++ code. **SMALI is like the assembly language: between the higher level source code and the bytecode**.
2021-04-21 16:06:28 +02:00
2023-09-03 01:51:32 +02:00
<figure><img src="/.gitbook/assets/image (675).png" alt=""><figcaption></figcaption></figure>
2023-02-27 10:28:45 +01:00
2023-09-03 01:48:41 +02:00
Find vulnerabilities that matter most so you can fix them faster. Intruder tracks your attack surface, runs proactive threat scans, finds issues across your whole tech stack, from APIs to web apps and cloud systems. [**Try it for free**](https://www.intruder.io/?utm\_source=referral\&utm\_campaign=hacktricks) today.
2023-02-27 10:28:45 +01:00
2023-09-03 01:48:41 +02:00
{% embed url="https://www.intruder.io/?utm_campaign=hacktricks&utm_source=referral" %}
2023-02-27 10:28:45 +01:00
2023-09-03 01:48:41 +02:00
***
2022-10-28 01:22:18 +02:00
2022-05-01 15:25:53 +02:00
## Intents
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
Intents are the primary means by which Android apps communicate between their components or with other apps. These message objects can also carry data between apps or component, similar to how GET/POST requests are used in HTTP communications.
2021-04-21 16:06:28 +02:00
So an Intent is basically a **message that is passed between components**. Intents **can be directed** to specific components or apps, **or can be sent without a specific recipient**.\
2021-04-21 17:06:12 +02:00
To be simple Intent can be used:
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
* To start an Activity, typically opening a user interface for an app
* As broadcasts to inform the system and apps of changes
* To start, stop, and communicate with a background service
* To access data via ContentProviders
* As callbacks to handle events
2021-04-21 16:06:28 +02:00
2021-05-05 11:24:26 +02:00
Improper implementation could result in data leakage, restricted functions being called and program flow being manipulated.
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### Intent-Filter
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
An Intent Filter specify the **types of Intent that an activity, service, or Broadcast Receiver can respond to**. It specifies what an activity or service can do and what types of broadcasts a Receiver can handle. It allows the corresponding component to receive Intents of the declared type. Intent Filters are typically **defined via the AndroidManifest.xml file**. For **Broadcast Receiver** it is also possible to define them in **coding**. An Intent Filter is defined by its category, action and data filters. It can also contain additional metadata.
2021-04-21 16:06:28 +02:00
2021-11-30 17:46:07 +01:00
In Android, an activity/service/content provider/broadcast receiver is **public** when **`exported`** is set to **`true`** but a component is **also public** if the **manifest specifies an Intent filter** for it. However,\
developers can **explicitly make components private** (regardless of any intent filters)\
2022-04-06 10:57:29 +02:00
by setting the \*\* `exported` attribute to `false`\*\* for each component in the manifest file.\
2021-04-21 17:06:12 +02:00
Developers can also set the **`permission`** attribute to **require a certain permission to access** the component, thereby restricting access to the component.
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### Implicit Intents
2021-04-21 16:06:28 +02:00
2022-04-06 10:57:29 +02:00
Intents are programatically created using an Intent constructor:
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
```java
Intent email = new Intent(Intent.ACTION_SEND, Uri.parse("mailto:"));
```
2021-04-21 16:06:28 +02:00
2021-10-19 02:01:07 +02:00
The **Action** of the previously declared intent is **ACTION\_SEND** and the **Extra** is a mailto **Uri** (the Extra if the extra information the intent is expecting).
2021-04-21 17:06:12 +02:00
This intent should be declared inside the manifest as in the following example:
2021-04-21 16:06:28 +02:00
```markup
2021-04-21 17:06:12 +02:00
<activity android:name="ShareActivity">
<intent-filter>
<action android:name="android.intent.action.SEND" />
<category android:name="android.intent.category.DEFAULT" />
</intent-filter>
</activity>
2021-04-21 16:06:28 +02:00
```
2021-04-21 17:06:12 +02:00
An intent-filter needs to match the **action**, **data** and **category** to receive a message.
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
The "Intent resolution" process determine which app should receive each message. This process considers the **priority attribute**, which can be set in the i**ntent-filter declaration**, and t**he one with the higher priority will be selected**. This priority can be set between -1000 and 1000 and applications can use the `SYSTEM_HIGH_PRIORITY` value. If a **conflict** arises, a "choser" Window appears so the **user can decide**.
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### Explicit Intents
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
An explicit intent specifies the class name it's targeting:
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
```java
Intent downloadIntent = new (this, DownloadService.class):
```
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
In other applications in order to access to the previously declared intent you can use:
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
```java
Intent intent = new Intent();
intent.setClassName("com.other.app", "com.other.app.ServiceName");
context.startService(intent);
```
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### Pending Intents
2021-04-21 16:06:28 +02:00
2022-07-02 23:37:34 +02:00
These allow other applications to **take actions on behalf of your application**, using your app's identity and permissions. Constructing a Pending Intent it should be **specified an intent and the action to perform**. If the **declared intent isn't Explicit** (doesn't declare which intent can call it) a **malicious application could perform the declared action** on behalf of the victim app. Moreover, **if an action isn't specified**, the malicious app will be able to do **any action on behalf the victim**.
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### Broadcast Intents
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
Unlike the previous intents, which are only received by one app, broadcast intents **can be received by multiple apps**. However, from API version 14, it's **possible to specify the app that should receive** the message using Intent.set Package.
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
Alternatively it's also possible to **specify a permission when sending the broadcast**. The receiver app will need to have that permission.
2021-04-21 16:06:28 +02:00
There are **two types** of Broadcasts: **Normal** (asynchronous) and **Ordered** (synchronous). The **order** is base on the **configured priority within the receiver** element. **Each app can process, relay or drop the Broadcast.**
2021-04-21 16:06:28 +02:00
2022-04-06 10:57:29 +02:00
It's possible to **send** a **broadcast** using the function \*\*`sendBroadcast(intent, receiverPermission)` \*\* from the `Context` class.\
2021-04-21 17:06:12 +02:00
You could also use the function **`sendBroadcast`** from the **`LocalBroadCastManager`** ensures the **message never leaves the app**. Using this you won't even need to export a receiver component.
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### Sticky Broadcasts
2021-04-21 16:06:28 +02:00
This kind of Broadcasts **can be accessed long after they were sent**.\
These were deprecated in API level 21 and it's recommended to **not use them**.\
2021-04-21 17:06:12 +02:00
**They allow any application to sniff the data, but also to modify it.**
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
If you find functions containing the word "sticky" like **`sendStickyBroadcast`** or **`sendStickyBroadcastAsUser`**, **check the impact and try to remove them**.
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
## Deep links / URL schemes
2021-04-21 16:06:28 +02:00
2022-04-06 00:24:52 +02:00
**Deep links allow to trigger an Intent via URL**. An application can declare an **URL schema** inside and activity so every time the Android device try to **access an address using that schema** the applications activity will be called:
2021-04-21 16:06:28 +02:00
![](<../../.gitbook/assets/image (214).png>)
2021-04-21 16:06:28 +02:00
In this case the scheme in `myapp://` (note also the **`category BROWSABLE`**)
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
If inside the `intent-filter`you find something like this:
2021-04-21 16:06:28 +02:00
![](<../../.gitbook/assets/image (263).png>)
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
Then, it's expecting something like `http://www.example.com/gizmos`
2021-04-21 16:06:28 +02:00
2022-04-06 00:24:52 +02:00
If you find something like this:
2021-04-21 16:06:28 +02:00
![](<../../.gitbook/assets/image (262).png>)
2021-04-21 16:06:28 +02:00
It will mean that it's expecting a URL starting by `example://gizmos`\
2021-04-21 17:06:12 +02:00
In this case you could try to abuse the functionality creating a web with the following payloads. It will try to navigate to arbitrary pages and try to execute JS:
2021-04-21 16:06:28 +02:00
```markup
2021-04-21 17:06:12 +02:00
<a href="example://gizmos/https://google.com">click here</a>
<a href="example://gizmos/javascript://%250dalert(1)">click here</a>
2021-04-21 16:06:28 +02:00
```
2021-04-21 17:06:12 +02:00
In order to find the **code that will be executed in the App**, go to the activity called by the deeplink and search the function **`onNewIntent`**.
2021-04-21 16:06:28 +02:00
![](<../../.gitbook/assets/image (436) (1) (1) (1).png>)
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
Learn how to [call deep links without using HTML pages](./#exploiting-schemes-deep-links).
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
## AIDL - Android Interface Definition Language
2021-04-21 16:06:28 +02:00
The **Android Interface Definition Language** (AIDL) allows you to define the programming interface that both the client and service agree upon in order to **communicate with each other using interprocess communication** (IPC). On Android, **one process cannot normally access the memory of another process**. So to talk, they need to decompose their objects into primitives that the **operating system** can understand, and marshall the objects across that boundary for you. The code to do that marshalling is tedious to write, so Android handles it for you with AIDL.).
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
Services using AIDL are referred to as **Bound Services**. In the Service's class you will find the **`onBind`** method. This is **where the interaction begins** so it's initial part of the code to review looking for potential vulnerabilities.
2021-04-21 16:06:28 +02:00
A bound service is the server in a client-server interface. **It allows components (such as activities) to bind to the service, send requests, receive responses, and perform interprocess communication** (IPC). A bound service typically lives only while it serves another application component and does not run in the background indefinitely.
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### Messenger
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
A Messenger is another type of IPC mechanism. Since the **Messenger is also a "Bound Service"**, the data passed from the client app is also processed through the `onBind` method. So, the code review should start on this method and you should look for the invocation of sensitive functionality or unsafe handling of data.
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### Binder
2021-04-21 16:06:28 +02:00
It's weird to find a Binder class directly invoked as it's much easier to use AIDL (which abstracts the Binder class). However, it's good to know that **Binder is a kernel-level driver which moves data from one process's memory to another's** ([https://www.youtube.com/watch?v=O-UHvFjxwZ8](https://www.youtube.com/watch?v=O-UHvFjxwZ8)).
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
## Components
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
These include: **Activities, Services, Broadcast Receivers and Providers.**
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### Launcher Activity and other activities
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
An **Android activity** is one screen of the **Android** app's user interface. In that way an **Android activity** is very similar to windows in a desktop application. An **Android** app may contain one or more activities, meaning one or more screens.
2021-11-30 17:46:07 +01:00
The **launcher activity** is what most people think of as the **entry point** to an Android application. The launcher activity is the activity that is started when a user clicks on the icon for an application. You can determine the launcher activity by looking at the applications manifest. The launcher activity will have the following MAIN and LAUNCHER intents listed.
2021-04-21 17:06:12 +02:00
Keep in mind that not every application will have a launcher activity, especially apps without a UI. Examples of applications without a UI (and thus a launcher activity) are pre-installed applications that perform services in the background, such as voicemail.
2021-04-21 16:06:28 +02:00
```markup
2021-04-21 17:06:12 +02:00
<activity android:name=".LauncherActivity">
2021-04-21 16:06:28 +02:00
<intent-filter>
2021-04-21 17:06:12 +02:00
<action android:name="android.intent.action.MAIN" />
<category android:name="android.intent.category.LAUNCHER" />
2021-04-21 16:06:28 +02:00
</intent-filter>
</activity>
```
2021-04-21 17:06:12 +02:00
Activities can be exported allowing other processes on the device to launch the activity. By default, they aren't exported but you can export them setting:
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
```markup
<service android:name=".ExampleExportedService" android:exported="true"/>
```
2021-04-21 16:06:28 +02:00
Note that the ability to **bypass activity protections isn't always a vulnerability**, you need to check to which data you have obtained access.\
2021-04-21 17:06:12 +02:00
Also, **some activities returns data to a caller**. In these scenarios you need to search for the **`setResult`** method and check the data that is passed into the Intent parameter. **If it's sensitive data you may have an information leakage vulnerability** and it's exploitable with apps capable of communicating with the Activity.
2021-04-21 16:06:28 +02:00
2021-04-22 14:26:30 +02:00
**The code of an activity starts with the `onCreate` method.**
2022-05-01 15:25:53 +02:00
### Application Subclass
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
Android applications can define a **subclass** of [Application](https://developer.android.com/reference/android/app/Application). Applications can, but do not have to define a custom subclass of Application. If an Android app defines an Application subclass, t**his class is instantiated prior to any other class in the application**.
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
If the **`attachBaseContext`** method is defined in the Application subclass, it is called first, before the **`onCreate`** method.
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### Services
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
[Services](https://developer.android.com/guide/components/services) **run in the background without a UI.** They are used to perform **long-running processes, even if the user starts using a different application**.
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
There is a myriad of ways that they can be started and thus are an entry point for applications. The default way that a service can be started as an entry point to an application is through **Intents**.
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
When the **`startService`** method is called to start a Service, the **`onStart`** method in the Service is executed. It will run indefinitely until the **`stopService`** method is called. If the service is only needed as long as the client is connected, the client should "bind" to it using the **`bindService`** method.
2021-04-21 16:06:28 +02:00
For a **bound service** (see previous section), the data will be passed to the **`onBind`** method.
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
For example, a service might play music in the background while the user is in a different application, or it might fetch data over the network without blocking user interaction with an activity.
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
A **service can be exported which allows other processes on the device to start the service**. By default services aren't exported but it can be configured in the Manifest:
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
```markup
<service android:name=".ExampleExportedService" android:exported="true"/>
```
2022-05-01 15:25:53 +02:00
### Broadcast Receivers
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
Broadcasts can be thought of a messaging system and **broadcast receivers are the listeners**. If an application has registered a receiver for a specific broadcast, the code in that receiver is executed when the system sends the broadcast. Note that in this case **several apps can receive the same message**.
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
There are **2 ways** that an app can **register a receiver**: in the **apps Manifest or dynamically registered** in the apps code using the **`registerReceiver`** API call. In the manifest you can limit the broadcasts you accept through the u**se of permissions within the receiver element**. When **dynamically** defined you can **pass the permission to the `registerReceiver` method**.
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
In both cases, to register the receiver, the **intent filters for the receiver are set**. These intent filters are the broadcasts that should trigger the receiver.
When the specific broadcasts are sent that the receiver is registered for are sent, **`onReceive`** in the BroadcastReceiver class is **executed**.
2021-04-21 16:06:28 +02:00
An application may register a receiver for the low battery message for example, and change its behaviour based on that information.
Broadcast can be **asynchronous** (every receiver receives it) or **synchronous** (the broadcast is received in an ordered manner based on the priority set to receive it).
2021-04-21 17:06:12 +02:00
2021-04-21 16:06:28 +02:00
{% hint style="danger" %}
2021-04-21 17:06:12 +02:00
**Note that any application can set itself as top priority to receive a Broadcast.**
2021-04-21 16:06:28 +02:00
{% endhint %}
To **examine** the **code** implemented into a Broadcast Receiver you need to search for the **`onReceive`** method of the class of the receiver.\
2021-04-21 17:06:12 +02:00
Note that **Ordered Broadcasts can drop the Intent received or even modify it** using one of the setter methods. Therefore, the **receivers should validate the data**.
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### Content Provider
2021-04-21 16:06:28 +02:00
Content Providers are the way **apps share structured data**, such as relational databases. Therefore, it's very important to use **permissions** and set the appropriate protection level to protect them.\
Content Providers can use the **`readPermission`** and **`writePermission`** attributes to specify which permissions an app must have. **These permissions take precedence over the permission attribute**.\
2021-11-30 17:46:07 +01:00
Moreover, they can also **allow temporary exceptions** by setting the **`grantUriPermission`** to true and then configuring the appropriate parameters in the **`grant-uri-permission`** element within the provider element inside the manifest file.
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
The **`grant-uri-permission`** has three attributes: path, pathPrefix and pathPattern:
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
* **path**: Allows to specify the entire path to exclude
* **pathPrefix**: Allows to specify the beginning of the path
* **pathPattern**: Allows the use of wildcards and symbolic replacements to gain more granular control.
2021-04-21 16:06:28 +02:00
2021-04-21 17:42:02 +02:00
It's **important to validate and sanitise the received input** to avoid potential vulnerabilities like SQL injection.
**Content Provider features:**
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
* Content Provider component supplies data from one application to others on request.
* You can store the data in the file system, an SQLite database, on the web, or any other persistent storage location your app can access.
* Through the content provider, other apps can query or even modify the data (if the content provider allows it).
2021-04-21 17:06:12 +02:00
* Content Provider is useful in cases when an app want to share data with another app.
* It is much similar like databases and has four methods.
* insert()
* update()
* delete()
* query()
2021-04-21 16:06:28 +02:00
2022-04-29 01:27:22 +02:00
**FileProvider**
2021-04-21 16:06:28 +02:00
2021-11-30 17:46:07 +01:00
This is a type of Content Provider that will **share files** from a folder. You can declare a file provider like this:
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
```markup
<provider android:name="androidx.core.content.FileProvider"
android:authorities="com.example.myapp.fileprovider"
android:grantUriPermissions="true" android:exported="false">
<meta-data
android:name="android.support.FILE_PROVIDER_PATHS"
android:resource="@xml/filepaths" />
</provider>
```
2021-04-21 16:06:28 +02:00
Note the **`android:exported`** attribute because if it's **`true`** external applications will be able to access the shared folders.\
2021-11-30 17:46:07 +01:00
Note that the configuration `android:resource="@xml/filepaths"` is indicating that the file _res/xml/filepaths.xml_ contains the configuration of **which folders** this **FileProvider** is going to **share**. This is an example of how to indicate to share a folder in that file:
2021-04-21 16:06:28 +02:00
2021-04-21 17:06:12 +02:00
```markup
<paths>
<files-path path="images/" name="myimages" />
</paths>
```
2021-04-21 16:06:28 +02:00
2021-11-30 17:46:07 +01:00
Sharing something like **`path="."`** could be **dangerous** even if the provider isn't exported if there is other vulnerability in some part of the code that tried to access this provider.\
You could **access** an **image** inside that folder with `content://com.example.myapp.fileprovider/myimages/default_image.jpg`
2021-05-04 17:22:15 +02:00
The `<paths>` element can have multiple children, each specifying a different directory to share. In addition to the **`<files-path>`** element, you can use the **`<external-path>`** element to share directories in **external storage**, and the **`<cache-path>`** element to share directories in your **internal cache directory**.\
2021-05-04 17:22:15 +02:00
[For more information about specific file providers attributes go here.](https://developer.android.com/reference/androidx/core/content/FileProvider)
2021-04-21 17:06:12 +02:00
[More information about FileProviders here](https://developer.android.com/training/secure-file-sharing/setup-sharing).
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
## WebViews
2021-04-21 16:06:28 +02:00
WebViews are effectively **web browsers** embedded into Android Apps.\
WebViews content can be pulled from remote sites or can be files included in the app.\
2021-04-21 16:06:28 +02:00
WebViews are **vulnerable to the same vulnerabilities affecting any web browsers**. However there are some **configurations** that can be useful to **limit** the **attack** **surface**.
There are two types of WebViews in Android:
* The **WebViewClient**, best suited for simpleHTML rendering. This won't run the JS alert function. So, XSS tests using that function will be invalid.
* The **WebChrome** **client**, is a Chrome browser.
Note that **WebView browsers doesn't have access to the native browser's cookies**.
To load a URL or file it's possible to use the functions **`loadUrl`**, **`loadData`** or **`loadDataWithBaseURL`**. **It's important to only access sanitised URLs.**\
The WebView security can be configured through the **`WebSettings`** object.\
2021-04-21 16:06:28 +02:00
For example, JS code execution can be disabled using the **`setJavaScriptEnabled`** method with the **`false`** value. This will **remove** the possibility of a **XSS** and other JS related vulnerabilities.
The JavaScript "**Bridge**" functionality **inject Java objects into a WebView making them accessible to JS**. From Android 4.2 methods must be annotated with **`@JavascriptInterface`** in order to be accessible to JavaScript.
If **`true`** is passed to **`setAllowContentAccess`**, **WebViews will be able to access Content Providers** via **`content://`** scheme. This obviously poses a security risk. Note that if this access is given, it's very important to **ensure** that the **`content://`** URL is **safe**.
By default, local files can be accessed by WebViews via file:// URLs, but there are several ways to prevent this behaviour:
2021-11-30 17:46:07 +01:00
* Passing **`false`** to **`setAllowFileAccess`**, prevents the access to the filesystem with the exception of assets via `file:///android_asset` _and_ `file:///android_res`. These paths should be used only for non-sensitive data (like images) so this should be safe.
2021-04-21 16:06:28 +02:00
* The method **`setAllowFileAccess`** indicates if a path from a `file://` URL should be able to access the content from other file scheme URLs.
2021-11-30 17:46:07 +01:00
* The method **`setAllowUniversalAccessFromFileURLs`** indicates if a path from a `file://` URL should be able to access content from any origin.
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
## Other App components
2021-04-21 16:06:28 +02:00
2022-05-01 15:25:53 +02:00
### **Application Signing**
2021-04-21 16:06:28 +02:00
2021-04-21 17:42:02 +02:00
* Android requires that **all apps be digitally signed with a certificate** before they can be installed. Android uses this certificate to identify the author of an app.
* To run application on the device, it should be signed.When application is installed on to a device the **package manager verifies** that whether the application has been properly signed with the certificate in the apk file or not.
2021-04-21 16:06:28 +02:00
* Application can be self signed or can be signed through CA.
* Application signing ensures that one application cant access any other application except through well-defined IPC and also that it is passed unmodified to the device.
2022-05-01 15:25:53 +02:00
### **Application Verification**
2021-04-21 16:06:28 +02:00
* Android 4.2 and later support application verification. Users can choose to enable “Verify Apps” and have applications evaluated by an application verifier prior to installation.
* App verification can alert the user if they try to install an app that might be harmful; if an application is especially bad, it can block installation.
2022-05-01 15:25:53 +02:00
## Mobile Device Management
2021-04-22 12:23:13 +02:00
2021-11-30 17:46:07 +01:00
MDM or Mobile Device Management are software suits that are used to **ensure a control and security requirements** over mobile devices. These suites use the features referred as Device Administration API and require an Android app to be installed.
2021-04-22 12:23:13 +02:00
Generally the MDM solutions perform functions like enforcing password policies, forcing the encryption of storage and enable remote wiping of device data.
2022-04-28 18:01:33 +02:00
2023-09-03 01:51:32 +02:00
<figure><img src="/.gitbook/assets/image (675).png" alt=""><figcaption></figcaption></figure>
2023-02-27 10:28:45 +01:00
2023-09-03 01:48:41 +02:00
Find vulnerabilities that matter most so you can fix them faster. Intruder tracks your attack surface, runs proactive threat scans, finds issues across your whole tech stack, from APIs to web apps and cloud systems. [**Try it for free**](https://www.intruder.io/?utm\_source=referral\&utm\_campaign=hacktricks) today.
2023-02-27 10:28:45 +01:00
2023-09-03 01:48:41 +02:00
{% embed url="https://www.intruder.io/?utm_campaign=hacktricks&utm_source=referral" %}
2023-02-27 10:28:45 +01:00
2023-09-03 01:48:41 +02:00
***
2022-10-28 01:22:18 +02:00
2022-04-28 18:01:33 +02:00
<details>
2023-04-25 20:35:28 +02:00
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></a> - <a href="https://www.youtube.com/@hacktricks_LIVE"><strong>🎥 Youtube 🎥</strong></a></summary>
2022-04-28 18:01:33 +02:00
2022-09-09 13:57:02 +02:00
* Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
* Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
* Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
* **Join the** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** [**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/hacktricks\_live)**.**
2023-01-02 13:00:18 +01:00
* **Share your hacking tricks by submitting PRs to the** [**hacktricks repo**](https://github.com/carlospolop/hacktricks) **and** [**hacktricks-cloud repo**](https://github.com/carlospolop/hacktricks-cloud).
2022-04-28 18:01:33 +02:00
</details>