【经验】使用Androl4b进行安卓APP安全测试(Part 1)
作者:admin | 时间:2016-8-3 23:26:25 | 分类:黑客技术 隐藏侧边栏展开侧边栏
0×00 前言
移动客户端Ap测试中,相信有很多小伙伴都是在自己常用的手机中安装上需要测试的App。这种方法是比较常见的一种,但是常用的手机中难免会有其它不相关的App在后台运行、进行网络请求,导致我们拦截到很多测试中不需要要的数据包甚至有的情况下我们无法辨别数据包是否是需要测试的App发出的请求。介于这种情况我们需要一个更干净的测试环境来对移动端App进行测试。
0×01工欲善其事必先利其器
Androl4b是一个基于ubuntu mate的安卓安全评估&测试的系统,系统集成了一系列Android 应用程序评估测试所需的工具,可用于逆向工程和恶意软件分析,为安卓测试、安全研究从业人员节省了大量环境搭建配置所需的时间、精力。
该工具的中文介绍可参阅:工具推荐:Androl4b,安卓安全评估测试利器 一文。
下载链接:http://pan.baidu.com/s/1dEfkwLV 密码:57gu
MD5Sum : 0c2346b1dbd769e3eb2069026a3c8efe
SHA1Sum : 1119e5e225094191739281670e2aa6400a15f80f
0×02 系统优化
下载解压完成后,可在虚拟机中直接启动Androl4b:
账户:andro
密码:androlab
使用过程中发现系统中已经集成JDK环境、Android Studio、Pyhton、Wireshark、BurpSuite等常用工具,由于工具是老外打包的,所以系统里边没安装中文语言。
2.1 设置DNS
System->Control Center->Network->DNS:
sudo apt-get update
2.2 安装中文语言包
System->Control Center->Language Support->Install/Remove Languages->Chines (simplified)
Apply Changes使配置生效,账户输入密码后便开始下载语言文件:
下载完成后把Chines拖到第一项(位于English前一位),把中文作为系统语言首选项。重启系统后,配置生效。也可以通过下面的步骤修改系统配置文件把中文作为首选项:
2.3 修改系统语言配置文件
修改local文件:
sudo vim /var/lib/locales/supported.d/local //删除所有内容,增加以下内容: zh_CN.UTF-8 UTF-8 zh_CN GB2312
zh_CN.GBK GBK
en_US.UTF-8 UTF-8 fr_FR ISO-8859-1 zh_CN.GB18030 GB18030
生成相关的locales:
sudo locale-gen --purge
修改设置默认语言:
sudo vim /etc/default/locale //删除所有内容,增加以下内容: LANG="zh_CN.UTF-8" LANGUAGE="zh_CN:zh" LC_NUMERIC="zh_CN.UTF-8" LC_TIME="zh_CN.UTF-8" LC_MONETARY="zh_CN.UTF-8" LC_PAPER="zh_CN.UTF-8" LC_IDENTIFICATION="zh_CN.UTF-8" LC_NAME="zh_CN.UTF-8" LC_ADDRESS="zh_CN.UTF-8" LC_TELEPHONE="zh_CN.UTF-8" LC_MEASUREMENT="zh_CN.UTF-8"
修改完成后重启系统,最终效果:
0×03 安卓虚拟机
Emulator安卓模拟器是目前使用最方便的安卓模拟器,无需安装任何插件,下载安装后直接点击运行。支持windows、Linux系统。Androl4B中已经安装了该工具,并且有一个名为lab的虚拟安卓设备:
3.1 为虚拟设备设置代理
终端执行
emulator -avd lab -no-audio -http-proxy http://127.0.0.1:8090
3.2 配置Burp Suite
3.2.1 增加代理
Applications->tools->BurpSuite Proxy->Option-add->Bind to port 8090
3.2.2 监听127.0.0.1:8090
使用系统自带浏览器打开一个网站,测试能否拦截到网络请求:
Burp Suit成功拦截到了安卓虚拟机中的网络请求。
0×04 ADB的一些使用
4.1 显示系统中的全部安卓平台
android list targets
4.2 列出电脑连接的设备
adb devices
emulator-5554设备为emulator模拟器模拟的安卓手机,LGD857是我连接到电脑中的手机。
4.3 安装应用程序
adb install xxx.apk
4.3.1 拦截App通信数据包:
4.4 获取模拟器中的文件:
adb pull <remote> <local>
4.5 向模拟器中写文件:
adb push <local> <remote>
4.6 进入模拟器的shell模式:
adb shell
4.7 卸载模拟器中的App
adb uninstall com.sina.weibo
0×05 Drozer
5.1 工具介绍
Drozer原名mercury,是一款Android安全审计与攻击框架,该工具分为免费版(社区版)和专业版,专业版增加了GUI界面这类的一些功能。
5.2 工具站点
工具介绍下载地址:https://labs.mwrinfosecurity.com/tools/drozer/
工具GayHub开源项目地址:https://github.com/mwrlabs/drozer/
5.3 工具安装
Androl4b中已有这个工具,我们在终端执行、查看一下帮助信息:
andro@l4b:~$ drozer
usage: drozer [COMMAND]
Run `drozer [COMMAND] --help` for more usage information. Commands:
console start the drozer Console
module manage drozer modules
server start a drozer Server ssl manage drozer SSL key material
exploit generate an exploit to deploy drozer
agent create custom drozer Agents
payload generate payloads to deploy drozer
andro@l4b:~$ drozer console --help usage: drozer console [OPTIONS] COMMAND
Starts a new drozer Console to interact with an Agent.
The drozer Console connects to an Agent and allows you to interact with the
system from the context of the agent application on the device. The console
can connect directly to an agent, if its embedded server is enabled, or through
a drozer Server that the agent is connected to.
positional arguments:
command the command to execute device the unique identifier of the Agent to connect to optional arguments:
-h, --help show this help message and exit --server HOST[:PORT] specify the address and port of the drozer server --ssl connect with SSL --accept-certificate accept any SSL certificate with a valid trust chain --debug enable debug mode --no-color disable syntax highlighting in drozer output --password the agent requires a password -c ONECMD, --command ONECMD specify a single command to run in the session -f [FILE [FILE ...]], --file [FILE [FILE ...]] source file available commands:
commands shows a list of all console commands
connect starts a new session with a device
devices lists all devices bound to the drozer server
disconnect disconnects a drozer session
version display the installed drozer version
接下来我们需要在Emulator安装Drozer。
5.3.1 运行安卓模拟器(Terminal ①):
emulator -avd lab
5.3.2 下载Drozer APK文件(Terminal ②):
wget https://labs.mwrinfosecurity.com/system/assets/934/original/drozer-agent-2.3.4.apk
5.3.3 把Drozer安装到安卓模拟器中:
adb install drozer-agent-2.3.4.apk
5.4 开始使用
5.4.1 在安卓虚拟机中运行drozer Agent App,打开Embbdded Server:
5.4.2 使用 adb 进行端口转发,转发到 Drozer使用的端口 31415,并进入Drozer 控制台:
adb forward tcp:31415 tcp:31415 drozer console connect
run $module 执行Drozer功能模块
list 列出Drozer所有功能模块
dz> list app.activity.forintent Find activities that can handle the given intent app.activity.info Gets information about exported activities. app.activity.start Start an Activity app.broadcast.info Get information about broadcast receivers app.broadcast.send Send broadcast using an intent app.broadcast.sniff Register a broadcast receiver that can sniff
particular intents app.package.attacksurface Get attack surface of package app.package.backup Lists packages that use the backup API (returns true on FLAG_ALLOW_BACKUP) app.package.debuggable Find debuggable packages app.package.info Get information about installed packages app.package.launchintent Get launch intent of package app.package.list List Packages app.package.manifest Get AndroidManifest.xml of package app.package.native Find Native libraries embedded in the application. app.package.shareduid Look for packages with shared UIDs app.provider.columns List columns in content provider app.provider.delete Delete from a content provider app.provider.download Download a file from a content provider that
supports files app.provider.finduri Find referenced content URIs in a package app.provider.info Get information about exported content providers app.provider.insert Insert into a Content Provider app.provider.query Query a content provider app.provider.read Read from a content provider that supports files app.provider.update Update a record in a content provider app.service.info Get information about exported services app.service.send Send a Message to a service, and display the reply app.service.start Start Service app.service.stop Stop Service auxiliary.webcontentresolver Start a web service interface to content providers. exploit.jdwp.check Open @jdwp-control and see which apps connect
exploit.pilfer.general.apnprovider
Reads APN content provider
exploit.pilfer.general.settingsprovider
Reads Settings content provider
information.datetime Print Date/Time
information.deviceinfo Get verbose device information
information.permissions Get a list of all permissions used by packages on
the device
scanner.activity.browsable Get all BROWSABLE activities that can be invoked
from the web browser
scanner.misc.native Find native components included in packages
scanner.misc.readablefiles Find world-readable files in the given folder
scanner.misc.secretcodes Search for secret codes that can be used from the
dialer
scanner.misc.sflagbinaries Find suid/sgid binaries in the given folder (default
is /system).
scanner.misc.writablefiles Find world-writable files in the given folder
scanner.provider.finduris Search for content providers that can be queried
from our context.
scanner.provider.injection Test content providers for SQL injection
vulnerabilities.
scanner.provider.sqltables Find tables accessible through SQL injection
vulnerabilities.
scanner.provider.traversal Test content providers for basic directory traversal
vulnerabilities.
shell.exec Execute a single Linux command.
shell.send Send an ASH shell to a remote listener.
shell.start Enter into an interactive Linux shell.
tools.file.download Download a File
tools.file.md5sum Get md5 Checksum of file
tools.file.size Get size of file
tools.file.upload Upload a File
tools.setup.busybox Install Busybox.
tools.setup.minimalsu Prepare 'minimal-su' binary installation on the
device.
shell 进入Drozer Agent App的shell交互界面
dz> shell
u0_a343@g3:/data/data/com.mwr.dz $
5.5 工具功能
5.5.1 列出模拟器设备中所有已经安装的App包列表
run app.package.list
5.5.2 列举APP的详细信息:
在文章第一部分我们安装了新浪微博,这里便以微博为例:
利用关键词“weibo”进行搜索得出包名:
dz> run app.package.list -f weibo com.sina.weibo (微博) dz>
查看包信息:
run app.package.info -a com.sina.weibo
通过上述方式,我们已经获得应用数据目录、apk的路径、UID、GID等信息。
5.5.3 APP攻击面分析&查找应用的IPS漏洞:
dz> run app.package.attacksurface com.sina.weibo Attack Surface:
139 activities exported 21 broadcast receivers exported 1 content providers exported 16 services exported
微博中存在139个暴露的activity ,我们可以使用下面这条命令查看app的activity:
5.5.4 获取activity信息
dz> run app.activity.info -a com.sina.weibo Package: com.sina.weibo com.sina.weibo.MainTabActivity Permission: null com.sina.weibo.composerinde.ComposerDispatchActivity Permission: null ..................省略若干........................
com.sina.weibo.richdocument.RichDocumentDispatchActivity Permission: null com.sina.weibo.notepro.NoteActivity Permission: null dz>
5.5.5 Reading from Content Providers
dz> run app.provider.info -a com.sina.weibo Package: com.sina.weibo Authority: com.sina.weibo.sdkProvider Read Permission: null Write Permission: null Content Provider: com.sina.weibo.provider.SinaWeiboSdkProvider Multiprocess Allowed: False Grant Uri Permissions: False
5.5.6 Database-backed Content Providers (Data Leakage)
由于在写文章测试的过程中,没有找到合适的App来演示数据泄露利用模块以及sql注入模块的功能,直接贴一下使用指南中的案例演示:
dz> run scanner.provider.finduris
-
a com.mwr.example.sieve
Scanning com.mwr.example.sieve...
Unable to Query content://com.mwr. example.sieve.DBContentProvider/
...
Unable to Query content://com.mwr.example.sieve.DBContentProvider/Keys Accessible content URIs: content://com.mwr.example.sieve.DBContentProvider/Keys/ content://com.mwr.example.sieve.DBContentProvider/Passwords content://com.mwr.example.sieve.DBContentProvider/Passwords/
利用
dz> run app.provider.query content://com.mwr.example.sie ve.DBContentProvider/Passwords/
--
vertical _id: 1 service: Email username: incognitoguy50 password: PSFjqXIMVa5NJFudgDuuLVgJYFD+8w== (Base64
-
encoded) email: incognitoguy50@gmail.com
5.5.7 Database-backed Content Providers (SQL Injection)
dz> run app.provider.query content://com.mwr.example.sie
ve.DBContentProvider/Passwords/ --
projection "'" unrecognized token: "' FROM Passwords" (code 1): , while compiling: SELECT ' FROM Passwords
dz> run app.provider.query
content://com.mwr.example.sie
ve.DBContentProvider/Passwords/
--
selection "'"
unrecognized token: "')" (code 1): , while compiling: SELECT * FROM Passwords
WHERE (')
Droer 使用指南
Drozer的更多功能、使用方法可参阅:Drozer 使用指南 : https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-drozer-user-guide-2015-03-23.pdf
0×06 ApkTool
6.1 工具介绍
ApkTool是谷歌提供的APK编译工具,支持反编译及回编译apk。同时安装反编译系统apk所需要的framework-res框架,清理上次反编译文件夹等功能。使用该工具需安装Java环境。
6.2 decode
decode命令用于进行反编译apk文件:
apktool decode xx.apk
反编译完成,我们可以看到一个”weibo”目录,目录中有一个AndroidManifest.xml文件:
通过分析AndroidManifest.xml,我们可以获取到这些信息:包名、版本信息、Activity组件等:
在<activity></activity>标签当中我们可以找到所有的activity:
0×07 refer
https://blogs.mcafee.com/mcafee-labs/testing-android-application-security-part-1/
https://github.com/sh4hin/Androl4b
blogs.mcafee.com : How to: Testing Android Application Security, Part 2
maxwithcoco.com : drozer:某APK ContentProvider安全测试
*本文作者:雪碧0xroot