当前位置:网站首页>Penetration test information collection - App information
Penetration test information collection - App information
2022-07-06 18:35:00 【Aspirin. two thousand and two】
List of articles
APP information gathering
With the rapid development of mobile Internet , Mobile intelligent terminal contains a lot of personal information and important data , Its security has increasingly become a common concern . As the fastest growing market share in recent years 、 The most popular open source mobile operating system Android, It has also become the main target of attack . To guard against malicious attacks , It is necessary to find and understand various vulnerabilities of the system and network as much as possible before the attacker , And take precautions in time . Check for system vulnerabilities , Penetration testing is one of the best ways . However , Most of the general penetration testing schemes are aimed at traditional network equipment and environment , With the emergence of traditional network security problems in the field of mobile Internet , Penetration testing for mobile intelligent terminals is also of great significance .
Move app The security threats are mainly local security , For example, remote control 、 Application cracking 、 Information theft and so on , Most people haven't noticed app The security of the server , But there are many security vulnerabilities in this area .
In massive applications ,APP There may be the following threats :
Trojan horse 、 Viruses 、 Tampering 、 Crack 、 go fishing 、 Second packing 、 Account theft 、 Advertisement implantation 、 Information hijacking, etc
lookup APP The method of server Vulnerability
1、 Decompile APP: There are two ways to decompile ,dex2jar and AndroidKiller
2、http(s) Agent grabs bag : This method takes advantage of setting up a proxy on the mobile device , Make... By manual operation app Interact with the server .
Tools
Android Simulator
ApkAnalyser Download address :https://github.com/TheKingOfDuck/ApkAnalyser
Androidkiller
burp
mind
Sometimes when website protection is done well , It can be downloaded from app Starting with , Grab the bag and find the backstage
Grab the bag 、 Decompile
Sometimes I catch bags 、 Decompile to see some sensitive information (IP、 Interface 、 Account and password 、 Crack )
It's time to grab the bag 、 Decompile to see some sensitive information (IP、 Interface 、 Account and password 、 Crack )
边栏推荐
- Distiller les connaissances du modèle interactif! L'Université de technologie de Chine & meituan propose Virt, qui a à la fois l'efficacité du modèle à deux tours et la performance du modèle interacti
- Use cpolar to build a business website (1)
- Alibaba cloud international ECS cannot log in to the pagoda panel console
- 从交互模型中蒸馏知识!中科大&美团提出VIRT,兼具双塔模型的效率和交互模型的性能,在文本匹配上实现性能和效率的平衡!...
- 随着MapReduce job实现去加重,多种输出文件夹
- STM32+HC05串口蓝牙设计简易的蓝牙音箱
- Afnetworking framework_ Upload file or image server
- Maixll-Dock 摄像头使用
- UDP protocol: simple because of good nature, it is inevitable to encounter "city can play"
- win10系统下插入U盘有声音提示却不显示盘符
猜你喜欢
44 colleges and universities were selected! Publicity of distributed intelligent computing project list
Windows连接Linux上安装的Redis
This article discusses the memory layout of objects in the JVM, as well as the principle and application of memory alignment and compression pointer
Xu Xiang's wife Ying Ying responded to the "stock review": she wrote it!
Jerry is the custom background specified by the currently used dial enable [chapter]
第三季百度网盘AI大赛盛夏来袭,寻找热爱AI的你!
C language exchanges two numbers through pointers
Tree-LSTM的一些理解以及DGL代码实现
287. 寻找重复数
阿里云国际版ECS云服务器无法登录宝塔面板控制台
随机推荐
Shangsilicon Valley JUC high concurrency programming learning notes (3) multi thread lock
Easy to use PDF to SVG program
UDP协议:因性善而简单,难免碰到“城会玩”
CSRF vulnerability analysis
Bonecp uses data sources
推荐好用的后台管理脚手架,人人开源
[.Net core] solution to error reporting due to too long request length
FMT open source self driving instrument | FMT middleware: a high real-time distributed log module Mlog
C语言自动预订飞机票问题
使用cpolar建立一个商业网站(1)
图之广度优先遍历
Grafana 9.0 正式发布!堪称最强!
Stm32+mfrc522 completes IC card number reading, password modification, data reading and writing
Compilation Principle -- C language implementation of prediction table
Use cpolar to build a business website (1)
MS-TCT:Inria&SBU提出用于动作检测的多尺度时间Transformer,效果SOTA!已开源!(CVPR2022)...
2022/02/12
Celery best practices
[Matlab] Simulink 同一模块的输入输出的变量不能同名
Implementation of queue