当前位置:网站首页>Penetration test information collection - App information
Penetration test information collection - App information
2022-07-06 18:35:00 【Aspirin. two thousand and two】
List of articles
APP information gathering
With the rapid development of mobile Internet , Mobile intelligent terminal contains a lot of personal information and important data , Its security has increasingly become a common concern . As the fastest growing market share in recent years 、 The most popular open source mobile operating system Android, It has also become the main target of attack . To guard against malicious attacks , It is necessary to find and understand various vulnerabilities of the system and network as much as possible before the attacker , And take precautions in time . Check for system vulnerabilities , Penetration testing is one of the best ways . However , Most of the general penetration testing schemes are aimed at traditional network equipment and environment , With the emergence of traditional network security problems in the field of mobile Internet , Penetration testing for mobile intelligent terminals is also of great significance .
Move app The security threats are mainly local security , For example, remote control 、 Application cracking 、 Information theft and so on , Most people haven't noticed app The security of the server , But there are many security vulnerabilities in this area .
In massive applications ,APP There may be the following threats :
Trojan horse 、 Viruses 、 Tampering 、 Crack 、 go fishing 、 Second packing 、 Account theft 、 Advertisement implantation 、 Information hijacking, etc
lookup APP The method of server Vulnerability
1、 Decompile APP: There are two ways to decompile ,dex2jar and AndroidKiller
2、http(s) Agent grabs bag : This method takes advantage of setting up a proxy on the mobile device , Make... By manual operation app Interact with the server .
Tools
Android Simulator
ApkAnalyser Download address :https://github.com/TheKingOfDuck/ApkAnalyser
Androidkiller
burp
mind
Sometimes when website protection is done well , It can be downloaded from app Starting with , Grab the bag and find the backstage
Grab the bag 、 Decompile
Sometimes I catch bags 、 Decompile to see some sensitive information (IP、 Interface 、 Account and password 、 Crack )
It's time to grab the bag 、 Decompile to see some sensitive information (IP、 Interface 、 Account and password 、 Crack )
边栏推荐
- Release of the sample chapter of "uncover the secrets of asp.net core 6 framework" [200 pages /5 chapters]
- ADB common commands
- Xu Xiang's wife Ying Ying responded to the "stock review": she wrote it!
- 简单易用的PDF转SVG程序
- 2019阿里集群数据集使用总结
- 2019 Alibaba cluster dataset Usage Summary
- Easy to use PDF to SVG program
- POJ 2208 six lengths of tetrahedron are known, and the volume is calculated
- Excellent open source fonts for programmers
- Cocos2d Lua 越来越小样本 内存游戏
猜你喜欢
Implementation of queue
【LeetCode第 300 场周赛】
[.Net core] solution to error reporting due to too long request length
Docker安装Redis
Prophet模型的简介以及案例分析
监控界的最强王者,没有之一!
Use cpolar to build a business website (1)
This article discusses the memory layout of objects in the JVM, as well as the principle and application of memory alignment and compression pointer
Windows connects redis installed on Linux
44 colleges and universities were selected! Publicity of distributed intelligent computing project list
随机推荐
2022 Summer Project Training (I)
win10系统下插入U盘有声音提示却不显示盘符
监控界的最强王者,没有之一!
Cobra quick start - designed for command line programs
SQL优化问题的简述
Transport layer congestion control - slow start and congestion avoidance, fast retransmission, fast recovery
Brief description of SQL optimization problems
Compilation Principle -- C language implementation of prediction table
Celery best practices
Jerry is the custom background specified by the currently used dial enable [chapter]
SAP Fiori 应用索引大全工具和 SAP Fiori Tools 的使用介绍
【.NET CORE】 请求长度过长报错解决方案
Wchars, coding, standards and portability - wchars, encodings, standards and portability
On time and parameter selection of asemi rectifier bridge db207
Interview shock 62: what are the precautions for group by?
atcoder它A Mountaineer
Distill knowledge from the interaction model! China University of science and Technology & meituan proposed virt, which combines the efficiency of the two tower model and the performance of the intera
[Matlab] Simulink 同一模块的输入输出的变量不能同名
Why does wechat use SQLite to save chat records?
从交互模型中蒸馏知识!中科大&美团提出VIRT,兼具双塔模型的效率和交互模型的性能,在文本匹配上实现性能和效率的平衡!...