0x01 Original Intention and Applicable Scenarios
Android’s USB debugging mode is designed for developers. Developers can use it to debug or test applications during the application development process.
adb provides a series of functions that are helpful for development, such as application installation and uninstallation, backup and recovery, log output and filtering, and it also provides a very user-friendly adb shell with considerable permissions.
In addition to developers, reverse analysts also use the adb interface when conducting reverse analysis and dynamic debugging of applications. For example, through this interface, they can dynamically debug and track so or smali, and dynamically debug some functional codes. Verify and so on.
However, convenience and security are inversely proportional to a certain extent. Under its rich functions, there are also a series of security issues.
0x02 Adb information leakage and permission leakage problem
If the debugging information output by logcat is not deleted when the application is released, it is very likely to cause sensitive information to be leaked. In minor cases, for example, logcat may print out the application The visited web page link or some other intermediate variables may also leak the account password. After all, the threshold for Android development is low, and the level of developers is inevitably uneven.
In order to facilitate debugging, developers may even write like this:
Android logcat information leaks have been disclosed many times in the past, such as:
WooYun: Tuniu.com app logcat information leaked users’ Group chat content
WooYun: Surfing browser logcat outputs user text messages
WooYun: Hangzhou Bank Android client login account and password information is leaked locally
In addition, many Android application vulnerability scanning platforms currently on the market will also focus on logcat The abuses are scanned and presented in the report, such as Tencent King Kong Audit System, Alibaba Security, 360 Risk Mirror (former Bug Hunter), etc. This also reflects the universality of this problem from the side.
In addition to the mistakes of developers, there are also some flaws in the design of adb itself. There was once a paper that specifically studied this issue: "Bittersweet ADB: Attacks and Defenses".
Through ADB or an Android application that has applied for ADB permissions, you can monitor private information such as text messages and phone records without applying for permissions, monitor/simulate screen click events, access private directories of other applications, and monitor Android devices Conduct DoS attacks, etc.
Most of the above behaviors can be obtained through the adb shell dumpsys command. For more details, please see the reference link [2].
0x03 Android backup problem
This is a very old problem. In low-version Android systems, when backing up an application, its private data will be backed up, and then you can Specific tools extract them, as shown below:
So what are the private data of applications? First of all, there will be personal identity credentials, or account passwords or other credentials. Generally, applications have private data I am quite confident. After all, it is called "private data", so many applications directly store it in plain text. Although some are encrypted, the data can be decrypted through reverse analysis of the application. For example, from a certain The content backed up in the client contains the following files:
You can find the decryption process by reverse engineering the apk, and you can decrypt it by copying the decryption class and method:
Another example is WeChat’s database , some articles have analyzed the encryption process of the WeChat database and given the method of generating the encryption key. If the WeChat local database, uin, and imei are obtained at the same time, the encryption key of the database can be calculated based on the latter two. And decrypt the encrypted database. At this time, all your chat records will be directly exposed to the sun.
In addition to directly manually decrypting the data, you can also restore the data intact to another mobile phone through adb restore, thereby forging identity, such as the article on droidsec "Steal the Weibo account of the goddess around you in two minutes" (refer to Link [4])
Some people have noticed that when using adb backup, you need to manually click to confirm before backing up. If the attacker does not have the opportunity to click on the screen, there will be no problem. However, Android has a mechanism called the input and output subsystem. In adb The sendevent command can be executed under the shell and can simulate various user inputs. Each model is different. On my machine, sending the following event can simulate the click and allow operation:
#EV_KEY BTN_TOUCH DOWN sendevent /dev/input/event7 1 330 1 #EV_ABS ABS_MT_POSITION_X 366 sendevent /dev/input/event7 3 53 366 #EV_ABS ABS_MT_POSITION_Y 690 sendevent /dev/input/event7 3 54 690 #EV_SYN SYN_REPORT 00000000 sendevent /dev/input/event7 0 0 0 #EV_KEY BTN_TOUCH UP sendevent /dev/input/event7 1 330 0 #EV_SYN SYN_REPORT 00000000 sendevent /dev/input/event7 0 0 0
0x04 through adb stallion
Since it is through adb The application can be installed, and it is silent, so naturally it can be used for you without the user being aware of it.
However, ordinary horses may not have icons and interfaces to increase the chance of being discovered, and applications that have not been launched cannot run, which means that the BroadcastReceiver they registered cannot receive anything. It needs A process of awakening.
Fortunately, adb shell can also realize this wake-up process. The adb shell am command can start specific components of specific application packages, so that the pony can run successfully.
Of course, if the attacker has a more powerful method, such as directly adb pushing an exploit and elevating privileges to root, it will be simpler and more crude.
0x05 Malicious code injection
This method is relatively elegant. When connected to USB debugging, you can use a series of commands to inject a custom malicious code into the installed application on the phone. This code It can be as simple as playing a greeting, or it can be very complicated remote control.
In order to further increase the credibility, you can choose an application that has applied for high permissions for injection. For example, after injecting an address book management software, it requests to read your contact list, which seems to be fine.
Although academia and industry have many measures to prevent repackaging, in actual tests, the success rate of this attack method is really not low, and even if the injection into an application fails, the crudest method can still be used. pm list packages -3 List all packages and try it again.
The following I wrote a simple program to inject a metasploit meterpreter http reverse shell payload into an application on a mobile phone with USB debugging turned on. There is no need to perform any operations on the mobile phone during the whole process. The general workflow is as follows:
When you click the injected application again, you will receive a meterpreter shell on the handler opened on the listening server:
The above, you can remotely control the Android application on the server side , after getting the Android meterpreter shell, you can do many things, including privacy stealing, sending text messages, opening web pages, taking screenshots, and taking photos.
Even, you can call your front and rear cameras for real-time monitoring.
Some of the commands supported are as follows:
0x06 Finally
In Android versions after 4.4, if you want to connect to adbd on an Android device, you need to verify the fingerprint of the host machine, which to a large extent Reduces the possibility of being attacked through these methods. However, today's Android management software on PC strongly encourages you to turn on USB debugging, and will even teach you step by step how to turn it on, so a considerable number of people are still exposed to this risk.
As you can see from the above, there are still many things that can be done through adb. The above are just some of the commonly used methods. If you want to completely prevent being attacked by the above methods, the simplest and most effective way is to turn off USB debugging. , and try to download trusted applications from regular application markets.
After all, imagine if you are at a train station or a public place, using a public charging socket that someone put there, and there is a malicious computer behind it, and you happen to open it, or you are induced by it to open it. USB debugging...

根据美国司法部的解释,蓝色警报旨在提供关于可能对执法人员构成直接和紧急威胁的个人的重要信息。这种警报的目的是及时通知公众,并让他们了解与这些罪犯相关的潜在危险。通过这种主动的方式,蓝色警报有助于增强社区的安全意识,促使人们采取必要的预防措施以保护自己和周围的人。这种警报系统的建立旨在提高对潜在威胁的警觉性,并加强执法机构与公众之间的沟通,以共尽管这些紧急通知对我们社会至关重要,但有时可能会对日常生活造成干扰,尤其是在午夜或重要活动时收到通知时。为了确保安全,我们建议您保持这些通知功能开启,但如果

Android中的轮询是一项关键技术,它允许应用程序定期从服务器或数据源检索和更新信息。通过实施轮询,开发人员可以确保实时数据同步并向用户提供最新的内容。它涉及定期向服务器或数据源发送请求并获取最新信息。Android提供了定时器、线程、后台服务等多种机制来高效地完成轮询。这使开发人员能够设计与远程数据源保持同步的响应式动态应用程序。本文探讨了如何在Android中实现轮询。它涵盖了实现此功能所涉及的关键注意事项和步骤。轮询定期检查更新并从服务器或源检索数据的过程在Android中称为轮询。通过

为了提升用户体验并防止数据或进度丢失,Android应用程序开发者必须避免意外退出。他们可以通过加入“再次按返回退出”功能来实现这一点,该功能要求用户在特定时间内连续按两次返回按钮才能退出应用程序。这种实现显著提升了用户参与度和满意度,确保他们不会意外丢失任何重要信息Thisguideexaminesthepracticalstepstoadd"PressBackAgaintoExit"capabilityinAndroid.Itpresentsasystematicguid

1.java复杂类如果有什么地方不懂,请看:JAVA总纲或者构造方法这里贴代码,很简单没有难度。2.smali代码我们要把java代码转为smali代码,可以参考java转smali我们还是分模块来看。2.1第一个模块——信息模块这个模块就是基本信息,说明了类名等,知道就好对分析帮助不大。2.2第二个模块——构造方法我们来一句一句解析,如果有之前解析重复的地方就不再重复了。但是会提供链接。.methodpublicconstructor(Ljava/lang/String;I)V这一句话分为.m

如何将WhatsApp聊天从Android转移到iPhone?你已经拿到了新的iPhone15,并且你正在从Android跳跃?如果是这种情况,您可能还对将WhatsApp从Android转移到iPhone感到好奇。但是,老实说,这有点棘手,因为Android和iPhone的操作系统不兼容。但不要失去希望。这不是什么不可能完成的任务。让我们在本文中讨论几种将WhatsApp从Android转移到iPhone15的方法。因此,坚持到最后以彻底学习解决方案。如何在不删除数据的情况下将WhatsApp

原因:1、安卓系统上设置了一个JAVA虚拟机来支持Java应用程序的运行,而这种虚拟机对硬件的消耗是非常大的;2、手机生产厂商对安卓系统的定制与开发,增加了安卓系统的负担,拖慢其运行速度影响其流畅性;3、应用软件太臃肿,同质化严重,在一定程度上拖慢安卓手机的运行速度。

1.启动ida端口监听1.1启动Android_server服务1.2端口转发1.3软件进入调试模式2.ida下断2.1attach附加进程2.2断三项2.3选择进程2.4打开Modules搜索artPS:小知识Android4.4版本之前系统函数在libdvm.soAndroid5.0之后系统函数在libart.so2.5打开Openmemory()函数在libart.so中搜索Openmemory函数并且跟进去。PS:小知识一般来说,系统dex都会在这个函数中进行加载,但是会出现一个问题,后

1.自动化测试自动化测试主要包括几个部分,UI功能的自动化测试、接口的自动化测试、其他专项的自动化测试。1.1UI功能自动化测试UI功能的自动化测试,也就是大家常说的自动化测试,主要是基于UI界面进行的自动化测试,通过脚本实现UI功能的点击,替代人工进行自动化测试。这个测试的优势在于对高度重复的界面特性功能测试的测试人力进行有效的释放,利用脚本的执行,实现功能的快速高效回归。但这种测试的不足之处也是显而易见的,主要包括维护成本高,易发生误判,兼容性不足等。因为是基于界面操作,界面的稳定程度便成了


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version
Useful JavaScript development tools

SublimeText3 Linux new version
SublimeText3 Linux latest version
