Exported Activity Hacking

  1. Retrieve the APK File: Obtain the target APK file that you want to analyze.

  1. Install APK on the Android Emulator

  2. Decompile APK using Apktool

  3. Decode APK Contents

  4. Analyze AndroidManifest.xml: Investigate the AndroidManifest.xml file to identify declared activities and their associated permissions, Notice that there is exported Activities.

  5. Exploration of Application Features: Launch the application on the emulator to interact with its functionalities, Notice it is simple password manageer.

  6. Identify Authentication Requirements: Note any authentication mechanisms required by the application, such as password length or two-factor authentication (2FA) PIN.

  7. Access Password List Activity: Discover the Password List Activity mentioned in the AndroidManifest file, where passwords and account details are managed

  8. Attempt to Access Exported Activities: Use the Activity Manager (am start -n ) to try accessing exported activities from outside the application

  9. Investigate Potential Data Storage Locations: Start file list activity and searching for any data leakage, but found nothing + i couldn't access other activities from there.

  10. Access Password List Activity: Successfully access the Password List Activity from outside the application

  11. Encounter Error Messages: Encounter error messages when attempting to view or modify passwords due to a required service not being started.

  12. Examine Settings and Backup Options: Investigate settings options within the application to create backups of passwords

  13. Discover Backup File Accessibility: Find that backup files can be accessed via another exported activity, com.mwr.example.sieve/.FileSelectActivity

  14. Identify Security Vulnerability: Realize that plaintext passwords are accessible without authentication, potentially exposing users to password theft through malicious apps.

  15. Example code for Exploit POC

Last updated

Was this helpful?