Exported Activity Hacking
Retrieve the APK File: Obtain the target APK file that you want to analyze.

Install APK on the Android Emulator

Decompile APK using Apktool

Decode APK Contents

Analyze
AndroidManifest.xml: Investigate theAndroidManifest.xmlfile to identify declared activities and their associated permissions, Notice that there is exported Activities.
Exploration of Application Features: Launch the application on the emulator to interact with its functionalities, Notice it is simple password manageer.

Identify Authentication Requirements: Note any authentication mechanisms required by the application, such as password length or two-factor authentication (2FA) PIN.

Access Password List Activity: Discover the Password List Activity mentioned in the
AndroidManifestfile, where passwords and account details are managed
Attempt to Access Exported Activities: Use the Activity Manager (am start -n ) to try accessing exported activities from outside the application

Investigate Potential Data Storage Locations: Start file list activity and searching for any data leakage, but found nothing + i couldn't access other activities from there.
Access Password List Activity: Successfully access the Password List Activity from outside the application

Encounter Error Messages: Encounter error messages when attempting to view or modify passwords due to a required service not being started.

Examine Settings and Backup Options: Investigate settings options within the application to create backups of passwords
Discover Backup File Accessibility: Find that backup files can be accessed via another exported activity,
com.mwr.example.sieve/.FileSelectActivityIdentify Security Vulnerability: Realize that plaintext passwords are accessible without authentication, potentially exposing users to password theft through malicious apps.

Example code for Exploit POC
Last updated
Was this helpful?