Exported Activity Hacking
Last updated
Last updated
Retrieve the APK File: Obtain the target APK file that you want to analyze.
Install APK on the Android Emulator
Decompile APK using Apktool
Decode APK Contents
Analyze AndroidManifest.xml
: Investigate the AndroidManifest.xml
file to identify declared activities and their associated permissions, Notice that there is exported Activities.
Exploration of Application Features: Launch the application on the emulator to interact with its functionalities, Notice it is simple password manageer.
Identify Authentication Requirements: Note any authentication mechanisms required by the application, such as password length or two-factor authentication (2FA) PIN.
Access Password List Activity: Discover the Password List Activity mentioned in the AndroidManifest
file, where passwords and account details are managed
Attempt to Access Exported Activities: Use the Activity Manager (am start -n ) to try accessing exported activities from outside the application
Investigate Potential Data Storage Locations: Start file list activity and searching for any data leakage, but found nothing + i couldn't access other activities from there.
Access Password List Activity: Successfully access the Password List Activity from outside the application
Encounter Error Messages: Encounter error messages when attempting to view or modify passwords due to a required service not being started.
Examine Settings and Backup Options: Investigate settings options within the application to create backups of passwords
Discover Backup File Accessibility: Find that backup files can be accessed via another exported activity, com.mwr.example.sieve/.FileSelectActivity
Identify Security Vulnerability: Realize that plaintext passwords are accessible without authentication, potentially exposing users to password theft through malicious apps.
Example code for Exploit POC