Sec-88
search
Ctrlk
Sec-88
  • 🧑Whoami
  • 🕸️Web-AppSec
  • ✉️API-Sec
  • 📱Android-AppSec
    • Android App Pentesting Checklist
    • Setup Android App Pentesting environment on Arch
    • Setup Android App Pentesting environment on Mac M4
    • Genymotion - Proxying Android App Traffic Through Burp Suite
    • Setup Android Pentesting Environment on Debian Linux
    • Android App Fundamentals
    • Android App Components Security Cheatsheet
    • SSL Pinning Bypass
    • Decompile a Hermes React Native Binary
    • Get APK for Target
    • ADB Commands
    • APK structure
    • Android Permissions
    • Exported Activity Hacking
    • BroadcastReceiver Hacking
    • Content Provider Hacking
    • Signing the APK
    • Reverse Engineering APK
    • Deep Links Hacking
    • Drozer Cheat Sheet
    • SMALI
    • Intent Redirection Vulnerability
    • Janus Vulnerability (CVE-2017-13156)
    • Task Hijacking
    • Frida Cheat Sheet
    • Magisk & LSPosed Modules
  • appleIOS-AppSec
  • 📶Network-Sec
  • 💻Desktop AppSec
  • ☁️Cloud Sec
  • 👨‍💻Programming
  • 🖥️Operating Systems
  • ✍️Write-Ups
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. 📱Android-AppSec

Setup Android App Pentesting environment on Mac M4

LogoSetup Android App Pen-testing environment on Mac-book M1Mediumchevron-right
LogoSetting Up an Android App Pen-Testing Environment on MacBook M1LinkedInEditorschevron-right
LogoHow to set up a mobile pen testing environment | M4G0m4g0.comchevron-right

hashtag
Install Java

hashtag
Install Android Command line tools

LogoDownload Android Studio & App Tools - Android DevelopersAndroid Developerschevron-right

hashtag
Install Emulator

hashtag
Install apksigner

hashtag
Create and Run an Emulator

hashtag
Create Android Virtual Device

hashtag
Run the AVD

hashtag
Install apktool

hashtag
Install Frida

hashtag
Install APK Signer

LogoReleases · patrickfav/uber-apk-signerGitHubchevron-right

hashtag
Install dex2jar

hashtag
Install Drozer

hashtag
Install Jadx

hashtag
Install Magisk

LogoRelease Magisk v28.1 · topjohnwu/MagiskGitHubchevron-right

hashtag
Rooting Android Studio Emulator

LogoGitHub - newbit1/rootAVD: Script to root AVDs running with QEMU Emulator from Android StudioGitHubchevron-right

hashtag
Magisk Frida

LogoGitHub - ViRb3/magisk-frida: 🔐 Run frida-server on boot with Magisk, always up-to-dateGitHubchevron-right
PreviousSetup Android App Pentesting environment on Archchevron-leftNextGenymotion - Proxying Android App Traffic Through Burp Suitechevron-right

Last updated 11 months ago

  • Install Java
  • Install Android Command line tools
  • Install Emulator
  • Install apksigner
  • Create and Run an Emulator
  • Create Android Virtual Device
  • Run the AVD
  • Install apktool
  • Install Frida
  • Install APK Signer
  • Install dex2jar
  • Install Drozer
  • Install Jadx
  • Install Magisk
  • Rooting Android Studio Emulator
  • Magisk Frida
brew install openjdk
brew install --cask temurin
or 
brew install android-commandlinetools
mkdir /Library/Android
mkdir /Liberary/Android/sdk
mv cmdline-tools /Liberary/Android/sdk/
cd /Library/Android/sdk/cmdline-tools
mkdir latest
mv * latest/
echo 'export ANDROID_SDK_ROOT=/Library/Android/sdk' >> ~/.zprofile
echo 'export PATH=$ANDROID_SDK_ROOT/cmdline-tools/latest/bin:$ANDROID_SDK_ROOT/platform-tools:$PATH' >> ~/.zprofile
source ~/.zprofile
sdkmanager --list
sdkmanager --install "platform-tools" "emulator"
sdkmanager --channel=0 --install "build-tools;31.0.0” 
echo 'export PATH=$ANDROID_SDK_ROOT//build-tools/31.0.0/lib' >> ~/.zprofile
source ~/.zprofile
sdkmanager --install "system-images;android-26;google_apis;arm64-v8a"                               echo 'export PATH=$PATH:/Library/Android/sdk/emulator' >> ~/.zprofile
source ~/.zprofile
avdmanager create avd -n my_emulator_arm -k "system-images;android-26;google_apis;arm64-v8a" --force
emulator -avd my_emulator_arm
brew install apktool
pipx install frida-tools
# make sure that your emulator virtual device is arm 
adb shell getprop ro.product.cpu.abi
arm64-v8a
# install frida server frida-server-16.6.6-android-arm64.xz
https://github.com/frida/frida/releases
unxz frida-server-16.6.6-android-arm64.xz
adb push frida-server-16.6.6-android-arm64 /data/local/tmp/
adb shell mv /data/local/tmp/frida-server-16.6.6-android-arm64  /data/local/tmp/frida-server
adb shell chmod +x /data/local/tmp/frida-server
adb shell /data/local/tmp/frida-server &
brew install dex2jar
pipx install drozer 
# https://github.com/WithSecureLabs/drozer-agent/releases/tag/3.1.0
adb install drozer-agent.apk
adb forward tcp:31415 tcp:31415
drozer console connect
brew install jadx