Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/t0thkr1s/allsafe
Intentionally vulnerable Android application.
https://github.com/t0thkr1s/allsafe
android bugbounty bypass certificate dynamic-analysis forthebadge frida frida-scripts hackerone-reports hardcoded-credentials mobile-security reverse reverse-engineering vulnerabilities vulnerable vulnerable-android-apps
Last synced: about 1 month ago
JSON representation
Intentionally vulnerable Android application.
- Host: GitHub
- URL: https://github.com/t0thkr1s/allsafe
- Owner: t0thkr1s
- License: apache-2.0
- Created: 2020-11-14T12:06:54.000Z (about 4 years ago)
- Default Branch: master
- Last Pushed: 2024-04-03T04:46:02.000Z (8 months ago)
- Last Synced: 2024-05-01T17:54:35.481Z (7 months ago)
- Topics: android, bugbounty, bypass, certificate, dynamic-analysis, forthebadge, frida, frida-scripts, hackerone-reports, hardcoded-credentials, mobile-security, reverse, reverse-engineering, vulnerabilities, vulnerable, vulnerable-android-apps
- Language: Java
- Homepage: https://medium.com/infosec-adventures
- Size: 498 KB
- Stars: 189
- Watchers: 4
- Forks: 64
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-vulnerable-apps - Allsafe - Allsafe is an intentionally vulnerable application that contains various vulnerabilities. (Mobile Security)
- awesome-hacking-lists - t0thkr1s/allsafe - Intentionally vulnerable Android application. (Java)
README
# Allsafe
[![forthebadge](https://forthebadge.com/images/badges/built-for-android.svg)](https://github.com/t0thkr1s/)
Allsafe is an intentionally vulnerable application that contains various vulnerabilities. Unlike other vulnerable Android apps, this one is less like a CTF and more like a real-life application that uses modern libraries and technologies. Additionally, I have included some Frida based challenges for you to explore. Have fun and happy hacking!
#### Useful Frida Scripts
I have my Frida scripts (more like templates) in other repository. I'm sure they might be quite handy for the Frida related tasks. Check it out: https://github.com/t0thkr1s/frida## Tasks / Vulnerabilities
### 1. Insecure Logging
Simple information disclosure vulnerability. Use the `logcat` command-line tool to discover sensitive information.
###### Resources & HackerOne Reports:
- [Logcat Tool](https://developer.android.com/studio/command-line/logcat)
- [Coinbase OAuth Response Code Leak](https://hackerone.com/reports/5314)Show me how it's done!
adb shell 'pidof infosecadventures.allsafe'
Take output and substitue for
adb shell 'logcat --pid | grep secret'---
### 2. Hardcoded Credentials
Some credentials are left in the code. Your task is to reverse engineer the app and find sensitive information.
###### Resources & HackerOne Reports:
- [Zomato Hardcoded Credentials](https://hackerone.com/reports/246995)
- [8x8 Hardcoded Credentials](https://hackerone.com/reports/412772)
- [Reverb Hardcoded API Secret](https://hackerone.com/reports/351555)Show me how it's done!
# TODO---
### 3. Root Detection
This is purely for Frida practice. Make the code believe that your device is not rooted!
Show me how it's done!
https://youtu.be/Gg-3Sw79gEI---
### 4. Arbitrary Code Execution
Loading modules securely with third-party apps are not easy. Write a PoC application and exploit the vulnerability!
###### Resources & HackerOne Reports:
- [Arbitrary Code Execution via Third-Party Package Contexts](https://blog.oversecured.com/Android-arbitrary-code-execution-via-third-party-package-contexts/)
Show me how it's done!
# TODO---
### 5. Secure Flag Bypass
Another Frida-based task. No real vulnerability here, just have fun bypassing the secure flag!
###### Resources & HackerOne Reports:
- [Android FLAG_SECURE Reference](https://developer.android.com/reference/android/view/WindowManager.LayoutParams#FLAG_SECURE)
Show me how it's done!
# TODO---
### 6. Certificate Pinning Bypass
Certificate pinning is implemented using the OkHttp library. You have to bypass it in order to view the traffic with Burp Suite.
###### Resources & HackerOne Reports:
- [Certificate and Public Key Pinning](https://owasp.org/www-community/controls/Certificate_and_Public_Key_Pinning)
- [Coinbase Vulnerabilities](https://hackerone.com/reports/5786)Show me how it's done!
# TODO---
### 7. Insecure Broadcast Receiver
There's a vulnerable broadcast recevier in the application. Trigger it with the correct data and you're done!
###### Resources & HackerOne Reports:
- [Android Broadcasts Overview](https://developer.android.com/guide/components/broadcasts)
- [ok.ru Broadcast Receiver Exploitation](https://hackerone.com/reports/97295)
- [Bitwarden Vulnerable Broadcast Receiver](https://hackerone.com/reports/289000)Show me how it's done!
# TODO---
### 8. Deep Link Exploitation
Similar to the insecure broadcast receiver, you need to provide the right query parameter to complete this task!
###### Resources & HackerOne Reports:
- [Android Deep Linking](https://developer.android.com/training/app-links/deep-linking)
- [Grab Insecure Deep Link](https://hackerone.com/reports/401793)
- [Periscope Deep Link CSRF](https://hackerone.com/reports/583987)Show me how it's done!
# TODO---
### 9. SQL Injection
Just a regular SQL injection that you'd find in web applications. No need to reverse the code to bypass the login mechanism.
###### Resources & HackerOne Reports:
- [SQL Injection in Content Provider](https://hackerone.com/reports/291764)
Show me how it's done!
# TODO---
### 10. Vulnerable WebView
You can also complete this task without decompiling the application. Pop an alert dialog and read files!
###### Resources & HackerOne Reports:
- [ownCloud WebView XSS](https://hackerone.com/reports/87835)
Show me how it's done!
# TODO---
### 11. Smali Patching
In this task, you have to modify the execution flow of the application by editing the Smali code. Finally, rebuild and sign the APK!
###### Resources & HackerOne Reports:
- [Uber APK Signer](https://github.com/patrickfav/uber-apk-signer)
Show me how it's done!
# TODO---
### 12. Native Library
The application uses a native library that validates the entered password. Reverse engineer the library to find the password then use Frida to hook the native method.
###### Resources & HackerOne Reports:
- [Ghidra](https://github.com/NationalSecurityAgency/ghidra)
- [Cutter](https://github.com/rizinorg/cutter)Show me how it's done!
# TODO---
### Contribute
Noticed a bug? Have a suggestion? Feel free to open an issue or create a pull request!
### Support
If this project was valuable to you or helped you in any way, please consider making a small amount of donation via the following cryptocurrencies. Giving a star on the project also helps a lot. Thanks!
**Bitcoin Address**
⟹ *bc1qd44kvj6zatjgn27n45uxd3nprzt6rm9x9g2yc8***Ethereum Address**
⟹ *0x1835a58E866a668C48Ee63d32432C7Fe28aF54b4*### Disclaimer
> This tool is only for testing and academic purposes and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this tool and software.
## License
This project is licensed under the GPLv3 License - see the [LICENSE](LICENSE) file for details