Awesome
@hpAndro1337 Android Application Security
CTF Style Android Security Challenges ctf.hpandro.raviramesh.info
Android AppSec (Kotlin) app will help you to practice for Android Security points. We do it for the right reasons - to help developers make their apps more secure. The best way to verify that your app follows secure mobile development best practices is to perform security assessments of the app, which can include automated mobile app security testing, fuzzing, manual penetration testing, and more. This application represents some of the knowledge we share with the infosec community. We are trying to build a vulnerable application based on OWASP Mobile Security Testing Guide.
We (@hpAndro and @_RaviRamesh) spend a lot of time attacking android app hacking, breaking encryption, finding bussiness logic flaws, penetration testing, and looking for sensitive data stored insecurely.
We try harder to build vulnerable application for you..
In this application we are covering below points:
- HTTP Traffic
- Public Key Pinning
- Certificate Pinning Bypass (network_security_config.xml) [Coming Soon...]
- Certificate Pinning Bypass (okhttp) [Coming Soon...]
- Certificate Pinning Bypass (Cert check) [Coming Soon...]
- Certificate Pinning Bypass (Cert Hash match) [Coming Soon...]
- Non-HTTP Traffic
- WebSocket Traffic
- Root Detection
- Root Management Apps
- Potentially Dangerous Apps [Available in Master App]
- Root Cloaking Apps
- Test Keys
- Dangerous Props [Available in Master App]
- BusyBox Binary
- Su Binary [Available in Master App]
- Su Exists
- RW System [Available in Master App]
- SafetyNet [Coming Soon...]
- Using running processes [Coming Soon...]
- Emulator detection
- Virtual Phone Number [Available in Master App]
- Device IDs [Available in Master App]
- Hardware Specifications [Available in Master App]
- QEmu Detection [Available in Master App]
- File Based Checking [Available in Master App]
- IP Based Checking [Available in Master App]
- Package Name [Available in Master App]
- Debug Flag [Available in Master App]
- Network Operator Name [Available in Master App]
- Anti-Debugging detection
- PMS Hook Detection [Coming Soon...]
- Checking TracerPid [Coming Soon...]
- Using Fork and ptrace [Coming Soon...]
- Frida Detection [Coming Soon...]
- SafetyNet [Coming Soon...]
- Debuggable Flag [Coming Soon...]
- isDebugger Connected [Available in Master App]
- Timer Checks [Coming Soon...]
- JDWP-Related Data Structures [Coming Soon...]
- Insecure Data Storage
- SQLite Databases (Unencrypted)
- SQLite Databases (Encrypted) [Available in Master App]
- Realm Databases (Unencrypted) [Coming Soon...]
- Realm Databases (Encrypted) [Coming Soon...]
- Firebase Real-time Databases [Coming Soon...]
- Shared Preferences
- Internal Storage
- External Storage
- KeyStore [Available in Master App]
- KeyChain [Coming Soon...]
- Keyboard Cache [Coming Soon...]
- User Interface [Coming Soon...]
- App Backup [Coming Soon...]
- Screenshots [Coming Soon...]
- Memory [Available in Master App]
- User Dictionary Cache [Coming Soon...]
- Clipboard [Available in Master App]
- Activity data
- Logs
- Content Providers
- SQL Injection
- File System Expose [Available in Master App]
- Encryption
- Message Authentication Codes [Coming Soon...]
- Message Digest [Coming Soon...]
- Signatures [Coming Soon...]
- Custom Implementations [Coming Soon...]
- Caesar Cipher
- Weak Key Generation [Coming Soon...]
- Weak Random Number [Coming Soon...]
- Weaker Padding [Coming Soon...]
- Symmetric Encryption
- Asymmetric Encryption
- Hashing
- Authentication
- Biometric [Coming Soon...]
- Confirm Credentials [Coming Soon...]
- 2FA - OTP Leakage
- 2FA - Response Manipulation [Available in Master App]
- 2FA - Status Code Manipulation [Available in Master App]
- 2FA - OTP Brute-Force [Available in Master App]
- 2FA - OTP Brute-Force 2 [Available in Master App]
- 2FA - Integrity Validation [Available in Master App]
- Application lock [Coming Soon...]
- Binary Protection
- RPATH [Available in Master App]
- Hardcoded Secret [Available in Master App]
- Native Function Call [Available in Master App]
- Packers [Coming Soon...]
- Obfuscator [Coming Soon...]
- Device ID
- Web Application
- HTML5 Controls
- Bruteforce
- Login Bypass - Cookies Manipulation [Available in Master App]
- Encoding - Hashing [Available in Master App]
- JavaScript - Info leak [Available in Master App]
- Server Fingerprint
- Client Side Validation Bypass
- User Password Enumeration
- OTP Bruteforce
- JWT Misconfiguration
- Guessable Session ID
- REST API HTTP Methods
- SSRF
- XXE
- Unrestricted File Upload
- LFI [Coming Soon...]
- RFI [Available in Master App]
- Deserialization [Coming Soon...]
- XPATH Injection [Available in Master App]
- Metafiles - Info Leakage [Available in Master App]
- RIA Cross Domain Policy [Available in Master App]
- Default Credentials [Available in Master App]
- OS Command Injection [Coming Soon...]
- S3 bucket misconfiguration [Available in Master App]
- Path Traversal [Coming Soon...]
- Captcha Bypass [Coming Soon...]
- IP whitelisting Bypass [Coming Soon...]
- SSTI [Available in Master App]
- Review comment and Metadata [Available in Master App]
- Code Injection [Coming Soon...]
- Old Backup Files [Available in Master App]
- Insecure Direct Object Reference [Available in Master App]
- JSON to XXE (Blind) [Available in Master App]
- Miscellaneous
- Deeplink [Coming Soon...]
- QR Code
- Backdoor1
- Backdoor2
- Backdoor3
- Backdoor4
- Backdoor5
- Backdoor6 [Available in Master App]
- Backdoor7 [Available in Master App]
It will be great if you can support and share your thoughts with us to improve this application.