Android Pentesting-Setting up lab

Setting up Gennymotion

Setting up ADB

  • adb shell that will give a shell on the device
  • adb install filename.apk this will install apk on the device
  • adb push file /data/local/tmp this will copy files onto android device and usually /data/local/tmp path is used

Installing Magisk & EdXposed

Installing Drozer ,Frida & Objection

  • pip3 install frida
  • pip3 install frida-tools
  • pip3 install objection

References

--

--

--

Pentester | CTF Player

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Flutter 3.0: Embrace TextureLayer And Say goodbye to VirtualDisplay

A Tiny Image Converter Application for Android

Fetching API/Encryption Key from Android app secured by NDK (Native Development Kit)

How to convert a website into an android app?

Part 3 — Single activity architecture + some funky Dagger

Easy preference handling in Android with Kotlin Extension functions | No BS Tutorials

Using the Gradle right way as an Android developer

Baby steps to Android development…

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
ARZ101

ARZ101

Pentester | CTF Player

More from Medium

Android Pentesting-Intents

COOKIES: AN EYE-OPENING GUIDE

Intercepting Android Emulator SSL traffic with burp using magisk

Introduction to Spring Boot Related Vulnerabilities