- DIVA - Download
Test DIVA - activity exported
參考1[^安全客-diva-1][^安全客-diva-2]2
- 起手式 - 確認App資訊
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36dz> run app.package.list -f diva Attempting to run shell module jakhar.aseem.diva (Diva) dz> run app.package.info -a jakhar.aseem.diva Attempting to run shell module Package: jakhar.aseem.diva Application Label: Diva Process Name: jakhar.aseem.diva Version: 1.0 Data Directory: /data/user/0/jakhar.aseem.diva APK Path: /data/app/~~ieYmYeSxvDRbS7R8da3n_g==/jakhar.aseem.diva--xnWMS5i2UVEuuoE1JHskg==/base.apk UID: 10282 GID: [3003] Shared Libraries: [/system/framework/android.test.base.jar, /system/framework/org.apache.http.legacy.jar] Shared User ID: null Uses Permissions: - android.permission.WRITE_EXTERNAL_STORAGE - android.permission.READ_EXTERNAL_STORAGE - android.permission.INTERNET - android.permission.POST_NOTIFICATIONS - android.permission.ACCESS_MEDIA_LOCATION - android.permission.READ_MEDIA_AUDIO - android.permission.READ_MEDIA_VIDEO - android.permission.READ_MEDIA_IMAGES Defines Permissions: - None dz> run app.package.attacksurface jakhar.aseem.diva Attempting to run shell module Attack Surface: 3 activities exported 0 broadcast receivers exported 1 content providers exported 0 services exported is debuggable
package name: jakhar.aseem.diva attack surface: activities exported/content providers exported/is debuggable
- 確認activiy的資訊
1
2
3
4
5
6
7
8
9dz> run app.activity.info -a jakhar.aseem.diva Attempting to run shell module Package: jakhar.aseem.diva jakhar.aseem.diva.MainActivity Permission: null jakhar.aseem.diva.APICredsActivity Permission: null jakhar.aseem.diva.APICreds2Activity Permission: null
目前有兩個被export的activity,分別啟動後如下
1
dz> run app.activity.start --component jakhar.aseem.diva jakhar.aseem.diva.APICredsActivity
1
dz> run app.activity.start --component jakhar.aseem.diva jakhar.aseem.diva.APICreds2Activity
按照[^安全客-diva-2]的說明,這是==9.Access Control Issue - Part 1==題目的畫面,原本的設想是不要按
VIEW API CREDENTIALS
這個按鈕也可以取得上面的機敏資料
另外一種解法
按照[^安全客-diva-2]作者用另外一種方式去load這個activity,先看AndroidManifest.xml,當中有特別寫到這個activity是用intent-filter當作這個activity的類似保護的東西
1 |
|
會發現前面找到的兩個activity都出現在這邊,那是否我可以直接用adb,啟動這個activity,並且給予他指定的intent,答案是肯定的
1 |
|
am start
: 啟動一個activity
-n <package name + /. + activity class name>
: 指定哪一個activity
-a <specified intent>
: 指定的 action,用於告訴應用程式以特定方式處理這個啟動動作
按照上面的指示,就會出現剛剛一樣的畫面了