Post

Mobile Application Pentest Checklist

Step-by-step to configure your environment for mobile application pentest

Mobile Application Pentest Checklist

Pre-quisite

  • Mobexler
  • Genymotion
  • Frida (for Dynamic Analysis)

Step-by-step

  1. Setting Mobexler network
  2. MobSF - uploading APK
  3. Genymotion configuration :
    • Download wifi adb from APKpure (https://apkpure.com/search?q=wifi+adb)
    • Install the apk
    • forget current wifi
    • launch the wifi adb app
    • Go to terminal and use command “adb connect x.x.x.x:xxxx

Configure Frida

  • Download frida server-android-arm64
  • unxz file.xz
  • sudo pip3 install frida-tools –upgrade
  • sudo pip3 install frida –upgrade
  • push frida server /data/local/
  • frida-ps -Ua (list all app)
  • (anti-root device) frida -U -f com.android.insecurebankv2 –codeshare dzonerzy/fridantiroot –no-pause

Configure Buprsuite

  • export burp.der
  • drag to mobexler
  • change .der to .perm
1
openssl x509 -inform DER -in burp.der -out burp.pem
  • read hash pem file
1
openssl x509 -inform PEM -subject_hash_old -in burp.pem | head -1
  • change burp.perm to the hash name
1
cp burp.pem 9a5ba575.0
  • push the file to genymotion
1
2
adb push 9a5ba575.0 /sdcard/Download
adb root;adb remount
  • check the file
  • move the file to cacerts cp 9a5ba575.0 /system/etc/security/cacerts
  • chmod chmod 644 /etc/security/cacerts/9a5ba575.0
  • add new listener to burp. add ip windows and port 8080

phone

  • check cert at setting/security
  • go to wifi setting, manually change the proxy and port (same with burp listener)
This post is licensed under CC BY 4.0 by the author.