Mobile Application Pentest Checklist
Step-by-step to configure your environment for mobile application pentest
Mobile Application Pentest Checklist
Pre-quisite
- Mobexler
- Genymotion
- Frida (for Dynamic Analysis)
Step-by-step
- Setting Mobexler network
- MobSF - uploading APK
- Genymotion configuration :
- Download wifi adb from APKpure (https://apkpure.com/search?q=wifi+adb)
- Install the apk
- forget current wifi
- launch the wifi adb app
- Go to terminal and use command “adb connect x.x.x.x:xxxx
Configure Frida
- Download frida server-android-arm64
- unxz file.xz
- sudo pip3 install frida-tools –upgrade
- sudo pip3 install frida –upgrade
- push frida server /data/local/
- frida-ps -Ua (list all app)
- (anti-root device) frida -U -f com.android.insecurebankv2 –codeshare dzonerzy/fridantiroot –no-pause
Configure Buprsuite
- export burp.der
- drag to mobexler
- change .der to .perm
1
openssl x509 -inform DER -in burp.der -out burp.pem
- read hash pem file
1
openssl x509 -inform PEM -subject_hash_old -in burp.pem | head -1
- change burp.perm to the hash name
1
cp burp.pem 9a5ba575.0
- push the file to genymotion
1
2
adb push 9a5ba575.0 /sdcard/Download
adb root;adb remount
- check the file
- move the file to cacerts cp 9a5ba575.0 /system/etc/security/cacerts
- chmod chmod 644 /etc/security/cacerts/9a5ba575.0
- add new listener to burp. add ip windows and port 8080
phone
- check cert at setting/security
- go to wifi setting, manually change the proxy and port (same with burp listener)
This post is licensed under CC BY 4.0 by the author.