日韩精品一区二区三区高清_久久国产热这里只有精品8_天天做爽夜夜做爽_一本岛在免费一二三区

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫Lab05  InsecureBankv2 01程序
代寫Lab05  InsecureBankv2 01程序

時間:2025-10-22  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯


Lab05 
InsecureBankv2 01



Module Code & Title:           
Programme Code & Title:
Instructor:         
Student Name:         
Student Number:


Lab Time: dd/mm/yyyy



PLEASE BE AWARE: Do not try this lab on your personal phone. If a personal Android device is used, make a backup of the data on device.

Note: You need to submit a detailed lab report, with screenshots, to describe what you have done and what you have observed. You also need to provide explanations for the observations that are interesting or surprising. Finally, answer all questions in the lab instructions if there are any.

Task 0, Install drozer
drozer (formerly Mercury) is the leading security testing framework for Android. The website is 
https://github.com/WithSecureLabs/drozer

Option 1, install latest drozer
Follow the instructions, install it with pip
pipx install drozer

Option 2, install drozer 2.4
The latest version of drozer supports python3.x. An older version is for python 2.x. If you only have Python 2.x, please install drozer 2.4. 
Download drozer-2.4.4.win32.msi and save it in the python27 folder. Ignore the warning message. 
Go to Windows Security  Virus & threat protection, and under Virus & threat protection settings select Manage settings. Switch Real-time protection to Off. 
Double click msi to install it. When asking for python version, choose the python27.

There are two options to run drozer with python2 instead of python3:
Option 1, each time before running drozer type (use your own path for python27):
set path=C:\Python27;C:\Python27\Scripts;%path%

option 2, open drozer.bat under the directory C:\Python27\Scripts, replace python.exe to C:\python27\python.exe

Back to the cmd, navigate to C:\Python27\Scripts, type:
drozer
We should see some information. Type:
drozer console connect
We should find an error.
Install libraries.
python -m pip install service_identity

After successfully installing drozer on the PC, install drozer.apk in the Android device.
download drozer.apk from 
https://labs.withsecure.com/tools/drozer
select drozer (Agent .apk only)

Open Android Studio, turn on a device. Drag the apk to the device to install it. Do not use a higher version of Android. Drozer does not support it.

Open the Drozer in the device.

Task 1, install InsecureBankv2 and tools
Step 1, install python 2.7.x.
Download and install it.
Assuming that your Python installation is in C:\Python27\, add this to your PATH: C:\Python27\;C:\Python27\Scripts\

Step 2, install pip if you have not installed it.
In the CMD, try pip
pip -help
If it returns an error, navigate to the python directory, type:
python -m ensurepip --upgrade
run:
python -m pip install protobuf
python -m pip install pyopenssl
python -m pip install twisted

Step 3
InsecureBank is a purposely vulnerable app designed for educational purposes. It has a server and an apk.
https://github.com/dineshshetty/Android-InsecureBankv2
We need to launch the server so that the vulnerable app can connect to it, and we can start reversing.

Download InsecureBankv2.apk.  Install it in virtual device. If it says the SDK version is lower, try this:
.\adb install --bypass-low-target-sdk-block InsecureBankv2.apk
Please use your own path for InsecureBank2.apk here.

Step 4, setup AndroLab server.
The back end for the InsecureBankv2 application is a simple python server running simple Flask and CherryPy web frameworks. The server component can be found in the AndroLabServer folder in the
InsecureBankv2 project source folder.

Download AndroLab source code. Navigate to the AndroLab directory. To set up the AndroLab server, use pip to install the necessary requirements.
C:\Python27\python.exe -m pip install -r requirements.txt

step 5,
Once all the requirements were installed, run the HTTP server on the default port 8888.
C:\Python27\python.exe app.py
If you encounter an “ImportError: No module named wsgiserver”, run
C:\Python27\python.exe -m pip install wsgiserver
If you encounter an “ImportError: No module named wsgiserver” error, change “from web.wsgiserver import CherryPyWSGIServer” to
from cheroot.wsgi import Server as CherryPyWSGIServer

then run again the “app.py” file to start the server.

view the available arguments for the AndroLab server component.
python app.py –help

Step, 6
Drag InsecureBankv2.pak file onto the emulator screen.
Or we use Android Debug Bridge (ADB) to connect to the emulator and install the InsecureBankv2 APK file.
adb install InsecureBankv2.apk
Once successfully installed, the application icon appears on the emulator.

Step 7, 
Once installed, open the app.


There are pre-defined users, login with either of them.
• dinesh/Dinesh@123$ 
• jack/Jack@123$
When the correct set of credentials is entered, the click of the Login button redirects us to the next screen.

Task 2
Login Vulnerabilities: Login Bypass
There are two ways to bypass login. One is using apk tool to find target activity and run it through adb. The other one is using drozer.

Option one: apk + adb
Step 1, reverse engineering the apk file.
Navigate to the apktool and run
apktool d C:\{Your Path}\InsecureBankv2.apk

Step 2, 
Look at the AndroidManifest.xml file. There are four exported Activities.


Find the activity name “PostLogin”. Using ADB, we can call this exported activity.
adb shell am start -n com.android.insecurebankv2/com.android.insecurebankv2.PostLogin

This will bring a new Activity to us that should only be available after logging in successfully, demonstrating that the login can be bypassed entirely.




Option two: drozer
Step 1, 
Run drozer in the device. The Drozer server runs on port 31415 of your device. We need to set up a suitable port forward so that our PC can connect to a TCP socket opened by the Agent inside the emulator. By default, Drozer uses port 31415. Forwarding port 31415 on the host to port 31415 on the device.
adb forward tcp:31415 tcp:31415
then, connect drozer to the device:
.\drozer console connect
This time we should find that drozer is successfully installed and working.


Step 2,
Find package name of the InsecureBankv2 application
dz> run app.package.list -f bank

determine attack surface:
dz> run app.package.attacksurface com.android.insecurebankv2
We will find the following information:

Attack Surface:
  5 activities exported
  1 broadcast receivers exported
  1 content providers exported
  0 services exported
    is debuggable
It enumerates exported activities along with the permissions necessary to invoke them, i.e. activities that can be launched by other processes on Android device. Let’s launch it
dz> run app.activity.info -a com.android.insecurebankv2
We will find:

Package: com.android.insecurebankv2
  com.android.insecurebankv2.LoginActivity
    Permission: null
  com.android.insecurebankv2.PostLogin
    Permission: null
  com.android.insecurebankv2.DoTransfer
    Permission: null
  com.android.insecurebankv2.ViewStatement
    Permission: null
  com.android.insecurebankv2.ChangePassword
    Permission: null
There are 5 exported activities. One can guess that LoginActivity is probably the one launched when the application starts. Here we will launch PostLogin activity to see what will happen.
dz> run app.activity.start --component com.android.insecurebankv2 com.android.insecurebankv2. PostLogin
Questions:
What if we launch ChangePassword? Show your screenshot.
Can an unauthenticated person have access to the device? What can he/she do after that?

If we want to fix this, remove the highlighted line.


Task 3, Hidden Create User Button for Admins
Step 1, find the source code for the “LoginActivity”.


We will find that the login activity has a hidden button. A check is performed to determine if a resource string called “is_admin” is set to “no”. If this is true, then the “setVisibility(8)” method is used to set the button invisible without taking any space for layout purposes. 

Step 2, patch the vulnerability.
Since this is a string resource, the value we need to modify should be located under the “/res/values/” directories in the strings.xml file. Open this file and change the “is_admin” value from “no” to “yes”, then save the changes.


Step 3,
Use apktool again to rebuild the application with the now modified strings.xml file.
apktool b -f -d InsecureBankv2/
We can find the new generated apk in folder dist.

Sign it.
Find the tool zipalign and apksigner, for me they are in folder


uninstall the unaltered version of the application from the emulator before installing the new APK.
# install
adb install button_InsecureBankv2-final.apk
Once successfully installed, open the application and a new button called “Create user” appears.

Step 7,
However, looking at the source code for the “createUser()” method shows that the button does not actually allow us to create a user, so this concludes the vulnerability.


Task 4, Insecure Logging
The “DoLogin” activity produces a debug log message whenever a user attempts to login.

These logs can be dumped using logcat. The command below will show all the log messages for the application while it is running.
adb logcat | grep "$(adb shell ps | grep com.android.insecurebankv2  | awk '{print $2}')"
If we attempt to login while logcat is running, we will see a log message that shows the username and password we used to successfully login.



Examining the code carefully, we find if the username is “devadmin”, the application does not require a password.  

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp

掃一掃在手機打開當前頁
  • 上一篇:代寫COM682 Cloud Native Development 程序 Coursework
  • 下一篇:代寫  COMP3771 推薦系統 代寫python System Prototype
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    2025年10月份更新拼多多改銷助手小象助手多多出評軟件
    2025年10月份更新拼多多改銷助手小象助手多
    有限元分析 CAE仿真分析服務-企業/產品研發/客戶要求/設計優化
    有限元分析 CAE仿真分析服務-企業/產品研發
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發動機性能
    挖掘機濾芯提升發動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
    海信羅馬假日洗衣機亮相AWE 復古美學與現代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
  • 短信驗證碼 目錄網 排行網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    日韩精品一区二区三区高清_久久国产热这里只有精品8_天天做爽夜夜做爽_一本岛在免费一二三区

      <em id="rw4ev"></em>

        <tr id="rw4ev"></tr>

        <nav id="rw4ev"></nav>
        <strike id="rw4ev"><pre id="rw4ev"></pre></strike>
        久久精品在线| 一区久久精品| 欧美一区二区三区视频| 国产欧美视频在线观看| 欧美一级淫片aaaaaaa视频| 久久久综合网| 亚洲国产精品va在线看黑人动漫| 欧美激情一区| 亚洲二区三区四区| 午夜免费久久久久| 欧美偷拍一区二区| 欧美在线观看一区二区| 亚洲人成在线观看网站高清| 欧美视频在线一区二区三区| 在线观看中文字幕亚洲| 极品尤物一区二区三区| 亚洲看片一区| 午夜精品久久久久久久男人的天堂| 欧美日韩一区二区免费视频| 国产精品日韩高清| 99亚洲伊人久久精品影院红桃| 亚洲欧美日本国产有色| 亚洲国产精品一区| 在线成人www免费观看视频| 欧美一区永久视频免费观看| 久久www成人_看片免费不卡| 欧美激情精品久久久久久久变态| 欧美激情亚洲综合一区| 久色成人在线| 国产伦精品一区二区三区免费迷| 欧美激情1区2区3区| 亚洲自拍16p| 国产亚洲精品资源在线26u| 欧美日韩人人澡狠狠躁视频| 亚洲大片免费看| 亚洲女与黑人做爰| 国产精品日产欧美久久久久| 亚洲影音先锋| 国产精品欧美风情| 欧美一区二区久久久| 国产精品久久久久久亚洲调教| 欧美色图天堂网| 欧美激情国产精品| 一区二区激情小说| 午夜精品视频在线观看| 激情成人av在线| 免费一区二区三区| 欧美一区亚洲一区| 国产日韩欧美高清免费| 欧美国产日韩一二三区| 先锋资源久久| 欧美日韩免费观看一区二区三区| 欧美日韩精品二区第二页| 久久亚洲精品一区| 先锋a资源在线看亚洲| 国产精品盗摄一区二区三区| 一区二区三区在线高清| 国产综合色精品一区二区三区| 午夜精品国产精品大乳美女| 久久只精品国产| 亚洲国产日韩一区| 欧美亚洲日本网站| 伊人婷婷久久| 欧美日韩中文在线| 欧美肥婆bbw| 欧美激情片在线观看| 亚洲国产专区| 欧美视频在线观看 亚洲欧| 91久久嫩草影院一区二区| 亚洲欧洲日韩女同| 黄色一区二区三区四区| 欧美国产欧美亚洲国产日韩mv天天看完整| 欧美日韩国产欧| 国产精品久久久久国产a级| 欧美午夜精品久久久久久人妖| 亚洲欧美日韩国产中文在线| 嫩草影视亚洲| 亚洲自拍三区| 欧美综合激情网| 欧美黄色精品| 欧美激情按摩在线| 亚洲美女区一区| 伊人影院久久| 久久成人这里只有精品| 国产真实乱偷精品视频免| 亚洲综合日韩中文字幕v在线| 欧美午夜精品久久久久久超碰| 欧美黑人在线观看| 欧美在线首页| 久久一区二区精品| 亚洲免费婷婷| 性欧美长视频| 久久福利一区| 亚洲国产成人av好男人在线观看| 狠狠色综合网站久久久久久久| 国产精品久久久久9999高清| 亚洲欧美日韩一区| 欧美在线视频在线播放完整版免费观看| 亚洲美女一区| 一区二区三区产品免费精品久久75| 欧美日韩日本国产亚洲在线| 久久狠狠久久综合桃花| 韩国三级在线一区| 亚洲欧美自拍偷拍| 激情综合电影网| 亚洲女人小视频在线观看| 国产亚洲欧美一级| 夜夜嗨av一区二区三区免费区| 久久av资源网站| 久久在线观看视频| 欧美人妖在线观看| 国产综合18久久久久久| 久久国产精品网站| 夜夜狂射影院欧美极品| 久久久99久久精品女同性| 欧美日韩免费精品| 亚洲免费成人av| 亚洲精品美女91| 亚洲私人影院在线观看| 国内精品一区二区三区| 欧美国产日韩一区二区在线观看| 亚洲一区3d动漫同人无遮挡| 国产精品av免费在线观看| 亚洲一区二区三区在线视频| 国产精品免费一区二区三区在线观看| 洋洋av久久久久久久一区| 欧美四级在线观看| 国产视频一区二区在线观看| 欧美精品v日韩精品v韩国精品v| 亚洲黄色免费网站| 午夜亚洲视频| 国产欧美日韩一区二区三区在线| 久久久人成影片一区二区三区观看| 亚洲欧美日韩网| 欧美日韩国产一级片| 久久精品国产精品亚洲精品| 麻豆久久精品| 欧美日韩小视频| 亚洲在线国产日韩欧美| 国产精品qvod| 亚洲国产欧美一区| 一区二区三区在线不卡| 久久激情综合网| 亚洲国产精品久久久久婷婷884| 国产精品免费区二区三区观看| 欧美人交a欧美精品| 欧美一二三视频| 亚洲伦理在线观看| 亚洲欧美日韩在线高清直播| 久久久无码精品亚洲日韩按摩| 先锋影院在线亚洲| 国产欧美一二三区| 国产精品色一区二区三区| 久久国产精品高清| 黑人一区二区| 黄色精品网站| 欧美日韩国产二区| 欧美午夜精品久久久久久人妖| 一区二区三区日韩| 免费不卡中文字幕视频| 亚洲人成7777| 亚洲人成网站777色婷婷| 欧美丝袜一区二区| 欧美高清视频www夜色资源网|