Android Vulnerability Assessment and Penetration Testing — Part 2

Rajanagori
3 min readMay 20, 2021

Hello Security Researchers,

In this part of the android VAPT, I’m going to mention the Dynamic Analysis part of the android application.

Tools Required

  1. Genymotion
  2. Frida
  3. VirtualBox
  4. Train your brain again 😛

Dynamic Analysis

For Dynamic Analysis, performing VAPT on any application running at the production level and can be used publicly.

I will be covering

  1. Installing Frida
  2. Root Detection Bypass

Installing Frida

I know python2 is tested positive and died in corona but we still miss him in some cases, LOL!

Well, Installing Frida is super easy. Now what you need to do is just follow the step mentioned given below.

  1. Install ADB driver
    because I’m a hardcore Linux lover so

but I will help windows user too 😜

2. Now you need to download Frida-server of 32bit or x86 for android architecture. For that, you need to run the following command.

3. Now you need to install the Frida tool, but why we miss python2? 💭
because there are some dependencies of python2 so first we will install pip2 for python2.
Note: Just follow the instruction in the mentioned gist link.

4. Now it’s high time to install Frida the almighty tool and for that just run only one command

You’re all set, let’s hack !!

Root Detection Bypass

What is Root Detection Bypass?
Well, When you have something in your brain and you suddenly decided to root your android device and try to run the application in your rooted device then it tends to allow users to run code with root permissions. This means that users can have full control over what their phone is doing. Rooting is the process of enabling root access to an Android device.

So, most android applications have checks to detect the rooted device at the time of installation or running the application and we need to bypass the check-in order to successfully perform root detection bypass.

  1. First, connect the android device with adb driver
Adb connect to android device

2. Now push the frida server using add to android device tmp folder

3. After pushing the frida-server, now we need to run the server in order to intercept the running services in the android device

4. when you start the server, you need to intercept and display the services running inside the android device. To intercept the services run 🔽
(Trust me this is my most interesting part)

It will display a list

A detailed list of services running

5. Now for root detection bypass you need to take help from here.

6. type %resume and wait to restart the application. If the root detection alert is gone after restart then you successfully bypass the root detection.

Do CLAP if you find this blog useful.

Contact me :

LinkedIn 😄:https://www.linkedin.com/in/raja-nagori/

Twitter 😄: https://twitter.com/RajaNagori7

--

--