In day-to-day life, Mobile security is becoming the hottest topic. This is because, we usually store family photos, pictures of pets, passwords, and much more security information. For attackers, these items are a digital passport to access everything they would need to know about a person. This is why attacks on mobile devices and applications are on the rise.
These days, Android is the leading mobile operating system in the market, it has a huge user base, and lots of personal as well as business data is being stored on Android mobile devices. Android, being the platform with the largest consumer base, is the obvious primary target for attackers.
So we will explore various attack vectors to help developers and penetration testers, as well as end-users, understand Android security and its fundamentals.
Table of Contents
Apktool
Dex2jar/JD-GUI
Drozer
QARK (No support for Windows)
Advanced REST Client for Chrome
Droid Explorer
Cydia Substrate and Introspy
SQLite browser
Frida
Vulnerable apps
Kali Linux
Android Debug Bridge
Scrcpy
ADB ToolKit
Summary
Fun with termux
Setup Before Go for Hack
Hacking Tools in Termux
AnLinux
ADB on Android
Host a Website on Android
Unlock bootloader and Rooting unlocked boot loaders on Samsung device
Flashing the Custom ROM to the phone
Securely unroot and also Re-Lock the Bootloader and Upgrade Frameware
Root an Android Device using Magisk Manager
Unlock the BootLoader and Root an Android Device [Infinix][Vivo][Oppo]
Flashing unofficial Custom ROM [LineageOS GSI]
Summary
X