Subscribe to Blog via Email

Categories

Archives

Penetration Testing

Android Pentest Lab Setup & ADB Command Cheatsheet

Introduction

To learn android pentest in a much handier way we’ll be setting up Android Pentest environment in our own system rather than conducting an experiment on a live device. It is to be noted that these practicals can be conducted on a phone with USB debugging option on as well, but we’ll be using an Android virtual machine, also known as, Android Emulator. Genymotion is one example of android emulators that are available to download in the market that can be very helpful for Android penetration testing. It is a preferred choice while setting up a lab for android pen testing because it is easy to setup, offers ADB support and Google Apps support. We’ll be using Genymotion to demonstrate all of our examples in this series, but an individual can use any other emulator that provides basic functionality support as Genymotion does. Let’s begin.

Table of Content

  1. Installation of Virtual Environment
  2. Getting Started with Debugging
  3. ADB Command Cheatsheet

Installation of Virtual Environment

To download genymotion for free head over to this website and download genymotion. If you have VirtualBox installed you can choose without Virtualbox edition and otherwise with VirtualBox. Once you have downloaded you can login on the main screen and accept the license document to get started.

Creation of Android Virtual Machine (AVM)

After logging in you’ll see a blank screen having 5 different options on the sidebar and a big plus button (+) that is used to create an Android virtual machine. Click on this plus sign.

Upon clicking you’ll see a screen like following that’ll have various options available for different specifications of the virtual machine. You can choose your testing device and Android API you want to install. We’ll be using Google Pixel 2 with Android API 28.

What is Android APIs? Android API refers to the collection of various software modules having different versions that make an Android SDK. In simpler words, A specific API version will correspond to a specific Android release as follows: –

It is recommended to perform testing on newer APIs only.

Next step is to configure cores, RAM and networking mode. I’ll be setting up 1 core for processing, 1GB of RAM and NAT mode as follows

Once the install button is clicked, the respective API will first be downloaded if not already available in the SDK and then the machine will be ready to launch like following. Right click on it and press start

This will initiate a virtual box instance under genymotion’s window and the first thing that we’ll do is start networking on the virtual machine by clicking the signal icon.

next is to turn the switch to ON and choose the respective networking adapter you want to allocate. In my case a Wi-Fi connection is active so I’ll be allocating Wi-Fi to the machine.

Next is to install Google apps in the virtual machine which won’t come preloaded in the API. This is needed in situations where an app from the play store has to be downloaded and tested or some other google app has to be used within this virtual machine. We’ll do this by clicking the Open GAPPS button.

Simply accept the agreement and we’re good to go.

IMPORTANT: In many scenarios, this type of installation may fail giving an “archive error”. In such cases, it is recommended to download Open GApps archive from their website here.

I chose x86 architecture and android version 9.0 with stock variant

After download, simply drag and drop the archive in genymotion window to install the apps. After installation and reboot, you’ll see the Google Apps have been successfully installed.

Getting Started With Debugging

Now we are done with our environment setup. In previous screenshots, you must have noticed the IP address of the virtual machine on the title bar. In my case, it is 192.168.52.104. It is time to try and connect to this virtual machine using the Android Debug Bridge (adb tool).

We head over to Kali and type the following command: –

What is USB debugging? Debugging is a way for an Android device to communicate with the Android SDK over a USB connection. It allows an Android device to receive commands, files etc from the PC, and allows the PC to pull crucial information like log files from the Android device.

What is ADB? Android Debug Bridge is a utility that provides debugging features for android devices. ADB can be used to conduct debugging over USB as well as over TCP. We’ll learn more about ADB in detail in the next section.

ADB Command Cheatsheet

Basics

  1. Shell – As we are aware, Android has a Linux kernel. To spawn a shell in the connected device using ADB, we’ll use the command:

The last command helps you view the architecture of the device you’re using.

  1. Installation of APK in device

Let’s say we have an APK kept in the downloads folder of our system that we want to install in one of the devices. Here, I’ve downloaded DIVA from this link. We can do that in adb using the following command:

And sure enough, the application was found in the device.

  1. Viewing Installed Applications

All the applications installed in the device is kept under /data/data folder. So, we’ll simply traverse to the folder and view the 10 recent installed applications.

  1. Starting and Stopping adb service

This is simply done by the following two commands:

Please note that many of the commands in the upcoming demonstration would require you to run them as root on the android device and hence, we’ll run adb as root. To run it as root you need the following commands:

To revert back to unroot status:

Logs

  1. To monitor device logs we’ll use the logcat tool.

As you can see all types of logs are now visible. We input credit card number in one of the functions in DIVA and that’s also visible here demonstrating insecure logging vulnerability.

We can explore much other filters and options in logcat under the man page like prioritizing logs, writing logs to log files, dumping logs, rotating log files etc in the master page here.

Pulling and Pushing Files

To copy a file from system to android and android to the system, one can use the adb push and pull. Let’s consider copying file to the Android device using push.

To ensure that the file had got transferred to the location /sdcard/ we first delete the original file and then pull that file and access it.

pm tool

  1. Listing: Package Management in Android refers to the management of all the installed packages/ applications in the android. ex: DIVA app’s package name is jakhar.aseem.diva as visible in the list packages command below:

  1. Listing system apps: There are some filters you can apply to sort these packages, like to list all the system apps:

  1. Listing third-party apps: Similarly, to view all the third-party apps, we have the command:

  1. Clearing data of an application: This process is the same as going to the settings and getting rid of its data. To do that we have the following command:


  1. Display installation path of a package: Can be done using the pm tool like:

dumpsys tool

  1. View running services in a package: It is done using dumpsys command in shell. Dumpsys is a tool that runs on android devices and provides info about system services which can be called from the command line using adb. To view running services in a package:

It is interesting to note that this displays services related to diva package. If we input this command without a package name all the services will be output.

  1. Extracting information about a package: A package will have components like actions, activities, content providers etc as mentioned in the previous article and to view this information about a specific package we use the following command:

  1. View foreground activity: The activity that is currently on the main screen can be displayed with the following command:

  1. Information about activities in a specific package: To view the details of activities like current activity paused, history of all the activities opened etc, type in the following command:

  1. Viewing running services of a package: The package name is optional in this command as that will open the running services related to that package. It is as follows:

  1. Viewing detailed information about a package: A package has many details ike components, permissions info, version name and code etc. To view these details:

am tool

Activities are any page coded in java that performs a specific task. What’s interesting is that these activities can also be played around with adb. Many of these functions are performed using another tool called am that is installed in android to give information about activities.

  1. Starting Activity: To start an activity, in this case, main activity using adb we type in the following command:

This would open up APICredsActivity activity like this:

And the other activity too:

  1. Start/Stop Service: To stop a service we use the following command:

This command will stop the System UI. There would be a blank screen until we start it again using this command:

Miscellaneous

  1. Capturing a screenshot: screencap is a handy tool installed in android to take screenshots. This tool is running behind the screenshot feature and can be called using adb like:

2nd argument is the local path where the screenshot will be stored and we can customise it. In this case, I’ve put in sdcard/ as the path and we traverse to that folder to see ss_2.png there:

  1. Recording the screen: Just like screenshots can be taken, a video recording of the screen is also possible using the screenrecord tool in android with the following command:

/sdcard/demo.mp4 – Path to store the recording

size – The size in pixelxpixel (heightxwidth) in which the video will be recorded

bit-rate – Corresponds to the quality of the video in short

time-limit – Max time to which screen will be recorded

rotate – Makes default portrait orientation upside down and vice versa in the recording. Can be customised for specific angles.

We’ll see output like the following:

  1. Viewing process ID of a package: It is important from a pentester’s point of view to know the process ID of an application package. This can be done by:

For example, I have to inspect the logs of this package, I can filter it out using grep and the PID like:

  1. Viewing Battery Status: All the information, from voltage to level can be dumped using dumpsys battery command:

We can play around with the battery level by the following command:

Sure enough, let’s see how the battery now looks like:

  1. Keyevents in Android: Each key in Android is described by a sequence of key events. These can be described as follows:

Let’s try out keyevent 3. Here is a page with a random activity opened up:

Now, the command to send key event 3 is:

After the command, a home button has been pressed and the screen looks like:

  1. Viewing kernel logs: To view kernel logs for testing purposes we can type in the following command:

The list would be too long so I’ll just view first 20 logs:

  1. Enumerating device:
  •  To find out the model of the phone you’re connected to getprop tool in android is usable:

  • wm tool– wm tool in android relates and gives information about windows. To find out the window resolution we use the following command:

adb shell wm size

To find information about display screen like DPI, Display ID number etc we type in the following command:

We can modify the screen resolution as well with wm tool using the following command:

where the size is in pixels.

After reboot the window will look something like this:

  • Secure Android ID and IMEI number: Secure Android ID is a 64 bit number that is generated on the first boot. This ID is also available in the settings. This remains constant. On the other hand, IMEI number is a unique telephony number. They can be viewed with the following commands:

Conclusion

In this article, we have looked how to set up a testing environment in our PC using Genymotion Android Emulator and performing various functions on it using ADB tool that we installed in Kali. In upcoming articles we’ll have a look at various other tools, OWASP methodology for testing, understanding what are android vulnerabilities and of course, automated tool for android security testing. Thanks for reading.

Author: Harshit Rajpal is an InfoSec researcher and left and right brain thinker. Contact here

3 thoughts on “Android Pentest Lab Setup & ADB Command Cheatsheet

  1. Keep posting related to android penetration testing because nowadays everybody have mobiles and most of them in the world is android so to better secure them we need to dive deeper into this and protect it.

  2. Thank you for this awesome Lab Setup
    if you face an issue in kali like : ‘sudo: adb: command not found’
    then do the following:
    1-Make sure you installed $ sudo apt-get install android-tools-adb Now check sudo adb It will show the help of adb
    2-Now please kill/start adb use following commands –
    3-$ sudo adb kill-server
    4-$ sudo adb start-server
    5-Lastly, $ sudo adb devices
    Hopefully this will work !!!

Leave a Reply

Your email address will not be published. Required fields are marked *