🐝
OSCP 2022 Materials
  • General
    • Whoami
    • Resources
    • Frequently Asked Questions
    • Shared Resource
  • Enumeration
    • Foreword
    • FTP
    • SMTP
    • DNS
    • Finger
    • HTTP/ HTTPS
      • Login Attacks
        • PHP Logins
      • XSS
      • LFI ( LFI -> RCE )
      • RFI ( RFI -> RCE )
      • CMS Exploitation
        • Wordpress
        • Magento
        • Bludit
        • Tomcat
        • Drupal
      • PHPMyAdmin
    • Kerberos
    • POP3
    • SMB
    • IMAP
    • SNMP
    • IRC
    • RSync
    • MSSQL
    • NFS
    • REDIS
    • Port Forwarding
  • Linux Post Exploitation
    • Post Exploit Checks
    • Pivoting ( ProxyChains )
  • Windows Post Exploitation
    • Post Exploit Checks
    • Active Directory ( Recon -> PE)
    • Notes
      • Powershell
      • Commands
  • Buffer Overflow
    • Hackthebox
    • TryHackMe
  • Mobile Pentesting
    • Android Pentesting
      • Lab TroubleShoot
      • Root Detection Bypass ( Manual )
      • Physical Device
  • MISC
    • Useful
    • Web
    • Linux
    • Application Specific
    • Programming Notes for Offensive Security
      • Python
    • Forensics
      • Disk Forensics
    • Inspection
    • Troubleshooting
      • Mouse Flickering
Powered by GitBook
On this page
  • ADB Commands
  • Wireless ADB
  • Tools Required
  • Nice Blogs
  • Labs
  • Troubleshooting

Was this helpful?

  1. Mobile Pentesting

Android Pentesting

ADB Commands

# install adb
sudo apt install adb

# connect to a device
adb connect <ip>:5555

# check the connected devices
adb devices
adb devices -l

# get shell on the android device
adb shell

# get the list of installed applications
adb shell pm list packages | grep <appName>

# get the path of the installed application
adb shell pm path com.app.name

# obtain apk from the installed location
adb pull /data/data/*/*/base.apk <appname.apk>

Wireless ADB

| REQUIREMENTS: Android 11

Android 11 and higher supports deploying and debugging your app wirelessly from your workstation using Android Debug Bridge (adb)

  • Connect the device and check for adb devices

  • Once the device is shown in the adb devices output, go to developers options and enable wireless debugging

  • In the shell adb tcpip 5555

  • adb connect <ip> of the mobile

  • Now the adb can be performed wirelessly

Tools Required

  • apktool

  • d2j-dex2jar

  • jd-gui

  • apkx

  • jdax

Nice Blogs

Labs

Troubleshooting

PreviousTryHackMeNextLab TroubleShoot

Last updated 2 years ago

Was this helpful?

Gennymotion:

Custom DNS -

https://medium.com/@sarang6489/root-detection-bypass-by-manual-code-manipulation-5478858f4ad1
https://serializethoughts.com/2016/08/18/bypassing-ssl-pinning-in-android-applications
https://github.com/vaib25vicky/awesome-mobile-security
https://mobexler.com/checklist.htm#android
https://mobile-security.gitbook.io/mobile-security-testing-guide/overview/0x03-overview
https://l33t-en0ugh.gitbook.io/infosec/android-pentesting
https://manifestsecurity.com/appie/
https://www.linkedin.com/pulse/10-vulnerable-android-applications-beginners-learn-hacking-anugrah-sr/?trackingId=2B5LsMW8RDaNPvRPfZ1RAw%3D%3D
https://support.genymotion.com/hc/en-us/articles/4415611962897#:~:text=finish%20the%20update-,c.%20Solution%203,-Open%20VirtualBox
https://devilbox.readthedocs.io/en/latest/howto/dns/add-custom-dns-server-on-android.html