99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務合肥法律

代寫Lab05  InsecureBankv2 01程序
代寫Lab05  InsecureBankv2 01程序

時間:2025-10-22  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯


Lab05 
InsecureBankv2 01



Module Code & Title:           
Programme Code & Title:
Instructor:         
Student Name:         
Student Number:


Lab Time: dd/mm/yyyy



PLEASE BE AWARE: Do not try this lab on your personal phone. If a personal Android device is used, make a backup of the data on device.

Note: You need to submit a detailed lab report, with screenshots, to describe what you have done and what you have observed. You also need to provide explanations for the observations that are interesting or surprising. Finally, answer all questions in the lab instructions if there are any.

Task 0, Install drozer
drozer (formerly Mercury) is the leading security testing framework for Android. The website is 
https://github.com/WithSecureLabs/drozer

Option 1, install latest drozer
Follow the instructions, install it with pip
pipx install drozer

Option 2, install drozer 2.4
The latest version of drozer supports python3.x. An older version is for python 2.x. If you only have Python 2.x, please install drozer 2.4. 
Download drozer-2.4.4.win32.msi and save it in the python27 folder. Ignore the warning message. 
Go to Windows Security  Virus & threat protection, and under Virus & threat protection settings select Manage settings. Switch Real-time protection to Off. 
Double click msi to install it. When asking for python version, choose the python27.

There are two options to run drozer with python2 instead of python3:
Option 1, each time before running drozer type (use your own path for python27):
set path=C:\Python27;C:\Python27\Scripts;%path%

option 2, open drozer.bat under the directory C:\Python27\Scripts, replace python.exe to C:\python27\python.exe

Back to the cmd, navigate to C:\Python27\Scripts, type:
drozer
We should see some information. Type:
drozer console connect
We should find an error.
Install libraries.
python -m pip install service_identity

After successfully installing drozer on the PC, install drozer.apk in the Android device.
download drozer.apk from 
https://labs.withsecure.com/tools/drozer
select drozer (Agent .apk only)

Open Android Studio, turn on a device. Drag the apk to the device to install it. Do not use a higher version of Android. Drozer does not support it.

Open the Drozer in the device.

Task 1, install InsecureBankv2 and tools
Step 1, install python 2.7.x.
Download and install it.
Assuming that your Python installation is in C:\Python27\, add this to your PATH: C:\Python27\;C:\Python27\Scripts\

Step 2, install pip if you have not installed it.
In the CMD, try pip
pip -help
If it returns an error, navigate to the python directory, type:
python -m ensurepip --upgrade
run:
python -m pip install protobuf
python -m pip install pyopenssl
python -m pip install twisted

Step 3
InsecureBank is a purposely vulnerable app designed for educational purposes. It has a server and an apk.
https://github.com/dineshshetty/Android-InsecureBankv2
We need to launch the server so that the vulnerable app can connect to it, and we can start reversing.

Download InsecureBankv2.apk.  Install it in virtual device. If it says the SDK version is lower, try this:
.\adb install --bypass-low-target-sdk-block InsecureBankv2.apk
Please use your own path for InsecureBank2.apk here.

Step 4, setup AndroLab server.
The back end for the InsecureBankv2 application is a simple python server running simple Flask and CherryPy web frameworks. The server component can be found in the AndroLabServer folder in the
InsecureBankv2 project source folder.

Download AndroLab source code. Navigate to the AndroLab directory. To set up the AndroLab server, use pip to install the necessary requirements.
C:\Python27\python.exe -m pip install -r requirements.txt

step 5,
Once all the requirements were installed, run the HTTP server on the default port 8888.
C:\Python27\python.exe app.py
If you encounter an “ImportError: No module named wsgiserver”, run
C:\Python27\python.exe -m pip install wsgiserver
If you encounter an “ImportError: No module named wsgiserver” error, change “from web.wsgiserver import CherryPyWSGIServer” to
from cheroot.wsgi import Server as CherryPyWSGIServer

then run again the “app.py” file to start the server.

view the available arguments for the AndroLab server component.
python app.py –help

Step, 6
Drag InsecureBankv2.pak file onto the emulator screen.
Or we use Android Debug Bridge (ADB) to connect to the emulator and install the InsecureBankv2 APK file.
adb install InsecureBankv2.apk
Once successfully installed, the application icon appears on the emulator.

Step 7, 
Once installed, open the app.


There are pre-defined users, login with either of them.
• dinesh/Dinesh@123$ 
• jack/Jack@123$
When the correct set of credentials is entered, the click of the Login button redirects us to the next screen.

Task 2
Login Vulnerabilities: Login Bypass
There are two ways to bypass login. One is using apk tool to find target activity and run it through adb. The other one is using drozer.

Option one: apk + adb
Step 1, reverse engineering the apk file.
Navigate to the apktool and run
apktool d C:\{Your Path}\InsecureBankv2.apk

Step 2, 
Look at the AndroidManifest.xml file. There are four exported Activities.


Find the activity name “PostLogin”. Using ADB, we can call this exported activity.
adb shell am start -n com.android.insecurebankv2/com.android.insecurebankv2.PostLogin

This will bring a new Activity to us that should only be available after logging in successfully, demonstrating that the login can be bypassed entirely.




Option two: drozer
Step 1, 
Run drozer in the device. The Drozer server runs on port 31415 of your device. We need to set up a suitable port forward so that our PC can connect to a TCP socket opened by the Agent inside the emulator. By default, Drozer uses port 31415. Forwarding port 31415 on the host to port 31415 on the device.
adb forward tcp:31415 tcp:31415
then, connect drozer to the device:
.\drozer console connect
This time we should find that drozer is successfully installed and working.


Step 2,
Find package name of the InsecureBankv2 application
dz> run app.package.list -f bank

determine attack surface:
dz> run app.package.attacksurface com.android.insecurebankv2
We will find the following information:

Attack Surface:
  5 activities exported
  1 broadcast receivers exported
  1 content providers exported
  0 services exported
    is debuggable
It enumerates exported activities along with the permissions necessary to invoke them, i.e. activities that can be launched by other processes on Android device. Let’s launch it
dz> run app.activity.info -a com.android.insecurebankv2
We will find:

Package: com.android.insecurebankv2
  com.android.insecurebankv2.LoginActivity
    Permission: null
  com.android.insecurebankv2.PostLogin
    Permission: null
  com.android.insecurebankv2.DoTransfer
    Permission: null
  com.android.insecurebankv2.ViewStatement
    Permission: null
  com.android.insecurebankv2.ChangePassword
    Permission: null
There are 5 exported activities. One can guess that LoginActivity is probably the one launched when the application starts. Here we will launch PostLogin activity to see what will happen.
dz> run app.activity.start --component com.android.insecurebankv2 com.android.insecurebankv2. PostLogin
Questions:
What if we launch ChangePassword? Show your screenshot.
Can an unauthenticated person have access to the device? What can he/she do after that?

If we want to fix this, remove the highlighted line.


Task 3, Hidden Create User Button for Admins
Step 1, find the source code for the “LoginActivity”.


We will find that the login activity has a hidden button. A check is performed to determine if a resource string called “is_admin” is set to “no”. If this is true, then the “setVisibility(8)” method is used to set the button invisible without taking any space for layout purposes. 

Step 2, patch the vulnerability.
Since this is a string resource, the value we need to modify should be located under the “/res/values/” directories in the strings.xml file. Open this file and change the “is_admin” value from “no” to “yes”, then save the changes.


Step 3,
Use apktool again to rebuild the application with the now modified strings.xml file.
apktool b -f -d InsecureBankv2/
We can find the new generated apk in folder dist.

Sign it.
Find the tool zipalign and apksigner, for me they are in folder


uninstall the unaltered version of the application from the emulator before installing the new APK.
# install
adb install button_InsecureBankv2-final.apk
Once successfully installed, open the application and a new button called “Create user” appears.

Step 7,
However, looking at the source code for the “createUser()” method shows that the button does not actually allow us to create a user, so this concludes the vulnerability.


Task 4, Insecure Logging
The “DoLogin” activity produces a debug log message whenever a user attempts to login.

These logs can be dumped using logcat. The command below will show all the log messages for the application while it is running.
adb logcat | grep "$(adb shell ps | grep com.android.insecurebankv2  | awk '{print $2}')"
If we attempt to login while logcat is running, we will see a log message that shows the username and password we used to successfully login.



Examining the code carefully, we find if the username is “devadmin”, the application does not require a password.  

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp

掃一掃在手機打開當前頁
  • 上一篇:代寫COM682 Cloud Native Development 程序 Coursework
  • 下一篇:代寫  COMP3771 推薦系統(tǒng) 代寫python System Prototype
  • 無相關(guān)信息
    合肥生活資訊

    合肥圖文信息
    有限元分析 CAE仿真分析服務-企業(yè)/產(chǎn)品研發(fā)/客戶要求/設計優(yōu)化
    有限元分析 CAE仿真分析服務-企業(yè)/產(chǎn)品研發(fā)
    急尋熱仿真分析?代做熱仿真服務+熱設計優(yōu)化
    急尋熱仿真分析?代做熱仿真服務+熱設計優(yōu)化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發(fā)動機性能
    挖掘機濾芯提升發(fā)動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現(xiàn)代科技完美結(jié)合
    海信羅馬假日洗衣機亮相AWE 復古美學與現(xiàn)代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
    合肥機場巴士2號線
    合肥機場巴士2號線
  • 短信驗證碼 雷神詩詞網(wǎng) 幣安下載 目錄網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務 | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                视频一区欧美日韩| 久久综合色8888| 日韩高清不卡一区二区| 久久疯狂做爰流白浆xx| 成人午夜视频网站| 在线观看视频一区| 日韩美女主播在线视频一区二区三区| 精品国产乱码久久久久久牛牛| 一级女性全黄久久生活片免费| 日韩制服丝袜av| 精品免费视频.| 久久精品二区亚洲w码| 久久先锋影音av| 欧美色区777第一页| 国产精品国产自产拍高清av王其| 日韩av电影天堂| 国产日韩欧美精品在线| 日韩电影在线一区二区| 国产欧美精品区一区二区三区 | 麻豆一区二区三| 欧美午夜寂寞影院| 亚洲色图丝袜美腿| 国产成人8x视频一区二区| 欧美精品一卡二卡| 一区二区三区.www| 欧美精品一区二区三区蜜臀| 在线免费不卡视频| heyzo一本久久综合| 国产女主播在线一区二区| 欧美性生活一区| 99视频精品免费视频| 国产精品91xxx| 久久久久久久精| 国产精品一区在线观看你懂的| 一区二区三区免费在线观看| 中文字幕av不卡| 97久久超碰精品国产| 国产精品第四页| 日韩精品一区国产麻豆| 337p亚洲精品色噜噜狠狠| 亚洲成在人线免费| 在线成人av网站| 欧美色综合天天久久综合精品| 成人免费视频免费观看| 国产黄色91视频| 亚洲美女偷拍久久| 色老头久久综合| 婷婷综合久久一区二区三区| 欧美成人bangbros| 777久久久精品| 在线播放91灌醉迷j高跟美女| 色视频成人在线观看免| 婷婷久久综合九色国产成人| 亚洲欧洲一区二区三区| 51久久夜色精品国产麻豆| 欧美亚洲综合久久| 欧美日韩一区二区在线视频| 欧美专区在线观看一区| 欧美日韩国产精品成人| 国产激情视频一区二区三区欧美| 久久国产精品无码网站| 激情小说欧美图片| 亚洲人吸女人奶水| 亚洲美女少妇撒尿| 午夜在线电影亚洲一区| 免费不卡在线观看| 亚洲欧美成人一区二区三区| 亚洲免费三区一区二区| 亚洲高清免费视频| 国产免费久久精品| 综合分类小说区另类春色亚洲小说欧美| 中文字幕一区二区三区在线不卡| 伊人色综合久久天天| 久久精品夜色噜噜亚洲a∨| 欧美在线观看视频一区二区三区| 91官网在线免费观看| 欧美久久一二区| 国产欧美一区二区精品性色超碰| 亚洲免费伊人电影| 久久99国产精品久久99果冻传媒| 亚洲人成精品久久久久| 亚洲国产精品一区二区www在线| 日本美女一区二区三区| 国产成+人+日韩+欧美+亚洲| 91国产丝袜在线播放| 欧美r级在线观看| 日韩伦理电影网| 蜜桃一区二区三区在线观看| 91亚洲精华国产精华精华液| 波多野结衣中文字幕一区 | 亚洲精品亚洲人成人网在线播放| 视频一区二区三区中文字幕| 成人黄动漫网站免费app| 7777精品伊人久久久大香线蕉的 | 欧美精品在线一区二区| 久久久精品人体av艺术| 天堂成人免费av电影一区| 成人黄色网址在线观看| 日韩欧美高清一区| 亚洲成人av资源| 色88888久久久久久影院按摩| 国产日韩欧美亚洲| 韩国av一区二区三区四区| 在线视频一区二区三区| 日本一区二区不卡视频| 国产麻豆精品一区二区| 国产suv精品一区二区三区| 欧美日韩综合在线免费观看| 中文字幕国产一区| 精品在线播放午夜| 欧美日本精品一区二区三区| 亚洲综合一区二区精品导航| 亚洲欧美成人一区二区三区| 狠狠久久亚洲欧美| 欧美成人一区二区三区片免费| 午夜欧美电影在线观看| 欧洲国内综合视频| 怡红院av一区二区三区| 91毛片在线观看| 亚洲激情五月婷婷| 97se亚洲国产综合在线| 中文字幕中文字幕在线一区 | 波多野结衣中文字幕一区二区三区 | 国产成人激情av| 久久日一线二线三线suv| 久久99精品国产.久久久久| 日韩欧美国产系列| 国产真实乱偷精品视频免| 久久夜色精品国产欧美乱极品| 国产剧情在线观看一区二区| 久久久三级国产网站| 国产精品自在欧美一区| 国产午夜精品一区二区三区视频| 国产一区二区三区精品视频| 国产视频一区二区三区在线观看 | 日韩一级二级三级| 国产欧美精品国产国产专区| 国产在线不卡一区| 国产精品乱码一区二三区小蝌蚪| 亚洲一区二区精品久久av| 欧美午夜不卡在线观看免费| 午夜精品久久久| 久久久高清一区二区三区| www.色综合.com| 三级一区在线视频先锋| 久久嫩草精品久久久精品一| av一区二区久久| 一区二区三区日韩欧美| 51精品秘密在线观看| 国产69精品久久久久777| 亚洲视频在线观看三级| 欧美一区二区三区免费在线看| 亚洲美女免费视频| 欧美情侣在线播放| 国产成人精品亚洲777人妖| 亚洲素人一区二区| 日韩午夜电影av| 99这里只有精品| 久久99精品国产麻豆婷婷洗澡| 亚洲视频中文字幕| 精品成人在线观看| 欧美亚洲一区二区在线观看| 激情六月婷婷久久| 亚洲一区二区免费视频| 中文字幕乱码一区二区免费| 欧美一区二区视频网站| 99久久综合精品| 久草这里只有精品视频| 亚洲激情男女视频| 国产农村妇女毛片精品久久麻豆| 3d动漫精品啪啪1区2区免费| 99国产精品久久久久久久久久 | 精品久久久久久久久久久院品网| 91在线国产福利| 懂色一区二区三区免费观看| 亚洲6080在线| 亚洲精品国产第一综合99久久| 国产人久久人人人人爽| 日韩精品中午字幕| 91麻豆精品国产自产在线观看一区 | 国产日韩三级在线| 51精品国自产在线| 欧美日韩国产在线观看| 欧美专区日韩专区| 色婷婷综合久久久中文字幕| aa级大片欧美| 成人黄色a**站在线观看| 国产精品一级二级三级| 国模套图日韩精品一区二区 | 亚洲成人免费在线| 亚洲六月丁香色婷婷综合久久| 国产性天天综合网| 久久精品亚洲麻豆av一区二区| 日韩情涩欧美日韩视频| 正在播放亚洲一区| 91精品欧美久久久久久动漫| 在线播放亚洲一区| 日韩一级欧美一级| 精品欧美一区二区三区精品久久 | 亚洲一区二区三区视频在线|