99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務合肥法律

代寫Lab05  InsecureBankv2 01程序
代寫Lab05  InsecureBankv2 01程序

時間:2025-10-22  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯


Lab05 
InsecureBankv2 01



Module Code & Title:           
Programme Code & Title:
Instructor:         
Student Name:         
Student Number:


Lab Time: dd/mm/yyyy



PLEASE BE AWARE: Do not try this lab on your personal phone. If a personal Android device is used, make a backup of the data on device.

Note: You need to submit a detailed lab report, with screenshots, to describe what you have done and what you have observed. You also need to provide explanations for the observations that are interesting or surprising. Finally, answer all questions in the lab instructions if there are any.

Task 0, Install drozer
drozer (formerly Mercury) is the leading security testing framework for Android. The website is 
https://github.com/WithSecureLabs/drozer

Option 1, install latest drozer
Follow the instructions, install it with pip
pipx install drozer

Option 2, install drozer 2.4
The latest version of drozer supports python3.x. An older version is for python 2.x. If you only have Python 2.x, please install drozer 2.4. 
Download drozer-2.4.4.win32.msi and save it in the python27 folder. Ignore the warning message. 
Go to Windows Security  Virus & threat protection, and under Virus & threat protection settings select Manage settings. Switch Real-time protection to Off. 
Double click msi to install it. When asking for python version, choose the python27.

There are two options to run drozer with python2 instead of python3:
Option 1, each time before running drozer type (use your own path for python27):
set path=C:\Python27;C:\Python27\Scripts;%path%

option 2, open drozer.bat under the directory C:\Python27\Scripts, replace python.exe to C:\python27\python.exe

Back to the cmd, navigate to C:\Python27\Scripts, type:
drozer
We should see some information. Type:
drozer console connect
We should find an error.
Install libraries.
python -m pip install service_identity

After successfully installing drozer on the PC, install drozer.apk in the Android device.
download drozer.apk from 
https://labs.withsecure.com/tools/drozer
select drozer (Agent .apk only)

Open Android Studio, turn on a device. Drag the apk to the device to install it. Do not use a higher version of Android. Drozer does not support it.

Open the Drozer in the device.

Task 1, install InsecureBankv2 and tools
Step 1, install python 2.7.x.
Download and install it.
Assuming that your Python installation is in C:\Python27\, add this to your PATH: C:\Python27\;C:\Python27\Scripts\

Step 2, install pip if you have not installed it.
In the CMD, try pip
pip -help
If it returns an error, navigate to the python directory, type:
python -m ensurepip --upgrade
run:
python -m pip install protobuf
python -m pip install pyopenssl
python -m pip install twisted

Step 3
InsecureBank is a purposely vulnerable app designed for educational purposes. It has a server and an apk.
https://github.com/dineshshetty/Android-InsecureBankv2
We need to launch the server so that the vulnerable app can connect to it, and we can start reversing.

Download InsecureBankv2.apk.  Install it in virtual device. If it says the SDK version is lower, try this:
.\adb install --bypass-low-target-sdk-block InsecureBankv2.apk
Please use your own path for InsecureBank2.apk here.

Step 4, setup AndroLab server.
The back end for the InsecureBankv2 application is a simple python server running simple Flask and CherryPy web frameworks. The server component can be found in the AndroLabServer folder in the
InsecureBankv2 project source folder.

Download AndroLab source code. Navigate to the AndroLab directory. To set up the AndroLab server, use pip to install the necessary requirements.
C:\Python27\python.exe -m pip install -r requirements.txt

step 5,
Once all the requirements were installed, run the HTTP server on the default port 8888.
C:\Python27\python.exe app.py
If you encounter an “ImportError: No module named wsgiserver”, run
C:\Python27\python.exe -m pip install wsgiserver
If you encounter an “ImportError: No module named wsgiserver” error, change “from web.wsgiserver import CherryPyWSGIServer” to
from cheroot.wsgi import Server as CherryPyWSGIServer

then run again the “app.py” file to start the server.

view the available arguments for the AndroLab server component.
python app.py –help

Step, 6
Drag InsecureBankv2.pak file onto the emulator screen.
Or we use Android Debug Bridge (ADB) to connect to the emulator and install the InsecureBankv2 APK file.
adb install InsecureBankv2.apk
Once successfully installed, the application icon appears on the emulator.

Step 7, 
Once installed, open the app.


There are pre-defined users, login with either of them.
• dinesh/Dinesh@123$ 
• jack/Jack@123$
When the correct set of credentials is entered, the click of the Login button redirects us to the next screen.

Task 2
Login Vulnerabilities: Login Bypass
There are two ways to bypass login. One is using apk tool to find target activity and run it through adb. The other one is using drozer.

Option one: apk + adb
Step 1, reverse engineering the apk file.
Navigate to the apktool and run
apktool d C:\{Your Path}\InsecureBankv2.apk

Step 2, 
Look at the AndroidManifest.xml file. There are four exported Activities.


Find the activity name “PostLogin”. Using ADB, we can call this exported activity.
adb shell am start -n com.android.insecurebankv2/com.android.insecurebankv2.PostLogin

This will bring a new Activity to us that should only be available after logging in successfully, demonstrating that the login can be bypassed entirely.




Option two: drozer
Step 1, 
Run drozer in the device. The Drozer server runs on port 31415 of your device. We need to set up a suitable port forward so that our PC can connect to a TCP socket opened by the Agent inside the emulator. By default, Drozer uses port 31415. Forwarding port 31415 on the host to port 31415 on the device.
adb forward tcp:31415 tcp:31415
then, connect drozer to the device:
.\drozer console connect
This time we should find that drozer is successfully installed and working.


Step 2,
Find package name of the InsecureBankv2 application
dz> run app.package.list -f bank

determine attack surface:
dz> run app.package.attacksurface com.android.insecurebankv2
We will find the following information:

Attack Surface:
  5 activities exported
  1 broadcast receivers exported
  1 content providers exported
  0 services exported
    is debuggable
It enumerates exported activities along with the permissions necessary to invoke them, i.e. activities that can be launched by other processes on Android device. Let’s launch it
dz> run app.activity.info -a com.android.insecurebankv2
We will find:

Package: com.android.insecurebankv2
  com.android.insecurebankv2.LoginActivity
    Permission: null
  com.android.insecurebankv2.PostLogin
    Permission: null
  com.android.insecurebankv2.DoTransfer
    Permission: null
  com.android.insecurebankv2.ViewStatement
    Permission: null
  com.android.insecurebankv2.ChangePassword
    Permission: null
There are 5 exported activities. One can guess that LoginActivity is probably the one launched when the application starts. Here we will launch PostLogin activity to see what will happen.
dz> run app.activity.start --component com.android.insecurebankv2 com.android.insecurebankv2. PostLogin
Questions:
What if we launch ChangePassword? Show your screenshot.
Can an unauthenticated person have access to the device? What can he/she do after that?

If we want to fix this, remove the highlighted line.


Task 3, Hidden Create User Button for Admins
Step 1, find the source code for the “LoginActivity”.


We will find that the login activity has a hidden button. A check is performed to determine if a resource string called “is_admin” is set to “no”. If this is true, then the “setVisibility(8)” method is used to set the button invisible without taking any space for layout purposes. 

Step 2, patch the vulnerability.
Since this is a string resource, the value we need to modify should be located under the “/res/values/” directories in the strings.xml file. Open this file and change the “is_admin” value from “no” to “yes”, then save the changes.


Step 3,
Use apktool again to rebuild the application with the now modified strings.xml file.
apktool b -f -d InsecureBankv2/
We can find the new generated apk in folder dist.

Sign it.
Find the tool zipalign and apksigner, for me they are in folder


uninstall the unaltered version of the application from the emulator before installing the new APK.
# install
adb install button_InsecureBankv2-final.apk
Once successfully installed, open the application and a new button called “Create user” appears.

Step 7,
However, looking at the source code for the “createUser()” method shows that the button does not actually allow us to create a user, so this concludes the vulnerability.


Task 4, Insecure Logging
The “DoLogin” activity produces a debug log message whenever a user attempts to login.

These logs can be dumped using logcat. The command below will show all the log messages for the application while it is running.
adb logcat | grep "$(adb shell ps | grep com.android.insecurebankv2  | awk '{print $2}')"
If we attempt to login while logcat is running, we will see a log message that shows the username and password we used to successfully login.



Examining the code carefully, we find if the username is “devadmin”, the application does not require a password.  

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp

掃一掃在手機打開當前頁
  • 上一篇:代寫COM682 Cloud Native Development 程序 Coursework
  • 下一篇:代寫  COMP3771 推薦系統(tǒng) 代寫python System Prototype
  • 無相關(guān)信息
    合肥生活資訊

    合肥圖文信息
    有限元分析 CAE仿真分析服務-企業(yè)/產(chǎn)品研發(fā)/客戶要求/設計優(yōu)化
    有限元分析 CAE仿真分析服務-企業(yè)/產(chǎn)品研發(fā)
    急尋熱仿真分析?代做熱仿真服務+熱設計優(yōu)化
    急尋熱仿真分析?代做熱仿真服務+熱設計優(yōu)化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發(fā)動機性能
    挖掘機濾芯提升發(fā)動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現(xiàn)代科技完美結(jié)合
    海信羅馬假日洗衣機亮相AWE 復古美學與現(xiàn)代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
    合肥機場巴士2號線
    合肥機場巴士2號線
  • 短信驗證碼 雷神詩詞網(wǎng) 幣安下載 目錄網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務 | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                日韩欧美国产三级电影视频| 欧美日韩日日摸| 99精品欧美一区二区蜜桃免费 | 日韩激情一二三区| 色综合久久中文综合久久97| 91精品婷婷国产综合久久| 亚洲欧美日韩在线不卡| 国产不卡一区视频| 日韩视频免费观看高清完整版| 亚洲韩国一区二区三区| 成人国产在线观看| 国产精品电影一区二区| 国产自产高清不卡| 亚洲三级在线免费观看| 国产精品一区二区久久精品爱涩| 日韩一区二区三区四区五区六区| 亚洲福利一区二区三区| 欧美日韩免费观看一区三区| 亚洲视频免费观看| 91久久国产综合久久| 中文字幕一区二区在线播放| 粉嫩欧美一区二区三区高清影视| 日日夜夜免费精品视频| 久久精工是国产品牌吗| 日韩精品影音先锋| 日韩一区精品视频| 精品乱人伦小说| 成人av电影在线网| 亚洲一区二区美女| 精品一区二区在线看| 在线不卡中文字幕| 亚洲电影一级片| 在线观看区一区二| 欧美日韩精品高清| 美女视频黄a大片欧美| 午夜一区二区三区在线观看| 欧美一级一区二区| 国产曰批免费观看久久久| 欧美视频中文字幕| 亚洲国产日韩精品| 欧美一级二级三级蜜桃| 日韩欧美一二区| 奇米精品一区二区三区在线观看| 欧美一区二区三区男人的天堂| 麻豆免费看一区二区三区| 欧美视频三区在线播放| 丝袜美腿亚洲综合| 国产午夜精品一区二区三区四区| 国产丶欧美丶日本不卡视频| 最近日韩中文字幕| 久久超级碰视频| 国产女主播一区| 5月丁香婷婷综合| 成人av电影在线网| 国内外成人在线| 亚洲欧美偷拍卡通变态| 精品国产免费视频| 欧美变态口味重另类| 91精品国产综合久久福利软件 | 久久视频一区二区| 精品日韩一区二区三区| 欧美日韩你懂的| 国产成人精品午夜视频免费| 最新国产精品久久精品| 国产亚洲欧美激情| 日本国产一区二区| 国产精品一区二区果冻传媒| 国产网站一区二区| 精品视频一区三区九区| 国产高清精品在线| 亚洲国产成人高清精品| 亚洲永久免费视频| 久久精品免费在线观看| 91精品国产美女浴室洗澡无遮挡| 色综合久久综合网97色综合| 99久久精品99国产精品| 91老司机福利 在线| 在线看日本不卡| 欧美图片一区二区三区| 91精品国产免费| 中文字幕不卡一区| 亚洲午夜在线观看视频在线| 亚洲综合免费观看高清在线观看| 亚洲一区二三区| 狠狠色狠狠色综合系列| 国产麻豆精品视频| 欧美一区二区三区四区久久| 国产调教视频一区| 香蕉久久夜色精品国产使用方法| 麻豆成人免费电影| 日韩三级电影网址| 亚洲精品乱码久久久久久黑人| 精品一区二区免费看| 91行情网站电视在线观看高清版| 欧美一区二区免费视频| 久久中文娱乐网| 亚洲国产精品一区二区久久| 紧缚奴在线一区二区三区| 国产成人精品三级麻豆| 欧美三级资源在线| 亚洲视频一区二区在线| 国产经典欧美精品| 欧美不卡一区二区| 国产最新精品免费| 中文字幕一区二区视频| 成人一道本在线| 国产精品少妇自拍| 成人毛片老司机大片| 在线看国产日韩| 国产精品三级电影| 午夜精品久久久久久| 高清beeg欧美| 日韩亚洲欧美高清| 开心九九激情九九欧美日韩精美视频电影 | 日韩欧美一区二区免费| 亚洲裸体xxx| 欧美午夜电影网| 亚洲午夜免费电影| 91麻豆高清视频| 一区二区三区久久| 欧美综合一区二区| 视频一区视频二区中文字幕| 欧美日韩大陆一区二区| 麻豆91在线看| 欧美激情中文不卡| 粗大黑人巨茎大战欧美成人| 欧美xfplay| 99国产精品久久久久| 亚洲男人电影天堂| 日韩欧美一级二级三级久久久| 精品一区二区三区日韩| 国产精品福利一区| 欧美在线免费播放| 精品一区二区三区在线播放视频 | 久久蜜臀中文字幕| 色综合网色综合| 五月婷婷久久丁香| 欧美国产成人精品| 欧美日本精品一区二区三区| 色丁香久综合在线久综合在线观看| 香蕉久久夜色精品国产使用方法| 精品卡一卡二卡三卡四在线| 国产精品一区不卡| 精品少妇一区二区三区视频免付费 | 国产视频一区在线观看| 不卡电影一区二区三区| 寂寞少妇一区二区三区| 欧美激情综合在线| 国产日韩欧美电影| 久久久久久久综合| 精品盗摄一区二区三区| 久久一日本道色综合| 成人短视频下载| 亚洲一区二区三区影院| 久久久久久久久久久久久久久99| 欧美日韩国产高清一区| 国产成+人+日韩+欧美+亚洲| 一区二区三区四区激情| 欧美激情综合在线| 日韩精品中午字幕| 欧美日韩激情一区| 在线观看免费亚洲| 91精品欧美一区二区三区综合在| 欧美日韩高清一区二区不卡| 欧美在线不卡一区| 国产精品18久久久久久久久久久久 | 99精品在线观看视频| 久久国产精品色婷婷| 精品一区中文字幕| 国产精品正在播放| 国产成人精品午夜视频免费| 国产精品一区二区x88av| 国产一区二区不卡在线| www.66久久| 欧美变态口味重另类| 亚洲人成网站在线| 亚洲午夜在线视频| 本田岬高潮一区二区三区| av网站免费线看精品| 色婷婷精品大在线视频| 欧美精品亚洲二区| 亚洲日本护士毛茸茸| 亚洲第一福利一区| 久久不见久久见免费视频7| 国产69精品久久久久毛片| 91小视频免费观看| 亚洲欧美色图小说| 精品亚洲国内自在自线福利| 美女脱光内衣内裤视频久久网站 | 日韩欧美一区二区久久婷婷| 亚洲国产精品二十页| 亚洲高清视频的网址| 亚洲国产精品一区二区尤物区| 成人中文字幕合集| 26uuu亚洲| 日韩国产一区二| 在线看日韩精品电影| 亚洲另类春色校园小说| 暴力调教一区二区三区| 欧美日韩亚洲综合|