国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫Lab05  InsecureBankv2 01程序
代寫Lab05  InsecureBankv2 01程序

時間:2025-10-22  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯


Lab05 
InsecureBankv2 01



Module Code & Title:           
Programme Code & Title:
Instructor:         
Student Name:         
Student Number:


Lab Time: dd/mm/yyyy



PLEASE BE AWARE: Do not try this lab on your personal phone. If a personal Android device is used, make a backup of the data on device.

Note: You need to submit a detailed lab report, with screenshots, to describe what you have done and what you have observed. You also need to provide explanations for the observations that are interesting or surprising. Finally, answer all questions in the lab instructions if there are any.

Task 0, Install drozer
drozer (formerly Mercury) is the leading security testing framework for Android. The website is 
https://github.com/WithSecureLabs/drozer

Option 1, install latest drozer
Follow the instructions, install it with pip
pipx install drozer

Option 2, install drozer 2.4
The latest version of drozer supports python3.x. An older version is for python 2.x. If you only have Python 2.x, please install drozer 2.4. 
Download drozer-2.4.4.win32.msi and save it in the python27 folder. Ignore the warning message. 
Go to Windows Security  Virus & threat protection, and under Virus & threat protection settings select Manage settings. Switch Real-time protection to Off. 
Double click msi to install it. When asking for python version, choose the python27.

There are two options to run drozer with python2 instead of python3:
Option 1, each time before running drozer type (use your own path for python27):
set path=C:\Python27;C:\Python27\Scripts;%path%

option 2, open drozer.bat under the directory C:\Python27\Scripts, replace python.exe to C:\python27\python.exe

Back to the cmd, navigate to C:\Python27\Scripts, type:
drozer
We should see some information. Type:
drozer console connect
We should find an error.
Install libraries.
python -m pip install service_identity

After successfully installing drozer on the PC, install drozer.apk in the Android device.
download drozer.apk from 
https://labs.withsecure.com/tools/drozer
select drozer (Agent .apk only)

Open Android Studio, turn on a device. Drag the apk to the device to install it. Do not use a higher version of Android. Drozer does not support it.

Open the Drozer in the device.

Task 1, install InsecureBankv2 and tools
Step 1, install python 2.7.x.
Download and install it.
Assuming that your Python installation is in C:\Python27\, add this to your PATH: C:\Python27\;C:\Python27\Scripts\

Step 2, install pip if you have not installed it.
In the CMD, try pip
pip -help
If it returns an error, navigate to the python directory, type:
python -m ensurepip --upgrade
run:
python -m pip install protobuf
python -m pip install pyopenssl
python -m pip install twisted

Step 3
InsecureBank is a purposely vulnerable app designed for educational purposes. It has a server and an apk.
https://github.com/dineshshetty/Android-InsecureBankv2
We need to launch the server so that the vulnerable app can connect to it, and we can start reversing.

Download InsecureBankv2.apk.  Install it in virtual device. If it says the SDK version is lower, try this:
.\adb install --bypass-low-target-sdk-block InsecureBankv2.apk
Please use your own path for InsecureBank2.apk here.

Step 4, setup AndroLab server.
The back end for the InsecureBankv2 application is a simple python server running simple Flask and CherryPy web frameworks. The server component can be found in the AndroLabServer folder in the
InsecureBankv2 project source folder.

Download AndroLab source code. Navigate to the AndroLab directory. To set up the AndroLab server, use pip to install the necessary requirements.
C:\Python27\python.exe -m pip install -r requirements.txt

step 5,
Once all the requirements were installed, run the HTTP server on the default port 8888.
C:\Python27\python.exe app.py
If you encounter an “ImportError: No module named wsgiserver”, run
C:\Python27\python.exe -m pip install wsgiserver
If you encounter an “ImportError: No module named wsgiserver” error, change “from web.wsgiserver import CherryPyWSGIServer” to
from cheroot.wsgi import Server as CherryPyWSGIServer

then run again the “app.py” file to start the server.

view the available arguments for the AndroLab server component.
python app.py –help

Step, 6
Drag InsecureBankv2.pak file onto the emulator screen.
Or we use Android Debug Bridge (ADB) to connect to the emulator and install the InsecureBankv2 APK file.
adb install InsecureBankv2.apk
Once successfully installed, the application icon appears on the emulator.

Step 7, 
Once installed, open the app.


There are pre-defined users, login with either of them.
• dinesh/Dinesh@123$ 
• jack/Jack@123$
When the correct set of credentials is entered, the click of the Login button redirects us to the next screen.

Task 2
Login Vulnerabilities: Login Bypass
There are two ways to bypass login. One is using apk tool to find target activity and run it through adb. The other one is using drozer.

Option one: apk + adb
Step 1, reverse engineering the apk file.
Navigate to the apktool and run
apktool d C:\{Your Path}\InsecureBankv2.apk

Step 2, 
Look at the AndroidManifest.xml file. There are four exported Activities.


Find the activity name “PostLogin”. Using ADB, we can call this exported activity.
adb shell am start -n com.android.insecurebankv2/com.android.insecurebankv2.PostLogin

This will bring a new Activity to us that should only be available after logging in successfully, demonstrating that the login can be bypassed entirely.




Option two: drozer
Step 1, 
Run drozer in the device. The Drozer server runs on port 31415 of your device. We need to set up a suitable port forward so that our PC can connect to a TCP socket opened by the Agent inside the emulator. By default, Drozer uses port 31415. Forwarding port 31415 on the host to port 31415 on the device.
adb forward tcp:31415 tcp:31415
then, connect drozer to the device:
.\drozer console connect
This time we should find that drozer is successfully installed and working.


Step 2,
Find package name of the InsecureBankv2 application
dz> run app.package.list -f bank

determine attack surface:
dz> run app.package.attacksurface com.android.insecurebankv2
We will find the following information:

Attack Surface:
  5 activities exported
  1 broadcast receivers exported
  1 content providers exported
  0 services exported
    is debuggable
It enumerates exported activities along with the permissions necessary to invoke them, i.e. activities that can be launched by other processes on Android device. Let’s launch it
dz> run app.activity.info -a com.android.insecurebankv2
We will find:

Package: com.android.insecurebankv2
  com.android.insecurebankv2.LoginActivity
    Permission: null
  com.android.insecurebankv2.PostLogin
    Permission: null
  com.android.insecurebankv2.DoTransfer
    Permission: null
  com.android.insecurebankv2.ViewStatement
    Permission: null
  com.android.insecurebankv2.ChangePassword
    Permission: null
There are 5 exported activities. One can guess that LoginActivity is probably the one launched when the application starts. Here we will launch PostLogin activity to see what will happen.
dz> run app.activity.start --component com.android.insecurebankv2 com.android.insecurebankv2. PostLogin
Questions:
What if we launch ChangePassword? Show your screenshot.
Can an unauthenticated person have access to the device? What can he/she do after that?

If we want to fix this, remove the highlighted line.


Task 3, Hidden Create User Button for Admins
Step 1, find the source code for the “LoginActivity”.


We will find that the login activity has a hidden button. A check is performed to determine if a resource string called “is_admin” is set to “no”. If this is true, then the “setVisibility(8)” method is used to set the button invisible without taking any space for layout purposes. 

Step 2, patch the vulnerability.
Since this is a string resource, the value we need to modify should be located under the “/res/values/” directories in the strings.xml file. Open this file and change the “is_admin” value from “no” to “yes”, then save the changes.


Step 3,
Use apktool again to rebuild the application with the now modified strings.xml file.
apktool b -f -d InsecureBankv2/
We can find the new generated apk in folder dist.

Sign it.
Find the tool zipalign and apksigner, for me they are in folder


uninstall the unaltered version of the application from the emulator before installing the new APK.
# install
adb install button_InsecureBankv2-final.apk
Once successfully installed, open the application and a new button called “Create user” appears.

Step 7,
However, looking at the source code for the “createUser()” method shows that the button does not actually allow us to create a user, so this concludes the vulnerability.


Task 4, Insecure Logging
The “DoLogin” activity produces a debug log message whenever a user attempts to login.

These logs can be dumped using logcat. The command below will show all the log messages for the application while it is running.
adb logcat | grep "$(adb shell ps | grep com.android.insecurebankv2  | awk '{print $2}')"
If we attempt to login while logcat is running, we will see a log message that shows the username and password we used to successfully login.



Examining the code carefully, we find if the username is “devadmin”, the application does not require a password.  

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp

掃一掃在手機打開當前頁
  • 上一篇:代寫COM682 Cloud Native Development 程序 Coursework
  • 下一篇:代寫  COMP3771 推薦系統 代寫python System Prototype
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真技術服務
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲勞振動
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲
    流體cfd仿真分析服務 7類仿真分析代做服務40個行業
    流體cfd仿真分析服務 7類仿真分析代做服務4
    超全面的拼多多電商運營技巧,多多開團助手,多多出評軟件徽y1698861
    超全面的拼多多電商運營技巧,多多開團助手
    CAE有限元仿真分析團隊,2026仿真代做咨詢服務平臺
    CAE有限元仿真分析團隊,2026仿真代做咨詢服
    釘釘簽到打卡位置修改神器,2026怎么修改定位在范圍內
    釘釘簽到打卡位置修改神器,2026怎么修改定
    2025年10月份更新拼多多改銷助手小象助手多多出評軟件
    2025年10月份更新拼多多改銷助手小象助手多
    有限元分析 CAE仿真分析服務-企業/產品研發/客戶要求/設計優化
    有限元分析 CAE仿真分析服務-企業/產品研發
  • 短信驗證碼 寵物飼養 十大衛浴品牌排行 目錄網 排行網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看
    国产成人啪精品视频免费网| 日本不卡二区| 国产精品99久久久久久人| 国产在线精品91| 蜜桃传媒一区二区三区| 精品欧美日韩| 精品亚洲第一| 国产伦精品一区二区三区照片91| 国产精品专区一| 91精品视频大全| 国产精品27p| 久久久久久久久国产| www.精品av.com| 国产精品久久久久久超碰| 国产精品久久久久久久小唯西川| 久久亚洲影音av资源网| 欧美激情视频一区二区三区不卡| 久久久久久国产精品| 中文字幕中文字幕在线中心一区| 亚洲精品久久区二区三区蜜桃臀| 日韩福利视频| 精品少妇人妻av免费久久洗澡| 国产乱子伦精品| 国产精品99蜜臀久久不卡二区| 国产成人97精品免费看片| 日韩中文在线视频| 国产精品久久久久7777婷婷| 亚洲最大av网站| 日本一区二区高清视频| 免费毛片网站在线观看| 99久re热视频精品98| 久久久久久香蕉网| 精品自拍视频在线观看| 岛国视频一区免费观看| 欧美交换配乱吟粗大25p| 国产免费观看久久黄| 久久免费精品日本久久中文字幕| 国产精品爽爽爽爽爽爽在线观看| 中文字幕不卡每日更新1区2区| 热99久久精品| 97国产精品人人爽人人做| 久久九九全国免费精品观看| 亚洲中文字幕无码专区| 日韩精品一区二区三区色欲av| 精品视频免费在线播放| 久久一区二区三区欧美亚洲| 国产精品三级网站| 无码少妇一区二区三区芒果| 欧美连裤袜在线视频| 99精品欧美一区二区三区| 国产精品久久久久久久小唯西川| 天天成人综合网| 国产人妻互换一区二区| 日韩中文字幕视频| 无码人妻精品一区二区三区99v| 国产在线999| 神马国产精品影院av| 亚洲精品乱码视频| 国产视频99| 国产精品视频大全| 日韩av影视| 91精品国产综合久久久久久丝袜| 欧美xxxx综合视频| 日本一本草久p| 99视频精品免费| 国产精品久久久久久久天堂 | 精品免费日产一区一区三区免费| 痴汉一区二区三区| 国产裸体写真av一区二区| 国产精品免费一区二区三区都可以| 日本一区二区三区四区视频 | 久久手机在线视频| 欧美激情精品久久久久久黑人| 欧美日韩精品一区| 九色自拍视频在线观看| 日韩一区二区三区高清| 国产美女精彩久久| 国产精品成久久久久三级| 欧美日韩在线不卡一区| 久久久久久久久国产精品| 日本一区二区黄色| 国产福利精品av综合导导航| 午夜午夜精品一区二区三区文| 国产精品永久在线| 精品国产_亚洲人成在线| 狠狠精品干练久久久无码中文字幕| 久久久精品日本| 日本高清视频精品| 久久久久久久久久久av| 日韩精品久久一区二区三区| 国产二区视频在线播放| 欧美一区二区.| 国产成人一二三区| 日本不卡高字幕在线2019| 久久久久久久色| 欧美性大战久久久久| 日韩视频永久免费观看| 欧美极品少妇无套实战| 国产精品久久久久7777| 国产中文字幕91| 免费99精品国产自在在线| 国产精品一区免费观看| 亚洲a在线观看| 久久99九九| 男人天堂成人网| 久久的精品视频| 福利视频久久| 欧美一区二区三区在线播放 | 久久青青草原一区二区| 热99久久精品| 国产精品久久久久999| 国产日韩av高清| 色综合久久88| 91精品国产自产91精品| 日韩av在线综合| 国产精品久久久久久久久| 国产噜噜噜噜噜久久久久久久久| 亚洲日本欧美在线| 日韩在线视频观看正片免费网站| 免费久久99精品国产自| 亚洲字幕一区二区| 久久久久日韩精品久久久男男| 国内少妇毛片视频| 亚洲国产欧美日韩| 国产精品入口免费视频一| 成人久久18免费网站图片| 日本精品免费在线观看| 久久精品99久久香蕉国产色戒| 国产欧美一区二区三区另类精品| 亚洲精品久久久久久一区二区 | 成人免费毛片网| 日本丰满少妇黄大片在线观看| 国产精品久久久久久久久免费| 99精品在线免费视频| 欧美亚洲在线播放| 一本—道久久a久久精品蜜桃| 久久精品成人欧美大片古装| 国产精品亚洲二区在线观看| 天堂v在线视频| 国产精品久久av| 7777精品久久久久久| 国产专区欧美专区| 日本精品va在线观看| 色综合色综合网色综合| 久久99精品久久久久久水蜜桃 | 国产一区二区三区播放| 性视频1819p久久| 久久亚洲一区二区三区四区五区高| 国产成人综合亚洲| 国产精品午夜国产小视频| 欧美亚洲午夜视频在线观看| 亚洲一区二区三区精品视频| 国产精品日日做人人爱| 久久亚洲综合网| 国产精品一区=区| 国产在线999| 欧美日韩国产高清视频 | 欧美性受xxxx黑人猛交88| 亚洲一区二区中文| 久久亚洲国产成人| 国产成人精品最新| 久久成人免费观看| 99热在线这里只有精品| 国产一区自拍视频| 加勒比在线一区二区三区观看| 日韩av高清在线看片| 欧美激情日韩图片| 不卡伊人av在线播放| 国产精品免费一区二区三区都可以| 久久久久久一区二区三区| 久热免费在线观看| 国产精品96久久久久久| 99视频日韩| 91精品国产沙发| 99久久99久久精品国产片| 成人免费毛片网| www.久久草| 91麻豆国产精品| 91国内揄拍国内精品对白| 99精彩视频| 成人av影视在线| 成人免费视频a| 不卡一区二区三区视频| 成人av男人的天堂| 97成人在线视频| 91久久精品美女| 97精品国产97久久久久久免费| www.国产二区| 91精品国产综合久久男男| 91麻豆桃色免费看| 91久久精品一区| 久久婷婷五月综合色国产香蕉 | 97激碰免费视频| 91精品国产综合久久久久久蜜臀| αv一区二区三区| 91黄在线观看| 久久久久久免费精品| 久久久国产精品一区| 国产精品免费一区二区三区| 国产精品电影久久久久电影网|