Skip to content

Commit

Permalink
fix mistakes
Browse files Browse the repository at this point in the history
  • Loading branch information
ScreaMy7 authored Jan 17, 2025
1 parent d081801 commit 7a8ac45
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 5 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -31,4 +31,4 @@ The reported instances include:
- Line 6 uses `WRITE_EXTERNAL_STORAGE` permissions.
- Line 7 uses `READ_CONTACTS` permissions.
- Line 8 uses `READ_EXTERNAL_STORAGE` permissions.
- Line 9 uses `ACCESS_FINE_LOCATION` permissions.
- Line 9 uses `ACCESS_FINE_LOCATION` permissions.
8 changes: 4 additions & 4 deletions techniques/android/MASTG-TECH-0118.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ platform: android

Obtaining App Permissions from Android Applications. There are several ways to obtain permissions from an Android application. Below are the tools and techniques commonly used:

## Using @MASTG-TOOL-0018
## Using @MASTG-TOOL-0018

You can use Jadx or Jadx-GUI to decompile APK files and access the AndroidManifest.xml file. This allows you to view the permissions declared in the application and inspect their usage in the code. Jadx is particularly useful for static analysis as it can also decompile application code, helping identify how permissions are utilized within the app logic.

Expand All @@ -14,7 +14,7 @@ Steps:
1. Open the APK file in Jadx or Jadx-GUI.
2. Navigate to the AndroidManifest.xml file to view the declared permissions.

## Using @MASTG-TOOL-0011
## Using @MASTG-TOOL-0011

You can also decompile an APK using APKTool to extract the AndroidManifest.xml file.

Expand Down Expand Up @@ -43,7 +43,7 @@ uses-permission: name='org.owasp.mastestapp.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMIS
This command lists all the permissions requested by the app in a concise format, saving time compared to manual inspection.
```

## Using @MASTG-TOOL-0004
## Using @MASTG-TOOL-0004

Android's built-in debugging tool, ADB (Android Debug Bridge), provides a way to view permissions directly from a device or emulator.

Expand Down Expand Up @@ -72,7 +72,7 @@ This command retrieves the permissions declared in the app, as well as runtime-g
Apart from enforcing custom permissions via the application manifest file, you can also check permissions using dynamic instrumentation. This is not recommended, however, because it is more error-prone and can be bypassed more easily with, e.g., runtime instrumentation. It is recommended that the ContextCompat.checkSelfPermission method is called to check if an activity has a specified permission. You can use this frida script from the [frida codeshare](https://codeshare.frida.re/@ScreaMy7/hookpermissions/) to check for runtime permissions.

```bash
$ frida -U -l hookpermissions.js -f org.owasp.mastestapp
frida -U -l hookpermissions.js -f org.owasp.mastestapp
```

Additional Notes:
Expand Down

0 comments on commit 7a8ac45

Please sign in to comment.