Search

A Complete Beginner guide To Android Pent-Testing Lab Set-Up

OK, so in this blog, I will show you how to build your own lab for Android pen-testing. We will also install all the necessary tools required for Android pen-testing.

1. Installing ADB.

ADB (Android Debug Bridge) is a command-line tool used for interacting with and managing Android devices or emulators. In simple term with the use of this tool we can easily do copy-paste, move, etc.

Before we start, open your Kali-linux machine and open the terminal and enter the following command. “sudo apt-get install adb”

1

Now, we gonna install genymotion where we can use the virtual android devices for our android pentesting. Go through this link https://www.genymotion.com/product-desktop/download/ and install on behalf of your compatible version and OS. And fill all the details and sing-up.

  • When you complete the login process you have to see such type of dashboard

2

  • Now, simply click on + and select the your emulator device where your perform android pen-testing.

3

  • Now, click next and change the configuration on behalf of you. And wait for few minutes it will automatically setup.

4

  • Start the device

5

  • Now, if in your android device you don’t having play-store for downloading the application. You can visit this link and you can download it. https://opengapps.org/ simply download it and use drag and drop options to install this on your android device.
  • Now for intercept the request of this device you should have to install Burp-suite
  • So, you can visit this link and follow the all steps to install the burp-suite https://portswigger.net/burp/documentation/desktop/getting-started/download-and-install
  • And when you complete install the burp-suite we have do some configuration in our emulator device and burp-suite for intercepting the http, https request.
  • So let’s start.
  • Now, open your burp and go to proxy setting and add a proxy port number and select all interface and click ok.

6

  • Once you done with this settings in your burp
  • Now, you make changes on your android emulator
  • Go to WiFi options and make changes on manual proxy options
  • Set the ip of your system into android emulator proxy and also mention port number which you have already put the port on your burp-suite same port you have to put on your android device.

7

  • With these setting now you can intercept the HTTP request but not HTTPs
  • So for intercepting HTTPs request you have to configure burp certificate on your android device.
  • Open your burp go to the proxy setting and click on import/export CA certificate and after click on certificate in DER format and click on next and select the path of file where you want to export this certificate
  • After this simple you have to drag and drop the file on your android device like you follow when you download the play-store.
  • Now you have change the extension .DER to .cer and save it and open and give it any name that you want
  • And finally you good to go for intercepting the HTTPs request.

Book A Free Demo Class

    Social Media
    Facebook
    Twitter
    WhatsApp
    LinkedIn