pentest-mobile-app

📁 jd-opensource/joysafeter 📅 11 days ago
11
总安装量
11
周安装量
#28175
全站排名
安装命令
npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-mobile-app

Agent 安装分布

opencode 11
gemini-cli 10
github-copilot 10
codex 10
amp 10
kimi-cli 10

Skill 文档

Pentest Mobile App

Purpose

Mobile apps are completely absent from Shannon (web-only) and all existing skills. Mobile apps often share backend APIs but introduce unique attack surfaces: local storage, pinning, intent handling, binary protections.

Prerequisites

Authorization Requirements

  • Written authorization with mobile app testing scope
  • APK/IPA files or access to app store downloads
  • Test devices or emulators (rooted Android, jailbroken iOS preferred)
  • Backend API documentation if available

Environment Setup

  • Frida for runtime instrumentation
  • Objection for quick mobile security testing
  • MobSF for automated static/dynamic analysis
  • jadx for Android decompilation, Hopper for iOS
  • Burp Suite configured as mobile proxy

Core Workflow

  1. Static Analysis: Decompile APK/IPA, analyze for hardcoded secrets, insecure storage patterns, weak crypto, exported components, debug flags.
  2. Insecure Data Storage: Check SharedPreferences/Keychain for sensitive data, SQLite DBs, log files, clipboard exposure, backup extraction.
  3. Certificate Pinning Bypass: Use Frida/Objection to disable pinning, intercept HTTPS traffic, test HTTP fallback.
  4. Auth & Session on Mobile: Token storage security, biometric bypass, session timeout, deep link auth bypass.
  5. IPC Testing: Exported Activities/Services/BroadcastReceivers (Android), URL scheme hijacking (iOS), intent injection, custom URI handler abuse.
  6. Binary Protections: Root/jailbreak detection bypass, anti-tampering bypass, code obfuscation assessment, runtime manipulation via Frida.
  7. Mobile-Context API Testing: APIs trusting mobile client-side validation, device-ID spoofing, push notification token abuse.

Tool Categories

Category Tools Purpose
Runtime Instrumentation Frida, Objection Hook functions, bypass protections
Static Analysis MobSF, jadx, Hopper Decompile and analyze binaries
Traffic Interception Burp Suite, mitmproxy HTTPS interception with pinning bypass
Android Testing adb, drozer Component testing, IPC analysis
iOS Testing Objection, cycript Runtime manipulation, keychain dump

References

  • references/tools.md – Tool function signatures and parameters
  • references/workflows.md – Attack pattern definitions and test vectors