Mobile Pentest
Tools and Common vulnerabilities
Last updated
Tools and Common vulnerabilities
Last updated
This Frida script bypasses root detection and SSL pinning in Android apps by blocking root checks, hiding root management tools, and overriding SSL/TLS trust settings to intercept encrypted traffic.
Find sensitive info (key, etc.)
A tool for inspecting and analyzing mobile application storage files.
Monitor user-select APIs during the app execution.
Open the APK with JADX:
Search for API Keys:
Look for hardcoded strings, especially in files like BuildConfig.java
, Constants.java
, or any class that handles network requests.
In Android applications before 7.0 (API level 24), cleartext traffic was allowed by default. The 7.0 release introduced the Network Security Configuration (NSC) feature, allowing developers to customize network security settings through a declarative XML file. It wasn't until the release of Android 9 (API level 28) that cleartext traffic was disabled by default.
To use an NSC file, it must be declared in the application's AndroidManifest.xml file:
The res/xml/network_security_config.xml file must be manually created with the cleartextTrafficPermitted set to "false" to override the insecure default setting:
I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
A practical guide to learning penetration testing for Android devices and applications