You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/mobile-pentesting/android-app-pentesting/android-applications-basics.md
+106Lines changed: 106 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -395,6 +395,112 @@ if (dpm.isAdminActive(adminComponent)) {
395
395
}
396
396
```
397
397
398
+
399
+
## Enumerating and Exploiting AIDL / Binder Services
400
+
401
+
Android *Binder* IPC exposes many **system and vendor-provided services**. Those services become an **attack surface** when they are exported without a proper permission check (the AIDL layer itself performs *no* access-control).
402
+
403
+
### 1. Discover running services
404
+
405
+
```bash
406
+
# from an adb shell (USB or wireless)
407
+
service list # simple one-liner
408
+
am list services # identical output, ActivityManager wrapper
Absence of such logic or a whitelist of privileged UIDs (e.g. `uid == 1000 /*system*/`) is a **vulnerability indicator**.
486
+
487
+
Case study – *MediaTek*`startMonitorProcessWithUid()` (transaction **8**) fully executes a Netlink message **without** any permission gate, allowing an unprivileged app to interact with the kernel’s Netfilter module and spam the system log.
488
+
489
+
### 7. Automating the assessment
490
+
Tools / scripts that speed-up Binder reconnaissance:
491
+
*[binderfs](https://android.googlesource.com/platform/frameworks/native/+/master/cmds/binderfs/) – exposes `/dev/binderfs` with per-service nodes
492
+
*[`binder-scanner.py`](https://github.com/adenflare/binder-scanner) – walks the binder table and prints ACLs
0 commit comments