Skip to content

Android Services 101 #1186

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jul 28, 2025
Merged

Conversation

carlospolop
Copy link
Collaborator

🤖 Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

📝 Source Information

🎯 Content Summary

Android Service & AIDL Technical Summary

Overview of Android Services

Android Services are background components running within the same process to handle tasks such as media playback, directory enumeration, or hardware-bound connections (e.g., Bluetooth). They can operate as foreground, background, or bound services and, when exported in the manifest, become accessible to other apps via IPC mechanisms like explicit Intents or AIDL.🔧 Technical Details

AIDL Service Enumeration: Use service list (or am list services) to retrieve exported AIDL interface names and their dynamic service IDs.

Transaction ID Brute-Forcing: Iterate transaction codes with service call <service> <code> until valid Parcel replies appear instead of “Not a data message”.

Interface Reverse-Engineering: Decompile vendor/system JARs (e.g...

🤖 Agent Actions

Added comprehensive AIDL / Binder service enumeration & exploitation guidance to:
src/mobile-pentesting/android-app-pentesting/android-applications-basics.md

Key additions:

  1. Detailed step-by-step enumeration workflow:
    service list discovery
    • Interface descriptor “PING” transaction
    service call syntax & parameter types
    • Brute-forcing unknown transaction IDs

  2. Reverse-engineering tips:
    • Locating Stub.onTransact()
    • Mapping transaction codes to method prototypes
    • Identifying missing permission checks (case-study on MediaTek metrics service)

  3. Practical automation resources & security testing considerations.

  4. New “## References” section citing the Pentest Partners blog and relevant Android documentation.

This enriches the existing AIDL se...

✅ Review Checklist

  • Content is technically accurate
  • Formatting follows HackTricks style guidelines
  • Links and references are working
  • Content adds educational value
  • No sensitive information is exposed

This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

@carlospolop
Copy link
Collaborator Author

🔗 Additional Context

Original Blog Post: https://www.pentestpartners.com/security-blog/android-services-101/

Content Categories: Based on the analysis, this content was categorized under "generic-hacking/android-services-and-aidl".

Repository Maintenance:

  • MD Files Formatting: 860 files processed

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

@carlospolop
Copy link
Collaborator Author

merge

@carlospolop carlospolop merged commit 6a37b08 into master Jul 28, 2025
@carlospolop carlospolop deleted the update_Android_Services_101_20250725_182755 branch July 28, 2025 14:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant