This repository has been archived by the owner on Feb 5, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 62
Home
mat3 edited this page Jul 24, 2017
·
2 revisions
BadIntent is the missing link between the Burp Suite and the core Android's IPC/Messaging-system. BadIntent consists of two parts, an Xposed-based module running on Android and a Burp-plugin. Based on this interplay, it is possible to use the Burp's common workflow and all involved tools and extensions, since the intercept and repeater functionality is provided. BadIntent hooks deeply into the Android system, performs various method redirections in Parcels and adds additional services to provide the described features. Most notably, BadIntent works system-wide (experimental feature) and is not restricted to individual user apps.
In the subsections you can learn how BadIntent
- can be configured,
- is used to perform various pentesting activities such as in the following examples:
- identifying insecure logging, access control issues, pasteboard vulnerabilities,
- conduct and configure intent sniffing, brute force attacks,
- AIDL testing, GCM attacks, and searching for WebView vulnerabilities
- and finally how BadIntent can be (mis-)used as a keylogger
- and how BadIntent works