All Projects → appsecco → Vyapi

appsecco / Vyapi

Licence: mit
VyAPI - A cloud based vulnerable hybrid Android App

Programming Languages

java
68154 projects - #9 most used programming language

Projects that are alternatives of or similar to Vyapi

Androl4b
A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
Stars: ✭ 908 (+1110.67%)
Mutual labels:  application-security, mobile-security
Jackhammer
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (+744%)
Mutual labels:  application-security, mobile-security
Evabs
An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners.
Stars: ✭ 173 (+130.67%)
Mutual labels:  application-security, mobile-security
Dexcalibur
[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
Stars: ✭ 512 (+582.67%)
Mutual labels:  mobile-security
Command Injection Payload List
🎯 Command Injection Payload List
Stars: ✭ 658 (+777.33%)
Mutual labels:  application-security
Serverless Aws Cognito Login
Simple example project with instructions how to implement serverless login using AWS Cognito.
Stars: ✭ 26 (-65.33%)
Mutual labels:  aws-cognito
Pivaa
Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of mobile vulnerability scanners.
Stars: ✭ 71 (-5.33%)
Mutual labels:  mobile-security
Juice Shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+8260%)
Mutual labels:  application-security
Amplify Js
A declarative JavaScript library for application development using cloud services.
Stars: ✭ 8,539 (+11285.33%)
Mutual labels:  aws-cognito
Janusec
Janusec Application Gateway, Provides Fast and Secure Application Delivery. JANUSEC应用网关,提供快速、安全的应用交付。
Stars: ✭ 771 (+928%)
Mutual labels:  application-security
Breaking And Pwning Apps And Servers Aws Azure Training
Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!
Stars: ✭ 749 (+898.67%)
Mutual labels:  application-security
Insomnia Plugin Aws Cognito Token
Insomnia plugin for AWS Cognito
Stars: ✭ 33 (-56%)
Mutual labels:  aws-cognito
Aws Serverless Auth Reference App
Serverless reference app and backend API, showcasing authentication and authorization patterns using Amazon Cognito, Amazon API Gateway, AWS Lambda, and AWS IAM.
Stars: ✭ 724 (+865.33%)
Mutual labels:  aws-cognito
Serverless Stack Demo Client
Source for the demo app client in Serverless-Stack.com
Stars: ✭ 629 (+738.67%)
Mutual labels:  aws-cognito
Frida Snippets
Hand-crafted Frida examples
Stars: ✭ 1,081 (+1341.33%)
Mutual labels:  mobile-security
Awesome Appsec
A curated list of resources for learning about application security
Stars: ✭ 4,761 (+6248%)
Mutual labels:  application-security
Stacoan
StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
Stars: ✭ 707 (+842.67%)
Mutual labels:  mobile-security
Ossa
Open-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+961.33%)
Mutual labels:  application-security
Mobile Security Framework Mobsf
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Stars: ✭ 10,212 (+13516%)
Mutual labels:  mobile-security
Appmon
Documentation:
Stars: ✭ 1,157 (+1442.67%)
Mutual labels:  mobile-security

VyAPI - The Modern Cloud-Based Vulnerable Hybrid Android App

VyAPI Logo

VyAPI is a vulnerable hybrid Android app that's vulnerable by design. We call it VyAPI, because it's flaws are pervasive and it communicates not just via IPC calls but API calls, too.

More details in our introductory blog post

Amazon Cognito has been used to handle authentication, authorization and user management. AWS Amplify Console has been used to consume the Authentication APIs provided by AWS Amplify Authentication module. Room persistence library has been used to handle data in the local SQLite database. Glide API has been used to load images. AndroidX libraries and JAVA programming language have been used to develop the business logic of VyAPI Android app.

We know how to attack activities, but, what could change with fragments coming into the picture? There might be a case where we just have one activity, but multiple fragments (each rendering a different functionality) in our Android app. VyAPI will allow you to experience this behavior of our modern day Android apps.

VyAPI is different not only in terms of its look and feel, but also in terms of latest technologies being used to build it. Following primary tools and technologies have been used to develop VyAPI

  1. AWS Amplify CLI
  2. AWS Mobile SDK for Android 10
  3. Amazon Cognito
  4. OpenJDK 1.8.0_152-release
  5. Glide v4
  6. Room Persistence Library
  7. Gradle 5.1.1

Modern technologies are eliminating security risks by blocking vulnerable features by default. However, not all vulnerabilities could go away that easily. Also, with new technologies come new security vulnerabilities. Security misconfigurations, business logic flaws, and poor coding practices are evergreen vulnerabilities. VyAPI is the vulnerable hybrid Android app which can be used by our security enthusiasts to get a hands-on experience of a variety of modern and legacy Android app vulnerabilities.

Prerequisites

  1. Node.js (Latest version)
  2. Amplify CLI
  3. Android Studio and SDK Tools (for building the APK)
  4. An active AWS account with Administrative access
  5. Android emulator (API level 23 or above)

Note: The commands have been verified in a Linux environment (Ubuntu 19.04).

Installation Steps (Linux)

  1. Install Amplify CLI

    sudo npm install -g @aws-amplify/cli --unsafe-perm=true
    

    Note: --unsafe-perm=true is required because of a recent issue with Amplify and latest version of gyp. Ignore errors related to dependencies.

  2. Check if Amplify CLI was installed successfully

    amplify status
    

Amazon Cognito Setup

  1. Checkout the source code from Github

    git clone [email protected]:appsecco/VyAPI.git
    
  2. Enter the root directory of the cloned project.

    cd VyAPI/
    
  3. Run following command to initialize the project to work with the Amplify CLI

    amplify init
    

    Sample Output:

    [email protected]:~$ amplify init
    Note: It is recommended to run this command from the root of your app directory
    ? Do you want to use an existing environment? No
    ? Enter a name for the environment cognito
    ? Choose your default editor: Visual Studio Code
    Using default provider  awscloudformation
    For more information on AWS Profiles, see:
    https://docs.aws.amazon.com/cli/latest/userguide/cli-multiple-profiles.html
    ? Do you want to use an AWS profile? Yes
    ? Please choose the profile you want to use amplify-user
    ⠇ Initializing project in the cloud...
    CREATE_IN_PROGRESS vyapimvvm-cognito-20190909113320 AWS::CloudFormation::Stack Mon Sep 09 2019 11:33:21 GMT+0530 (India Standard Time) User Initiated             
    CREATE_IN_PROGRESS DeploymentBucket                 AWS::S3::Bucket            Mon Sep 09 2019 11:33:24 GMT+0530 (India Standard Time)                            
    CREATE_IN_PROGRESS UnauthRole                       AWS::IAM::Role             Mon Sep 09 2019 11:33:24 GMT+0530 (India Standard Time)                            
    CREATE_IN_PROGRESS AuthRole                         AWS::IAM::Role             Mon Sep 09 2019 11:33:24 GMT+0530 (India Standard Time)                            
    CREATE_IN_PROGRESS UnauthRole                       AWS::IAM::Role             Mon Sep 09 2019 11:33:24 GMT+0530 (India Standard Time) Resource creation Initiated
    CREATE_IN_PROGRESS DeploymentBucket                 AWS::S3::Bucket            Mon Sep 09 2019 11:33:25 GMT+0530 (India Standard Time) Resource creation Initiated
    CREATE_IN_PROGRESS AuthRole                         AWS::IAM::Role             Mon Sep 09 2019 11:33:25 GMT+0530 (India Standard Time) Resource creation Initiated
    ⠴ Initializing project in the cloud...
    CREATE_COMPLETE UnauthRole AWS::IAM::Role Mon Sep 09 2019 11:33:38 GMT+0530 (India Standard Time) 
    CREATE_COMPLETE AuthRole   AWS::IAM::Role Mon Sep 09 2019 11:33:39 GMT+0530 (India Standard Time) 
    ⠧ Initializing project in the cloud...
    CREATE_COMPLETE DeploymentBucket AWS::S3::Bucket Mon Sep 09 2019 11:33:45 GMT+0530 (India Standard Time) 
    ⠏ Initializing project in the cloud...
    CREATE_COMPLETE vyapimvvm-cognito-20190909113320 AWS::CloudFormation::Stack Mon Sep 09 2019 11:33:48 GMT+0530 (India Standard Time) 
    ✔ Successfully created initial AWS cloud resources for deployments.
    ✔ Initialized provider successfully.
    Initialized your environment successfully.
    Your project has been successfully initialized and connected to the cloud!
    Some next steps:
    "amplify status" will show you what you've added already and if it's locally configured or deployed
    "amplify <category> add" will allow you to add features like user login or a backend API
    "amplify push" will build all your local backend resources and provision it in the cloud
    "amplify publish" will build all your local backend and frontend resources (if you have hosting category added) and provision it in the cloud
    Pro tip:
    Try "amplify add api" to create a backend API and then "amplify publish" to deploy everything
    
  4. Configure Amplify CLI by running below command and following the instructions as displayed on the console

    amplify configure
    

    Sample Output:

    [email protected]:~$ amplify configure
    Follow these steps to set up access to your AWS account:
    Sign in to your AWS administrator account:
    https://console.aws.amazon.com/
    Press Enter to continue
    Specify the AWS Region
    ? region:  us-east-1
    Specify the username of the new IAM user:
    ? user name:  amplify-user
    Complete the user creation using the AWS console
    https://console.aws.amazon.com/iam/home?region=undefined#/users$new?step=final&accessKey&userNames=amplify-user&permissionType=policies&policies=arn:aws:iam::aws:policy%2FAdministratorAccess
    Press Enter to continue
    Enter the access key of the newly created user:
    ? accessKeyId:  A**********************
    ? secretAccessKey:  p*************************************
    This would update/create the AWS Profile in your local machine
    ? Profile Name:  amplify-user
    Successfully set up the new user.
    

    Note:

    • It requires you to login into the AWS Management Console.
    • You need to create a new user and obtain the corresponding Access Key ID and Secret Access Key values.
    • If you wish to reuse an existing user, skip the user creation step and press enter to enter the access key of an existing user.
  5. Run the following command to add authentication resource in your local backend:

    amplify add auth
    

    Sample Output:

    [email protected]:~$ amplify add auth                          
    Using service: Cognito, provided by: awscloudformation
    
        The current configured provider is Amazon Cognito. 
        
        Do you want to use the default authentication and security configuration? Default configuration
        Warning: you will not be able to edit these selections. 
        How do you want users to be able to sign in? Username
        Do you want to configure advanced settings? No, I am done.
        Successfully added resource vyapicbc9b00d locally
    
        Some next steps:
        "amplify push" will build all your local backend resources and provision it in the cloud
        "amplify publish" will build all your local backend and frontend resources (if you have hosting category added) and provision it in the cloud
    
  6. Check the state of local resources not yet pushed to the cloud

    amplify status
    

    Sample Output:

    [email protected]:~$ amplify status
    
    Current Environment: cognito
    | Category | Resource name     | Operation | Provider plugin   |
    | -------- | ----------------- | --------- | ----------------- |
    | Auth     | vyapimvvm59909b03 | Create    | awscloudformation |
    
  7. Push the local changes to cloud

    amplify push
    

    Note: Please be patient while this command runs, as it would take a few minutes to complete.

  8. Open the project in Android Studio.

  9. Generate the VyAPI APK by selecting Build Bundle(s)/ APK(s) -> Build APK(s) in Android Studio

    Build APK

  10. Obtain the VyAPI APK from the relative path app/release/app-release.apk

    Built APK

  11. Create an Android Emulator.

    Note: The emulator used during the development of VyAPI had following configuration

    Android Emulator Configuration

  12. Install the VyAPI APK (obtained from step #11, above) into the Android Emulator by running the following command

    adb install app-release.apk
    

Getting Started

  1. Start the VyAPI app to see the Amazon Cognito login screen

    VyAPI Login

  2. Click on the Create New Account button and fill the user registration form.

    VyAPI Login

    Note:

    • Enter a valid email ID
    • Enter 10 digit phone number preceded by plus symbol and two-digit country code (e.g., +915544332211)
    • Confirmation code would be sent to your registered email address
  3. Retrieve the confirmation code from your inbox and paste it into the Confirmation code input box of Confirm your account page

    VyAPI Login

  4. Wait for the Sign up confirmation message to show up

    VyAPI Login

  5. Login with the registered username and password

    VyAPI Login

  6. On successful login, you would see the empty contacts page

    VyAPI Login

    On this screen, you can do following

    • Create a new contact
    • Edit an existing contact
    • Select an existing contact and
      • Call the user
      • Send SMS
      • Send email
      • Open user's website
      • Open user's location in Google Maps
    • Delete an existing contact by swiping the selected contact in right or left direction
  7. Access the Navigation Menu to see other available options

    VyAPI Login

  8. Play some music

    VyAPI Login

  9. Click some pictures

    VyAPI Login

  10. View clicked pictures in the gallery

    VyAPI Login

  11. Explore the remaining features and vulnerabilities.

Blog Posts

How to contribute

In case of bugs in the application, please create an issue on github. Pull requests are highly welcome!

Thank You!

  • @makash: For guiding and encouraging me to explore my interest area
  • @riyazwalikar and Gwilym: For helping me with VyAPI logo design
  • @suneshgovind: For helping me with the documentation and picture editing
  • madhuakula: For prompt feedback and helping with Ops tasks
  • yamakira and abhisek: For their feedback, suggestions and encouragement
  • Ayush Gaurav: For his creative inputs while editing the image used on vulnerable service screen
  • Special thanks to people whom I met through their blogposts and/or their helpful responses on stackoverflow.com, and who's work helped me clarify my concepts and, ultimately, allowed me to turn my imagination into a working model.

Reference Links

License

MIT

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].