Workshop's eBook: Penetration Testing Apps for Android Devices. How to capture and analyze network traffic on Android devices - Pentestmag

Workshop's eBook: Penetration Testing Apps for Android Devices. How to capture and analyze network traffic on Android devices


Dear Readers,

This issue will teach you how to how to capture and analyze network traffic on Android devices and extract sensitive information and files from a packet capture from an Android device.

The course has been refreshed, join now for more challenges:




Table of content:


1)  Try to build an Android app

  1. Write a small Java application that scans for open ports, in a wireless network, based on the Intercepter-ng and dSploit application operation.
  2. Extend the previous code, to search in the CVE database, for vulnerabilities based on the results of the previous code (open ports).
  3. Put your Java program to Android Studio and try to build an Android app that runs the previously written code with the opening of the app automatically, and presents the results in the device screen.
  4. Try the app on your Android device.


2) zANTI application

  1. Run a MITM attack with zANTI, and in the logged requests check if there is any known browser vulnerability. Find the way to exploit it, in a search engine, and exploit it with the given instructions.
  2. With the way that we installed Kali Linux distribution, install and set up BackBox Linux.
  3. Write a JavaScript code that steals the cookie from a browser and sends it back to you in plain text format. Implement this code in the victims pages with the Intercept HTML MITM attack in zANTI application.
  4. Find the latest Windows vulnerability in Exploit DataBase and implement the exploit to Metasploit framework. Now try to exploit an unpatched target Windows machine.
  5. Find the exact technical aspects of ICMP and try to produce an ICMP MITM attack (doubledirect) with Ettercap.
  6. Install an .img custom recovery file on your device with adb, and boot to recovery to see if the procedure was successful.


3) Kali NetHunter

  1. Port Kali Nethunter in a device you do not own, based on the Kernel source code of this device. Upload it in XDA forums and find out if it works correctly by the replies in your thread.
  2. If your Kali NetHunter port doesn’t work, try to find the problem, fix it, and publish v.2 of your port.
  3. Try to run your favorite Linux utilities in the terminal emulator with root privileges, to see if they can run in the Kali NetHunter Rom.
  4. Write a RubberDucky script that takes a meterpreter session with the execution on the target machine.
  5. Run the HID attack with the LHOST and the LPORT fasing in an external IP address, and set up the Metasploit listener to face in the external IP address. (Hint: port forwarding)
  6. Change the Windows password with CMD commands, by writing them in the Windows CMD HID attack, and execute it like the Powersploit attack.

4) Java Applet Attack

  1. Execute the BadUSB attack and use Intercepter-ng application in the rndis0 interface, to perform extra MITM attack methods.
  2. Use dsnif script from Kali Menu after a BadUSB attack to sniff plain text passwords.
  3. Perform a Java Applet Attack with SET with the attacking machine listening to the external IP of the local network. (Hint: Port forwarding, set_config)
  4. Run OpenVAS from the Kali Menu to find if a target machine on your network is vulnerable.
  5. Based on the OpenVAS results, find the appropriate exploit and try to take a meterpreter session on the target machine by using it.
  6. If the target system has no known vulnerabilities, head to Exploit database, download a vulnerable application, install it on the target system and try to exploit it with metasploit on an Android device.


5) Crack the WEP protocol of your router with an external antenna connected to your Android device

  1. Find the interface of your internal wifi antenna and run Airodump-ng with it, in the terminal emulator.
  2. Crack the WEP protocol of your router with an external antenna connected to your Android device over Y-cable, and the Aircrack-ng suite running from the terminal emulator, manually.
  3. Set up a MANA evil access point and perform MITM actions with tools from the Kali Menu that you think they will be useful.


Visit the original course:

Taking part in the course will get you:

  • More material;
  • Instructor's guidance;
  • Exercises and challenges;
  • Open discussion with the instructor and other students;
  • Certificate of Completion.



If you are not a subscriber and want to buy this magazine click here


Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023