|
47 | 47 | - `flutter-packer`, `fluttersign`, `rn-differ` |
48 | 48 | - [ ] Scan third-party native libraries for known CVEs (e.g., **libwebp CVE-2023-4863**, **libpng**, etc.). |
49 | 49 | - [ ] Evaluate **SEMgrep Mobile rules**, **Pithus** and the latest **MobSF ≥ 3.9** AI-assisted scan results for additional findings. |
| 50 | +- [ ] Check OEM ROM add-ons (OxygenOS/ColorOS/MIUI/OneUI) for extra **exported ContentProviders** that bypass permissions; try `content query --uri content://com.android.providers.telephony/ServiceNumberProvider` without `READ_SMS` (e.g., OnePlus CVE-2025-10184). |
50 | 51 |
|
51 | 52 | ### [Dynamic Analysis](android-app-pentesting/index.html#dynamic-analysis) |
52 | 53 |
|
|
66 | 67 | - [ ] Attempt **overlay / SYSTEM_ALERT_WINDOW clickjacking** and **Accessibility Service abuse** for privilege escalation. |
67 | 68 | - [ ] Check if `adb backup` / `bmgr backupnow` can still dump app data (apps that forgot to disable `allowBackup`). |
68 | 69 | - [ ] Probe for **Binder-level LPEs** (e.g., **CVE-2023-20963, CVE-2023-20928**); use kernel fuzzers or PoCs if permitted. |
69 | | -- [ ] If Play Integrity / SafetyNet is enforced, try runtime hooks (`Frida Gadget`, `MagiskIntegrityFix`, `Integrity-faker`) or network-level replay. |
| 70 | +- [ ] If Play Integrity / SafetyNet is enforced, try runtime hooks (`Frida Gadget`, `MagiskIntegrityFix`, `Integrity-faker`) or network-level replay. Recent Play Integrity Fix forks (≥17.x) embed `playcurl`—focus on ZygiskNext + PIF + ZygiskAssistant/TrickyStore combinations to regain DEVICE/STRONG verdicts. |
70 | 71 | - [ ] Instrument with modern tooling: |
71 | | - - **Objection > 2.0**, **Frida 17+**, **NowSecure-Tracer (2024)** |
| 72 | + - **Objection > 2.0**, **Frida 17+ (Android 16 support, ART offset fixes)**, **NowSecure-Tracer (2024)** |
72 | 73 | - Dynamic system-wide tracing with `perfetto` / `simpleperf`. |
| 74 | +- [ ] For OEM telephony/provider bugs (e.g., OxygenOS CVE-2025-10184), attempt **permission-less SMS read/send** via the `content` CLI or in-app `ContentResolver`; test blind SQLi in `update()` to exfiltrate rows. |
73 | 75 |
|
74 | 76 | ### Some obfuscation/Deobfuscation information |
75 | 77 |
|
|
79 | 81 | ## References |
80 | 82 |
|
81 | 83 | - [CVE-2025-59489 – Arbitrary Code Execution in Unity Runtime (blog)](https://flatt.tech/research/posts/arbitrary-code-execution-in-unity-runtime/) |
| 84 | +- [Rapid7: CVE-2025-10184 OnePlus OxygenOS Telephony provider permission bypass](https://www.rapid7.com/blog/post/cve-2025-10184-oneplus-oxygenos-telephony-provider-permission-bypass-not-fixed/) |
| 85 | +- [TapTrap animation-based tapjacking research (TU Wien)](https://www.tomsguide.com/computing/online-security/this-new-android-attack-could-trick-you-into-compromising-your-own-phone-everything-you-need-to-know) |
82 | 86 |
|
83 | | -{{#include ../banners/hacktricks-training.md}} |
| 87 | +{{#include ../banners/hacktricks-training.md}} |
0 commit comments