

Dumping the APK and Decompiling to Sourceīelow is a list of requirements for performing the attacks covered in this blog.Modifying the AndroidManifest.xml to Enable Debugging.This blog should be interesting to mobile penetration testers and developers who are trying to gain a better understanding of possible attacks on the Android platform. Some examples include intercepting traffic before it is encrypted, obtaining encryption keys when they are being used, and obtaining passwords and other sensitive data when they don’t touch the disk. The best part is, root privilege is not required. This can come in handy during mobile application penetration tests because we can step into an application while it’s running and potentially obtain and write information that we normally wouldn’t have access to. In this blog, I am going to walk through how we can attach a debugger to an Android application and step through method calls by using information gained from first decompiling it.
