Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
All it started with two simple questions:
How we can sniff ssl traffic in order to understand which services are invoked?
and
Is there a method to automate all the process from decompile a .apk to upload on your device?
For the first questions i found a lot of guides that explain the procedure of modify the AndroidManifest.xml and the network_security_config.xml but there is not a single formula, there are different factors to understand in order to do it correctly.
For the second question is: Yes... but.
i found different types of project the on Github but they aren't completely automated in all those phases so here we are.
I read a lot of guides most of those requires to have a rooted device so i tried to create something to sniff the encrypted traffic unrooted devices in order to help all security researchers, this software is UNSTABLE for now a lot of "unlocked" apps will not work with this mod.
ssl_pinning_remover has all the following phases:
To use this script you need to install all those softwares in your environment:
On your device:
$ pip install -r requirements.txt
$ pip install ssl-pinning-remover
Parameter | Description | Mandatory |
---|---|---|
-i --input | Used to specify the input .apk path | Yes |
-v --verbose | Used to increase the stdout verbosity | No |
-u --upload | Used to specify if you want upload the "unlocked" apk in the connected device or not | No |
Elaborate without uploading .apk:
ssl_pinning_remover -i test.apk -v
Elaborate and upload .apk:
ssl_pinning_remover -i test.apk -v -u
Continue implementing studying difference configuration cases
Make the software working for most of the applications in the play store
Add more options
Code review
This project is for educational and research purposes only. Any actions and/or activities related to the material contained on this GitHub Repository is solely your responsibility. The misuse of the information in this GitHub Repository can result in criminal charges brought against the persons in question. The author will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this GitHub Repository to break the law.
FAQs
An SSL Pinning Remover for Android Apps
We found that ssl-pinning-remover demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.