A vulnerable Android application with ctf examples based on bug bounty findings, exploitation concepts, and pure creativity.
Now available on Google Play! https://play.google.com/store/apps/details?id=b3nac.injuredandroid
-
Download the latest release injuredandroid.apk from the releases or Google Play.
-
Enable USB debugging on your Android test phone.
-
Connect your phone and your pc with a usb cable.
-
Install via adb if installing from releases.
adb install InjuredAndroid.apk
. Note: You need to use the absolute path to the .apk file or be in the same directory.
-
Use adb to pull the apk off of your device or install after downloading the latest release apk.
-
Start the emulator from Android Studio (I recommend downloading an emulator with Google APIs so root adb can be enabled).
-
Drag and drop the .apk file on the emulator and InjuredAndroid.apk will install.
-
git clone https://github.com/B3nac/InjuredAndroid.git
-
Create local.properties for the flutter_module
Example for Windows:
sdk.dir=C:\\Users\\B3nac\\AppData\\Local\\Android\\Sdk
flutter.sdk=C:\\Users\\YourUsername\\PathTo\\flutter
Example for Linux:
sdk.dir=/home/username/Android/Sdk
flutter.sdk=/home/username/flutter
- Set the Flutter path in Android Studio
File -> Settings -> Languages & Frameworks -> Flutter
-
Enable Dart Support in Android Studio
-
Run
flutter pub get
to import the flutter dependencies -
Download the Android NDK that is required for the Assembly flag.
-
Now you should be able to compile the latest release of InjuredAndroid!
Decompiling the Android app is highly recommended.
-
XSSTEST is just for fun and to raise awareness on how WebViews can be made vulnerable to XSS.
-
The login flags just need the flag submitted.
-
The flags without a submit that demonstrate concepts will automatically register in the "Flags Overview" Activity.
-
The exclamatory buttons on the bottom right will give users up to three tips for each flag.
Good luck and have fun! :D
Looking at the source code of the applications in the InjuredAndroid directory, InjuredAndroid-FlagWalkthroughs.md file, or binary source code in the Binaries directory will spoil some if not all of the ctf challenges.