B3nac / InjuredAndroid

A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

InjuredAndroid - CTF

A vulnerable Android application with ctf examples based on bug bounty findings, exploitation concepts, and pure creativity.

Now available on Google Play! https://play.google.com/store/apps/details?id=b3nac.injuredandroid


Setup for a physical device

  1. Download the latest release injuredandroid.apk from the releases or Google Play.

  2. Enable USB debugging on your Android test phone.

  3. Connect your phone and your pc with a usb cable.

  4. Install via adb if installing from releases. adb install InjuredAndroid.apk. Note: You need to use the absolute path to the .apk file or be in the same directory.

Setup for an Android Emulator using Android Studio

  1. Use adb to pull the apk off of your device or install after downloading the latest release apk.

  2. Start the emulator from Android Studio (I recommend downloading an emulator with Google APIs so root adb can be enabled).

  3. Drag and drop the .apk file on the emulator and InjuredAndroid.apk will install.


Build from source

  1. git clone https://github.com/B3nac/InjuredAndroid.git

  2. Create local.properties for the flutter_module

Example for Windows:

sdk.dir=C:\\Users\\B3nac\\AppData\\Local\\Android\\Sdk
flutter.sdk=C:\\Users\\YourUsername\\PathTo\\flutter

Example for Linux:

sdk.dir=/home/username/Android/Sdk
flutter.sdk=/home/username/flutter
  1. Set the Flutter path in Android Studio

File -> Settings -> Languages ​​& Frameworks -> Flutter

  1. Enable Dart Support in Android Studio

  2. Run flutter pub get to import the flutter dependencies

  3. Download the Android NDK that is required for the Assembly flag.

  4. Now you should be able to compile the latest release of InjuredAndroid!


Tips and CTF Overview

Decompiling the Android app is highly recommended.

  • XSSTEST is just for fun and to raise awareness on how WebViews can be made vulnerable to XSS.

  • The login flags just need the flag submitted.

  • The flags without a submit that demonstrate concepts will automatically register in the "Flags Overview" Activity.

  • The exclamatory buttons on the bottom right will give users up to three tips for each flag.

Good luck and have fun! :D


Spoilers

Looking at the source code of the applications in the InjuredAndroid directory, InjuredAndroid-FlagWalkthroughs.md file, or binary source code in the Binaries directory will spoil some if not all of the ctf challenges.

About

A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.

License:Apache License 2.0


Languages

Language:Kotlin 51.3%Language:Dart 26.9%Language:Java 11.0%Language:Ruby 6.0%Language:Objective-C 1.3%Language:CMake 1.1%Language:C++ 1.0%Language:Go 0.6%Language:Groovy 0.6%Language:Shell 0.3%