Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel
Welcome to BugBazaar, your gateway to mastering Mobile penetration testing on the Android platform!
📱What is it?
BugBazaar is a comprehensive mobile application intentionally designed to be vulnerable, featuring over 30 vulnerabilities. Developed to emulate real-world scenarios, it includes more than 10 modules and features, each replicating real-world functions and the vulnerabilities surrounding them.
🔍Why?
We've bundled 30+ vulnerabilities into a single application, saving you from downloading multiple apps to learn about mobile application pentesting. We've packed a lot into one.
🎯For whom?
Whether you're a security enthusiast, developer, beginner exploring the mobile pentesting arena, or a professional looking to hone your skills, BugBazaar has something for everyone on the mobile pentesting learning curve.
🤔What's in for me?
BugBazaar offers a wide range of vulnerabilities, from "RCE through insecure Dynamic Code Loading" to "One Click Account Takeover via deeplink." We cover "intent Spoofing" to "SQLite db injection," "WebView" bugs to "IPC" misconfigurations in Android — we've got a lot of things covered.
🤓Never-Ending Learning
What's more exciting? Stay in sync with the evolving landscape! BugBazaar regularly updates with fresh vulnerabilities and captivating challenges. Stay vigilant, stay ahead! Get Started Today!
📷Screenshots
⚠️Vulnerabilities
WEBVIEW
- Opening arbitrary URLs in the webview
- XSS
- OPEN REDIRECTION
- Account Takeover via Stealing Session ID (Host validation bypass)
- Stealing User token Via JavaScriptInterface class
- Access of Arbitrary files via insecure Flags
- Note: Only exploitable until API level 28
- Stealing of Arbitrary files via Insecure
WebResourceResponse
INTENT
- Intent interception
- Account takeover via intent Spoofing
- Steal User's Contact via Insecure Pending Intent
- RCE through insecure Dynamic Code Loading
Deep Link
- CSRF to add the product to cart
- Deep link hijacking to load URLs in webview
- Content Spoofing on Offers activity
IPC COMPONENTS
- Exported Components
- Steal User's Contact via typo permission in Content Provider
- Insecure broadcast receiver
- Access to Protected Components via broadcast Receiver
- Insecure services
- Fragment injection in Refer-Us
Injections
- SQL Injection via user input in My order
- Content Provider SQL Injection in Address
- Data insertion via insecure Content Provider in Address
Unintended Data Leakage
- Copy/Paste buffer Caching
- Application backgrounding
- Insecure Logging (logging user creds
Insecure Storage
- Unencrypted database
- Man in the Disk Attack
- Storing sensitive info in SharedPref
- Hardcoded secrets
OTHERS
- Improper Input Validation
- Unrestricted file upload
- Misconfigured firebase's firestore
- Passcode Bypass
- Tapjacking
- Improper exception Handling
- Debuggable application
- Backup enabled
- Task Hijacking
- Improper cache handling
Runtime exploitation
- Runtime code modification
- Login pin bypass via Frida/Objection
APP Protection
- EASY LEVEL:
- MEDIUM LEVEL:
- Magisk detect
- Emulator Check
- FRIDA DETECTION
- ADVANCE LEVEL - ⚠️IN PROGRESS WILL UPDATE IN UPCOMING Release⚠️
Core Team