APK小程序渗透测试
查找bp的证书
在浏览器中打开bp代理,然后在网页中搜索hppps://burp

点击高级------接受风险并继续


拿到证书
将浏览器信任证书
打开设置

搜索证书
------查看证书

点击导入------导入证书


证书验证成功后,访问网页(吾爱破解
),查看bp的历史记录发现全部的https
都信任

小程序反编译
输入cmd回车,进入cmd命令终端


在命令终端中输入wxapkg_1.5.0_windows_amd64.exe scan
命令

选中腾讯文档,并进行反编译

编译完成后,会生成一个wxd45c635d754dbf59
文件双击进去,发现后缀名几乎都为js

在源代码中搜索key(密钥)、password(如果搜到参数是一串字符串,进行判断)
利用雷电模拟器安装安卓应用
设置雷电模拟器



设置成功后重启模拟器
将模拟器的流量发送给bp

配置模拟器网络代理
设置------网络喝互联网------WLAN------连接的无线网



代理的服务器必须与bp相同

随便点击一个网页,发现bp成功抓取安卓的流量包成功

安装证书
如果没有加到环境变量中,则在相对目录下启动软件
- 当前目录下启动cmd

openssl

- 转换证书格式为
pem
php
openssl x509 -inform DER -in cacert.der -out cacert.pem


使用命令将证书解析为哈希值
shell
openssl x509 -inform PEM -subject_hash -in cacert.pem
把证书重命名为7bf17d07.0

使用adb连接shell
利用adb.exe nodaemon server
启用adb.exe模拟器
- cmd进入终端

启动模拟器

查看连接的设备有哪些
bash
adb.exe devices

以root权限身份启动adb的shell

将编译好的证书上传到adb相同目录下

bash
adb.exe push ./7bf17d07.0 /system/etc/security/cacerts/

成功进入雷电模拟器(安卓)后台

修改后台权限
bash
chmod 644 /system/etc/security/cacerts/7bf17d07.0

重启雷电模拟器(安卓)
bash
reboot

点击APK,查看bp,抓包成功
