-
-
Notifications
You must be signed in to change notification settings - Fork 2.4k
MASTG v1->v2 MASTG-TEST-0026: Testing Implicit Intents (android) #2997
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
This test currently contains mostly 'testing for injection' stuff, which could be moved to #2999, though it would have to be refactored. There are specific issues with implicit intents, for example using them to trigger internal components, which is what this test should cover. |
@cpholguera Please assign this to me. |
Thanks for assigning this @cpholguera. We will take testing injection flaw next. |
@cpholguera Should the demo be using static analysis (using semgrep) or dynamic analysis (using ADB) for this test case of triggering internal components from implicit intents? |
You can do a static demo (semgrep) and a dynamic one (frida). You may also need an attacker, as I did in this PR: https://github.com/OWASP/owasp-mastg/pull/3177/files#diff-7cf9a476904f94bca9185237fd004add0b6a0c20e3ead78ce2813612069c0a22 In my case the "attacker" is a server in python. In your case, it could be a script using adb, a MastgTestAttacker.kt, or whatever you see fit. This would be the first time we use such a MASTG-DEMO-xxxx/MastgTestAttacker.kt, but don't worry, I will take care of the pipelines so that it is built correctly. I can make them generate MASTG-DEMO-xxxx.apk and MASTG-DEMO-xxxx-Attacker.apk if necessary. |
The Demo for the dynamic testcase is completed. The Static demo using semgrep, should we use the semgrep pattern on the reversed_AndroidManifest or the MastgTest_reversed.java? |
Create a new MASTG v2 test covering for":
Follow the guidelines
The text was updated successfully, but these errors were encountered: