M 204: Equity Pandit (65 pts) M 204:Equity Pandit(65分)

What You Need for This Project你需要什么这个项目

Purpose目的

To observe network transmissions from an insecure app, and prove that they are not encrypted.观察来自不安全应用程序的网络传输,并证明它们未加密。 Also, to observe incredible logical errors in the Equity Pandit app.此外,在Equity Pandit应用程序中观察令人难以置信的逻辑错误。

Installing Equity Pandit安装Equity Pandit

On your Android device, in Google Play, find and install the app, as shown below.在您的Android设备上,在Google Play中,查找并安装该应用,如下所示。

Archived APK存档APK

This project requires the 2016 version of the app, which was the version in Google Play in April, 2019, when I wrote this project.该项目需要2016版本的应用程序,这是我在2019年4月编写此项目时的Google Play版本。 If that version is no longer available, use this archived copy of the app:如果该版本不再可用,请使用此应用程序的存档副本:

base-eqp.apk 基eqp.apk

Preparing the App准备应用程序

Launch the app.启动应用程序。 Click " Create Account ".点击“ 创建帐户 ”。

Fill in the form, as shown below, but don't click the " Sign Up " button yet.填写表格,如下所示,但不要点击“ 注册 ”按钮。

Starting Wireshark启动Wireshark

On your host system, launch Wireshark.在主机系统上,启动Wireshark。 If you don't have it, get it at:如果您没有,请访问:

https://www.wireshark.org/ https://www.wireshark.org/

In the main Wireshark window, double-click the network interface that is being used to reach the Internet.在Wireshark主窗口中,双击用于访问Internet的网络接口。 On my system, it is " Wi-Fi: en0 ", outlined in green in the image below.在我的系统上,它是“ Wi-Fi:en0 ”,在下图中以绿色标出

Wirehark starts displaying packets. Wirehark开始显示数据包。 At the top, in the Filter bar, enter this display filter:在顶部,在过滤器栏中,输入以下显示过滤器:

http HTTP
Press Enter to filter the traffic.Enter键过滤流量。

On your Android device, in EquityPandit, click the " Sign Up " button.在您的Android设备上,在EquityPandit中,单击“ 注册 ”按钮。

In Wireshark, two POST requests appear, as shown below.在Wireshark中,出现两个POST请求,如下所示。

Right-click the second POST request, the one calling "add_user.php", and click Follow , " TCP Stream ".右键单击第二个POST请求,即调用“add_user.php”的请求,然后单击Follow ,“ TCP Stream ”。

The request appears, as shown below, containing your username and password in plaintext.如下所示,请求显示包含明文用户名和密码的请求。

M 204.1: Recording Your Success (15 pts) M 204.1:记录你的成功(15分)

The flag value is the portion of the request covered by a green rectangle in the image above.标志值是上图中绿色矩形覆盖的请求部分。

To record your success, enter that flag into the scoring engine at the top of the main course page.要记录您的成功,请将该标志输入主课程页面顶部的评分引擎。


M 204.2: Find the Server (10 pts) M 204.2:找到服务器(10分)

Uninstall the EquityPandit app and install this app instead:卸载EquityPandit应用程序并安装此应用程序:

A30.2.apk A30.2.apk

Execute a login request.执行登录请求。 The flag is the domain name of the server it sends a POST request to.该标志是它发送POST请求的服务器的域名。


M 204.3: Find the Second Flag (5 pts) M 204.3:找到第二面旗帜(5分)

Use the same app: A30.2.apk.使用相同的应用程序:A30.2.apk。 Explore the app and find the second flag.浏览应用程序并找到第二个标志。

M 204.4: Find the Server (5 pts) M 204.4:找到服务器(5分)

Install this app安装此应用

A30.4.apk A30.4.apk

Execute a login request.执行登录请求。 The flag is the domain name of the server it attempts to connects to.该标志是它尝试连接的服务器的域名。


M 204.5: Find the Stored Password (10 pts) M 204.5:找到存储的密码(10分)

Use the original EquityPandit app.使用原始的EquityPandit应用程序。 Create an account and log in.创建一个帐户并登录。

From Kali, connect to your Android device with adb connect .从Kali,使用adb connect连接到您的Android设备。

If you are not root, first root your device.如果您不是root用户,请首先root设备。 To root BlueStacks, see a later project.要根BlueStacks,请参阅以后的项目。

Open a shell on the Android device with adb shell使用adb shell在Android设备上打开shell

Now you can use normal Bash commands, including these:现在您可以使用普通的Bash命令,包括:

ls LS
cd光盘
pwd PWD
find
grep grep的
nano纳米
more更多
date日期
whoami我是谁
Find the locally stored copy of your password.查找本地存储的密码副本。 The name of the file containing it is the flag.包含它的文件的名称是标志。

M 204.6: Find the Logged Password (10 pts) M 204.6:找到记录密码(10分)

Use the original EquityPandit app.使用原始的EquityPandit应用程序。 Create an account, if necessary, and log in.如有必要,创建一个帐户,然后登录。

From Kali, find your Android device with the netdiscover command.从Kali,使用netdiscover命令找到您的Android设备。

Connect to it with adb connect .使用adb connect连接到它。

View the log with adb logcat使用adb logcat查看日志

Find your password in the log, as shown below.在日志中找到您的密码,如下所示。 The flag is the word covered by a green box in the image below.标志是下图中绿色框所覆盖的单词。


M 204.7: Find My Password (10 pts) M 204.7:查找我的密码(10分)

I made an account on the EquityPandit system with this email address: topsecret@mailinator.com我在EquityPandit系统上创建了一个帐户,其电子邮件地址为: topsecret@mailinator.com

Find my password.找到我的密码。 My password is the flag.我的密码是标志。

Note: don't perform any scans or attacks against any server--we don't have authorization for that. 注意:不要对任何服务器执行任何扫描或攻击 - 我们没有授权。 It is possible to get my password by using the app itself, without performing any attack at all. 可以通过使用应用程序本身来获取我的密码,而不会执行任何攻击。

If you have any questions, talk to your supervisor or your instructor before taking any questionable actions.如果您有任何疑问,请在采取任何可疑行动之前与您的主管或教师联系。


Posted 4-9-19发表于4-9-19
Item 7 instructions clarified 4-17-19第7项指示澄清4-17-19
Item 5 rooting note added 5-22-19第5项生根注释添加了5-22-19