欢迎来到 黑吧安全网 聚焦网络安全前沿资讯,精华内容,交流技术心得!

Android App渗透测试工具分享

来源:本站整理 作者:佚名 时间:2018-09-07 TAG: 我要投稿
$ run information.datetime                     // Print Date/Time                                                              
$ run information.deviceinfo                   // Get verbose device information                                                
$ run information.permissions                  // Get a list of all permissions used by packages on the device                  
$ run scanner.activity.browsable               // Get all BROWSABLE activities that can be invoked from the web browser        
$ run scanner.misc.native                      // Find native components included in packages                                  
$ run scanner.misc.readablefiles               // Find world-readable files in the given folder                                
$ run scanner.misc.secretcodes                 // Search for secret codes that can be used from the dialer                      
$ run scanner.misc.sflagbinaries               // Find suid/sgid binaries in the given folder (default is /system).            
$ run scanner.misc.writablefiles               // Find world-writable files in the given folder                                
$ run scanner.provider.finduris                // Search for content providers that can be queried from our context.            
$ run scanner.provider.injection               // Test content providers for SQL injection vulnerabilities.                    
$ run scanner.provider.sqltables               // Find tables accessible through SQL injection vulnerabilities.                
$ run scanner.provider.traversal               // Test content providers for basic directory traversal vulnerabilities.        
$ run shell.exec                               // Execute a single Linux command.                                              
$ run shell.send                               // Send an ASH shell to a remote listener.                                      

上一页  [1] [2] [3] [4] [5] [6] [7]  下一页

【声明】:黑吧安全网(http://www.myhack58.com)登载此文出于传递更多信息之目的,并不代表本站赞同其观点和对其真实性负责,仅适于网络安全技术爱好者学习研究使用,学习中请遵循国家相关法律法规。如有问题请联系我们,联系邮箱admin@myhack58.com,我们会在最短的时间内进行处理。
  • 最新更新
    • 相关阅读
      • 本类热门
        • 最近下载