LAB - Insecure Network Transmission

In this lab environment, you will have GUI access to a Debian machine. The InsecureBankv2 application is available on the Android Emulator.

Objective: Intercept the app traffic with Burp Suite to capture sensitive credentials transmitted in plaintext.

The valid credentials for InsecureBankv2 are as follows:

  • Username: jack

  • Password: Jack@123$

Note: You can start the emulator using the script located on the Desktop. Additionally, check the /root/Tools directory for available tools.


Tools

The best tools for this lab are:

  • Burp Suite


Frist excute the emulator with ./emulator, then the app and it request us credentials -->

This application relies on a back-end server to function properly

To start the back-end server, run the following command:

## Wake up a server with python tool
cd /root/Tools/AndroLabServer
python2.7 app.py

Then, into the app go to the "Preferences" settings -->

Enter the IP address of the host machine where the back-end server is running, then click Submit

Note: (use the ifconfig command to find the IP address). Use the device’s on-screen keyboard to enter your input.

Now, try to log in and if all configurations are good, we can see the user and password in text plain, try (test:test)

BurpSuite Configuration

So... now, we can try to intercept all trafict with burp -->

Here, we need remplace the localhost ip (127.0.0.1) to us IP -->

Now, we need to add a proxy on the Android device. Open Settings and click on Network & internet.

Now, turn on the Intercept in Burp and navegate/login -->

Last updated