📔
Notes
  • Notes
  • Starting with (n)vim
  • Bluetooth
  • Hacking boot2root/ OSCP notes
  • Capture the flag(CTF)
    • Commonly Used Tools
    • Web
    • Cryptography
    • Forensics
  • Making a boot2root VM
    • Important rules
    • [General things](VM/Make boot2root VM.md)
    • Setting Systemd services
    • Setting fail2ban
  • BugBounty notes for Android
    • General
    • Adb/drozer commands
    • Intents
    • Permissions
    • Activities
    • Broadcast Receivers
    • Content Providers
    • Services
  • BugBounty notes for WEB
    • Authentication
    • CORS
    • General Web
    • HTTP Parameter poisoning
    • IDOR
    • graphql
  • Age of Empires IV
    • Age Of Empires
    • Build Orders
      • English Civ
    • Sheep scouting
Powered by GitBook
On this page
  1. BugBounty notes for Android

Services

Runs code inside the application.

  • These are implemented on onStartCommand() , this method accepts the intent

    • This could be vulnerable but again it depends on the code like what it is doing actually inside the code. How the intents are handled.

    • run app.service.start to start the service and see what's up.

  • There is something called Bound Service - this help application connect with each other

    • There are ways to implement this but mostly it done by what's know as Messenger Implementation

      • Check out handleMessage() functions:

        • That will tell you what kinds of message are expected and how the application executes other functions.

  • run [app.service.info](http://app.service.info) -a <package-name>

PreviousContent ProvidersNextBugBounty notes for WEB

Last updated 3 years ago