项目作者: gremwell

项目描述 :
Windows Phone 8(.1) Pentesting Tools
高级语言: C#
项目地址: git://github.com/gremwell/wp8pentesting.git
创建时间: 2018-07-04T10:49:11Z
项目社区:https://github.com/gremwell/wp8pentesting

开源协议:GNU General Public License v3.0

下载


Windows Phone 8(.1) Pentesting Tools

Penetration testing Windows Phone 8(.1) devices and applications.

Installation

The script rely on appy module, you can install it using pip:

  1. $ pip install -r requirements.txt

If you plan on using the decompile command, you’ll need to install ILSpy.

Setup is more tricky on Linux because you need Mono to compile C# code. Should works like a charm if you follow these instructions:

  1. Install Mono following instructions
  2. Compile ILSpy for Mono by executing cd wp8pentesting/decompiler && make

Usage

Prior to executing any of those commands, you’ll need to boot a jailbroken Huawei Ascend W1 device in storage mode (Power + Vol-) and mount the device on your test machine.

List all apps

List name and version of applications installed on device.

  1. $ python wp.py /mnt/wp8 list
  2. [-] @Resources/Title/AppResLib.dll,-101 (1.0.0.0)
  3. [-] @Resources/Tilte/AppResLib.dll,-101 (1.0.0.0)
  4. [-] @Resources/TitleResources/TitleResources.dll,-101 (1.0.0.0)
  5. [-] Apps@Work (9.0.0.5)
  6. [-] IE (1.0.0.3)
  7. [-] OneDrive (3.5.0.0)
  8. [-] @Resources\AppResLib.dll,-100 (2.0.1403.2)
  9. [-] @Resources\AppResLib.dll,-100 (2.6.185.0)
  10. [-] @Resources\AppResLib.dll,-100 (2.5.3995.0)

Backup application

Backup binaries and isolated storage to analysis/GUID/code and analysis/GUID/storage, respectively.

  1. $ python wp.py /mnt/wp8 backup Apps@Work
  2. Title: Apps@Work
  3. Author: MobileIron
  4. Publisher: MobileIron
  5. Version: 9.0.0.5
  6. Description:
  7. Runtime: Silverlight
  8. GUID: {F632C2FB-5C10-47ED-8F8A-0B95E029D7E1}
  9. Capabilities
  10. - ID_CAP_NETWORKING
  11. - ID_CAP_IDENTITY_DEVICE
  12. - ID_CAP_PUSH_NOTIFICATION
  13. Package: /mnt/wp8/PROGRAMS/{F632C2FB-5C10-47ED-8F8A-0B95E029D7E1}
  14. Local storage: /mnt/wp8/Users/DefApps/APPDATA/{F632C2FB-5C10-47ED-8F8A-0B95E029D7E1}
  15. Backing up 'Apps@Work' installation directory ...
  16. Backing up 'Apps@Work' local storage directory ...

Decompile binaries

Decompile backed up binaries from analysis/GUID/code into analysis/GUID/decompiled using ILSpy decompiler

  1. $ python wp.py /mnt/wp8 decompile Apps@Work
  2. [+] Starting decompilation (this can take a while) ...