2022-11-25 18:37:17 +00:00
|
|
|
id: exposed-adb
|
2021-08-22 20:03:49 +00:00
|
|
|
|
|
|
|
info:
|
|
|
|
name: Exposed Android Debug Bridge
|
|
|
|
author: pdteam,pikpikcu
|
2021-08-23 09:07:03 +00:00
|
|
|
severity: critical
|
2022-03-22 03:48:47 +00:00
|
|
|
description: An exposed Android debug bridge was discovered.
|
|
|
|
reference:
|
|
|
|
- https://doublepulsar.com/root-bridge-how-thousands-of-internet-connected-android-devices-now-have-no-security-and-are-b46a68cb0f20
|
|
|
|
- https://www.hackeracademy.org/how-to-hack-android-device-with-adb-android-debugging-bridge
|
|
|
|
- https://www.securezoo.com/2018/06/thousands-of-android-devices-leave-debug-port-5555-exposed/
|
2023-07-24 18:27:05 +00:00
|
|
|
tags: network,adb,rce,android,exposure
|
2023-04-28 08:11:21 +00:00
|
|
|
metadata:
|
|
|
|
max-request: 2
|
2021-08-22 20:03:49 +00:00
|
|
|
|
2023-04-27 04:28:59 +00:00
|
|
|
tcp:
|
2021-08-22 20:03:49 +00:00
|
|
|
- inputs:
|
2022-02-28 14:09:26 +00:00
|
|
|
- data: "434e584e0100000100001000ea000000445b0000bcb1a7b1" # Generated using https://github.com/projectdiscovery/network-fingerprint
|
2021-08-22 20:03:49 +00:00
|
|
|
type: hex
|
|
|
|
|
|
|
|
- data: "686f73743a3a66656174757265733d7368656c6c5f76322c636d642c737461745f76322c6c735f76322c66697865645f707573685f6d6b6469722c617065782c6162622c66697865645f707573685f73796d6c696e6b5f74696d657374616d702c6162625f657865632c72656d6f756e745f7368656c6c2c747261636b5f6170702c73656e64726563765f76322c73656e64726563765f76325f62726f746c692c73656e64726563765f76325f6c7a342c73656e64726563765f76325f7a7374642c73656e64726563765f76325f6472795f72756e5f73656e642c6f70656e73637265656e5f6d646e73"
|
|
|
|
type: hex
|
|
|
|
|
|
|
|
host:
|
|
|
|
- "{{Hostname}}"
|
2023-09-16 19:35:21 +00:00
|
|
|
port: 5555
|
2021-08-22 20:03:49 +00:00
|
|
|
|
|
|
|
matchers:
|
|
|
|
- type: word
|
|
|
|
words:
|
|
|
|
- "device"
|
|
|
|
- "product"
|
|
|
|
condition: and
|