Dark Mode
Capec-499 Detail
Android Intent Intercept
Standard Software
Parents: 117
Children: 501
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-499 | capec | https://capec.mitre.org/data/definitions/499.html | |
| CWE-925 | cwe | http://cwe.mitre.org/data/definitions/925.html | |
| REF-427 | reference_from_CAPEC | https://people.eecs.berkeley.edu/~daw/papers/intents-mobisys11.pdf | Erika Chin, Adrienne Porter Felt, Kate Greenwood, David Wagner, Analyzing Inter-Application Communication in Android, 2011, International Conference on Mobile Systems, Applications, and Services (MobiSys) |
Explore
-
Find an android application that uses implicit intents: Since this attack only works on android applications that use implicit intents, rather than explicit intents, an adversary must first identify an app that uses implicit intents. They must also determine what the contents of the intents being sent are such that a malicious application can get sent these intents.
Experiment
-
Create a malicious app: The adversary must create a malicious android app meant to intercept implicit intents from a target application
-
Get user to download malicious app: The adversary must get a user using the targeted app to download the malicious app by any means necessary
| Techniques |
|---|
| Specify the type of intent wished to be intercepted in the malicious app's manifest file using an intent filter |
Exploit
-
Intercept Implicit Intents: Once the malicious app is downloaded, the android device will forward any implicit intents from the target application to the malicious application, allowing the adversary to gaina access to the contents of the intent. The adversary can proceed with any attack using the contents of the intent.
| Techniques |
|---|
| Block the intent from reaching the desired location, causing a denial of service |
| Gather sensitive information from the intercepted intent |
| Modify the contents of the intent and forward along to another application |
- An adversary must be able install a purpose built malicious application onto the Android device and convince the user to execute it. The malicious application is used to intercept implicit intents.
Not present
Not present
| Integrity | Availability | Confidentiality |
|---|---|---|
| Modify Data | Resource Consumption | Read Data |
Not present