eVestigator Forensic PenTester v1 – Remote Code Execution via MITM
The Android application reviewed, according to the developer, performs a 'thorough forensic level Penetration Test'. During run-time and reverse engineering analysis, it was discovered that the application does a connect() scan (i.e. TCP 3-way handshake) to all 65535 TCP ports, for the external IP address of the app user, with 10 simultaneous threads. However, in case a target has all 65535 TCP ports open, the application will actually report that there are 87375 'threats' (i.e. ports) open. Even after scanning all the ports, the application will continue to run forever, and for example count down from the same minute several times. (i.e. when the timer hits 14:00, it goes back up to 14:59). The application does not report to the user which ports are open, and it does not provide a final report either. Nor does it even attempt to grab any service banners. If the 'Send to eVestigator' button is clicked, none of the scan details are sent either. Instead, the external IP address along with other details about the Android environment + user-entered details are sent.