Spinner

A tool for automatic black-box detection of missing hostname verification, including for applications that use certificate pinning.

About

Usage Instructions

Vulnerabilities

Publications

Contact

Compilation and Usage Instructions

To compile:

On Linux: javac -cp .:libs/* *.java

On Windows: javac -cp ".;libs/*" *.java

Set up:

Spinner needs to be able to Man-in-the-Middle DNS requests and TLS traffic. To this end, it sets up a DNS and TLS proxy running on ports 53 and 443 respectively. To direct traffic from your testing device to Spinner:

or

To run:

On Linux: sudo java -cp .:libs/* Launcher --help

On Windows: java -cp ".;libs/*" Launcher --help

(Note: root is required as a TLS and DNS server are ran on privileged ports)

The program requires a config file which contains the IP address of the DNS server on your network, and the credentials to use with Censys.io. You will need to sign up for an account here https://censys.io/register.

Example usage

Run the tool with config details specified in the file config and ignore connections to domains listed in the file domain_whitelist

sudo java -cp .:libs/* Launcher -c config -w domain_whitelist

Run the tool without using Censys by manually specifying a redirect domain.

sudo java -cp .:libs/* Launcher -m google.com

If your app is detected as vulnerable. You can narrow down the exact hostname verification vulnerability by using the -m option to check if:

Vulnerable apps

Example vulnerable APKs are linked to on this page.



Disclaimer: This tool is intended for research use, and is currently undergoing further development. We welcome any feedback which can be provided by raising issues or pull requests.