This is a set of scripts that can help analysts analyze the security of the app and develop it in the Perl language. Because it's just a few scripts, it may not be as smart to use, no GUI interface, no "elegant" analysis results. So basically, it's a script like "aapt-enhanced". With the added ability to analyze Android and analyze iphone apps, there are some useful words.
Project address [Googlecode] https://code.google.com/p/smartphonesdumbapps/
If you can't open it, turn the wall, alas.
Main function
Android
Unpack apk;
Decoding manifest.xml (with Axml2lxml);
Get the permissions the app needs;
Get a screenshot of the app (according to the Android manifest);
Counter-compile Dex to check file permissions by parsing Dex;
Find URLs, host names, and some network paths.
Iphone App
Unpack the iphone IPA file or crack the xyz.app/folder;
Turn the. plist into XML for browsing;
Find some URLs for the app definition by looking at the. plist xmls;
Find URLs, host names, and some network paths.
Related content
Smart Phones Dumb Apps The original purpose of this script set is "The accidental loss of smart phones, the" ulterior motives "of the people through your app can get information" this assumption (presumably has a similar painful experience), so the content is in the analysis Androidmanifest.xml , the other XML files in the Res/folder, the Classes.dex binary file of this Dex, what information can be seen through these files, or what implied point of attack.
In decoding the XML file, the use of axml2xml, in the solution to Dex, with the dedexer, are more commonly used tools. After that, it is converted to readable Java code through Dex2jar.
In the above steps, the attacker can even see the data flow of many programs, the mode of invocation, the transfer of Third-party services and other sensitive information, through some analysis, can get the weak point of the program and attack.
Of course, this only provides the part of the previous analysis, the attack of the matter must be handed to Metasploit and so on ...