Android and iOS app security Analytics tools Smart Phones Dumb Apps Introduction

Source: Internet
Author: User
Tags unpack file permissions

This is a set of scripts that can help analysts analyze the security of the app and develop it in the Perl language. Because it's just a few scripts, it may not be as smart to use, no GUI interface, no "elegant" analysis results. So basically, it's a script like "aapt-enhanced". With the added ability to analyze Android and analyze iphone apps, there are some useful words.

Project address [Googlecode] https://code.google.com/p/smartphonesdumbapps/
If you can't open it, turn the wall, alas.

Main function

Android

Unpack apk;
Decoding manifest.xml (with Axml2lxml);
Get the permissions the app needs;
Get a screenshot of the app (according to the Android manifest);
Counter-compile Dex to check file permissions by parsing Dex;
Find URLs, host names, and some network paths.

Iphone App

Unpack the iphone IPA file or crack the xyz.app/folder;
Turn the. plist into XML for browsing;
Find some URLs for the app definition by looking at the. plist xmls;
Find URLs, host names, and some network paths.

Related content

Smart Phones Dumb Apps The original purpose of this script set is "The accidental loss of smart phones, the" ulterior motives "of the people through your app can get information" this assumption (presumably has a similar painful experience), so the content is in the analysis Androidmanifest.xml , the other XML files in the Res/folder, the Classes.dex binary file of this Dex, what information can be seen through these files, or what implied point of attack.

In decoding the XML file, the use of axml2xml, in the solution to Dex, with the dedexer, are more commonly used tools. After that, it is converted to readable Java code through Dex2jar.

In the above steps, the attacker can even see the data flow of many programs, the mode of invocation, the transfer of Third-party services and other sensitive information, through some analysis, can get the weak point of the program and attack.

Of course, this only provides the part of the previous analysis, the attack of the matter must be handed to Metasploit and so on ...

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.