Free app Vulnerability Security Detection tool: http://safe.ijiami.cn/
Vulnerability analysis is Love encryption launched free APP Vulnerability analysis platform, services include a key to the APK signature data information collection, internal configuration information collection, market channel related information collection, static analysis of vulnerability information display, dynamic analysis of vulnerability information display and other functions.
Love Encryption Vulnerability Analysis integrates the most commonly used hack methods and ideas, and simulates the attack behavior of hackers. Developers only need to upload their own applications, you can automatically analyze what can be exploited in the application of the vulnerability, clear and intuitive, and the first to support the entire network to download a full detailed analysis of the report, convenient technology and corporate management to understand the view, targeted security protection, to avoid the loss of cracking.
Free app Vulnerability Security Detection tool: http://safe.ijiami.cn/
Advantage:
Free app Bug detection
Automated security detection to quickly detect app vulnerabilities
Simulation of human app security detection technology, accurate results
Upload apk with one click without binding any data
One click to generate inspection reports, improve efficiency, content details
Detailed analysis of test items, clear and clear data
Four features of vulnerability analysis
File check
Check that the DEX, res file has security issues such as source code, resource file theft, and replacement.
Vulnerability scanning
The risk of scanning signatures, the presence of XML files for security vulnerabilities, the presence of injected, embedded code, and so on.
Backdoor detection
Detects the risk of an app being packaged two times and then implanted into a backdoor or third-party code.
One-click Generation
A key to generate the app about the source code, files, permissions, keywords and other aspects of the Security risk Analysis report.
Love Encryption App Testing process
First step: Click the "Detect Now" button
Step Two: Select the app you want to upload, upload the app
Step three: Upload complete, start detection.
Fourth step: View the report. Click on the "Generate Report" button to generate a detailed PDF file, you can learn about your app vulnerabilities and easily hacked code sections
Common app Vulnerabilities and risks
Static hack
Tools Apktool, Dex2jar, Jd-gui, DDMS, signature tools, can be used for any unencrypted application static hack, steal the source code.
Two-time packaging
Through static hack to get the source code, embedded malicious virus, advertising and other behaviors to use the tool packaging, signature, forming two times packaging applications.
Locally stored data theft
By obtaining root permission, the data stored in the mobile phone is stolen, edited, dumped and other malicious behavior, directly threaten the user's privacy.
Interface interception
Gain root access through the ADB shell command or third-party software, intercepting user-filled privacy information in the mobile interface and then acting maliciously.
Input Method attack
Through to the system input method attack, thus the user fills in the privacy information to intercept, dumps and so on malicious operation, steals the sensitive information.
Protocol fetching
By setting up an agent or using a third-party grab tool, the application sends and receives the packet to intercept, resend, edit, dump and other malicious operations.