Mobile Security Testing Technology

Source: Internet
Author: User
Tags virus scan

Transfer from testerhomehttps://testerhome.com/topics/1698
Prologue: Android security Test, as the PC security test is divided into the client The server side of the security test is actually a lot of the same as the PC side, here is not much elaboration. For application security, it can be divided into 2 categories, inspection and scanning from a large aspect. Check contains more, such as: File permissions apk run permissions apk permission log message scan contains less, such as port scan virus Scan Trojan Scan AD Avira said here need to add 2 points, in addition to those, we have to learn to use Drozer this tool, More conducive to killing some of the hidden loopholes and other security shortcomings in addition to tools, but also to be good at online search for relevant security knowledge to see here, you should have some understanding of the mobile security test, follow-up will be introduced in the details of a previous write the performance aspects of the collection/HTTP testerhome.com/topics/506
================================================================
The last part of the general introduction of the next security test some basic test items, and now we have the details of the one by one elaboration first of all, we say that the inspection of this large item, you may see that there are only a few checks, but there are a lot of things to check the file permissions generally we need to check the apk generated files, here we need to check 2 Mode installed apk adb installadb push use for a period of time, need to traverse all functions, so that all the files need to be checked, the general check file path is as follows 2/dada/dada/packagename/sdcard/android/ Data/packagename of course some apk will also be in the sdcard above the other path to generate files, this also needs to be detected, here we do the following detection of the file: permission detection-the permission to detect the file ownership relationship, through the ls-l to traverse, See which files contain content detection to allow third-party read and write permission--open all files, see if the content is related to personal data and privacy data, whether encrypted processing apk run permissions Here we need to install the APK, there are 2 installation methods, as described above, after running the APK, through the PS to view the APK What the running user is APK permission here you can use the anti-compilation method to see what permissions the APK has requested here to see the logs that were printed during the APK run, check the reading of the newspaper through the Logcat command here to see all the messages generated by the APK during operation, via Tcpdump , Fiddle2, Wireshake and other tools are very well, today first said here, next to continue to say other
============================================================
Last said the check, this round to say that the scan, you hear the scan, you may immediately think of the tool, yes, most of the scanning is through the tool, but the tool itself will also exist false alarms, but also need manual Check port scanning generally use nmap and netstat to carry out. Nmap used to scan the server, netstat used to scan the client itself virus, Trojan scan generally use the mobile version provided by the four major international anti-virus manufacturers to scan, respectively scanning apk installation files and APK installed after the use of a period of time to produce the file ads Avira This is generally the platform will do the detection, Generally also use various types of Avira advertising apk to scan, the current known principle is can through the ADB shell Dumpsys notification to Avira, as for the application of the internal advertising killing principle is unknown, only rely on software assistance, if the other party does not recognize, can sacrifice the big kill device, Anti-compilation find source to here, scanning also said, the following simple Drozer This tool Drozer is a very powerful tool, suitable for digging into the application of the underlying security threats, can kill loopholes and Trojans, as well as the code (with the code, a lot of things are good to do ~ ~), Drozer set up a good environment, through the command line of the way to run, command aspects of the instructions you can move to the official Doc document finally there is a big kill device--fuzz test, may be in the PC side is not unfamiliar, but the mobile side of the fuzz test is not the traditional meaning of fuzz, Instead, by frequently calling the empty intent to iterate through the various activity that calls the APK to verify that there is a crash, a panic, or even a security risk, the security side is over.

From for notes (Wiz)

Mobile Security Testing Technology

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.