Security of Information, Threat Intelligence, Hacking, Offensive Security, Pentest, Open Source, Hackers Tools, Leaks, Pr1v8, Premium Courses Free, etc

Thursday, January 14, 2016

Android Pentest Tools - DroidBox



Intro

DroidBox is developed to offer dynamic analysis of Android applications. The following information is described in the results, generated when analysis is complete:

Âş Hashes for the analyzed package
Âş Incoming/outgoing network data
Âş File read and write operations
Âş Started services and loaded classes through DexClassLoader
Âş Information leaks via the network, file and SMS
Âş Circumvented permissions
Âş Cryptographic operations performed using Android API
Âş Listing broadcast receivers
Âş Sent SMS and phone calls


Additionally, two graphs are generated visualizing the behavior of the package. One showing the temporal order of the operations and the other one being a treemap that can be used to check similarity between analyzed packages.








Setup

This is a guide to get DroidBox running. The release has only been tested on Linux and Mac OS. If you do not have the Android SDK, download it from http://developer.android.com/sdk/index.html. The following libraries are required: pylab and matplotlib to provide visualization of the analysis result.


Âş Export the path for the SDK tools


export PATH=$PATH:/path/to/android-sdk/tools/

export PATH=$PATH:/path/to/android-sdk/platform-tools/


Âş Download necessary files and uncompress it anywhere

wget https://github.com/pjlantz/droidbox/releases/download/v4.1.1/DroidBox411RC.tar.gz

Âş Setup a new AVD targeting Android 4.1.2 and choose Nexus 4 as device as well as ARM as CPU type by running:

Android

Âş Start the emulator with the new AVD:

./startemu.sh <AVD name>

Âş When emulator has booted up, start analyzing samples (please use the absolute path to the apk):

./droidbox.sh <file.apk> <duration in secs (optional)>





Share:

0 comentários:

Post a Comment

Note: Only a member of this blog may post a comment.

Established in 2015. Offensive Sec Blog has been sharing security research, hacking tools, threat intelligence, and offensive security content since 2015.
Copyright © OffSec Blog | Powered by OffensiveSec
Design by OffSec | Built for the security community