AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications. No splendid GUI interface, but the most efficient (less than 2 minutes per scan in average) and more accurate.
Version: 1.0.0
Features:
- Find security vulnerabilities in an Android app
- Check if the code is missing best practices
- Check dangerous shell commands (e.g. “su”)
- Collect Information from millions of apps
- Check the app’s security protection (marked as
<Hacker>
, designed for app repackaging hacking)
Author
- Yu-Cheng Lin (androbugs.framework at gmail.com, @AndroBugs)
Steup Steps and Usage for Windows
Easy to use for Android developers or hackers on Microsoft Windows: (a) No need to install Python 2.7 (b) No need to install any 3rd-party library (c) No need to install AndroBugs Framework
- mkdir C:\AndroBugs_Framework
- cd C:\AndroBugs_Framework
- Unzip the latest Windows version of AndroBugs Framework from Windows releases
- Go to Computer->System Properties->Advanced->Environment Variables. Add "C:\AndroBugs_Framework" to the "Path" variable
androbugs.exe -h
androbugs.exe -f [APK file]
Massive Analysis Tool Steup Steps and Usage for Windows
- Complete the Steup Steps and Usage for Windows first
- Install the Windows version of MongoDB (https://www.mongodb.org/downloads)
- Install PyMongo library
- Config your own MongoDB settings: C:\AndroBugs_Framework\androbugs-db.cfg
- Choose your preferred MongoDB management tool (http://mongodb-tools.com/)
AndroBugs_MassiveAnalysis.exe -h
- Example:
AndroBugs_MassiveAnalysis.exe -b 20151112 -t BlackHat -d .\All_Your_Apps\ -o .\Massive_Analysis_Reports
- Example:
AndroBugs_ReportByVectorKey.exe -h
- Example:
AndroBugs_ReportByVectorKey.exe -v WEBVIEW_RCE -l Critical -b 20151112 -t BlackHat
- Example:
Usage for Unix/Linux
To run the AndroBugs Framework:
python androbugs.py -f [APK file]
To check the usage:
python androbugs.py -h
Usage of Massive Analysis Tools for Unix/Linux
Prerequisite: Setup MongoDB and config your own MongoDB settings in "androbugs-db.cfg"
To run the massive analysis for AndroBugs Framework:
python AndroBugs_MassiveAnalysis.py -b [Your_Analysis_Number] -t [Your_Analysis_Tag] -d [APKs input directory] -o [Report output directory]
Example:
python AndroBugs_MassiveAnalysis.py -b 20151112 -t BlackHat -d ~/All_Your_Apps/ -o ~/Massive_Analysis_Reports
To get the summary report and all the vectors of massive analysis:
python AndroBugs_ReportSummary.py -m massive -b [Your_Analysis_Number] -t [Your_Analysis_Tag]
Example:
python AndroBugs_ReportSummary.py -m massive -b 20151112 -t BlackHat
To list the potentially vulnerable apps by Vector ID and Severity Level (Log Level):
python AndroBugs_ReportByVectorKey.py -v [Vector ID] -l [Log Level] -b [Your_Analysis_Number] -t [Your_Analysis_Tag]
python AndroBugs_ReportByVectorKey.py -v [Vector ID] -l [Log Level] -b [Your_Analysis_Number] -t [Your_Analysis_Tag] -a
Example:
python AndroBugs_ReportByVectorKey.py -v WEBVIEW_RCE -l Critical -b 20151112 -t BlackHat
python AndroBugs_ReportByVectorKey.py -v WEBVIEW_RCE -l Critical -b 20151112 -t BlackHat -a
Requirements
- Python 2.7.x (DO NOT USE Python 3.X)
- PyMongo library (If you want to use the massive analysis tool)
Download tool : https://goo.gl/9Dc3Ea
No comments:
Post a Comment