x32x01
  • by x32x01 ||
Androwarn - An open source APK static code analyzer
Androwarn - An open source APK static code analyzer
You Can, Log in or Register To View URLs Content !
is one of the most popular static code analyzer for malicious android applications whose main aim is to detect and warn the user about potential malicious behaviours.

Features of Androwarn
Structural and data flow analysis of the bytecode targeting different malicious behaviors categories:
  1. Telephony identifiers exfiltration: IMEI, IMSI, MCC, MNC, LAC, CID, operator’s name…
  2. Device settings exfiltration: software version, usage statistics, system settings, logs…
  3. Geolocation information leakage: GPS/WiFi geolocation…
  4. Connection interfaces information exfiltration: WiFi credentials, Bluetooth MAC adress…
  5. Telephony services abuse: premium SMS sending, phone call composition…
  6. Audio/video flow interception: call recording, video capture…
  7. Remote connection establishment: socket open call, Bluetooth pairing, APN settings edit…
  8. PIM data leakage: contacts, calendar, SMS, mails…
  9. External memory operations: file access on SD card…
  10. PIM data modification: add/delete contacts, calendar events…
  11. Arbitrary code execution: native code using JNI, UNIX command, privilege escalation…
  12. Denial of Service: event notification deactivation, file deletion, process killing, virtual keyboard disable, terminal shutdown/reboot…
Androwarn works on mainly 3 modes i.e.
  • Essential Mode (-v 1)
  • Advanced Mode (-v 2)
  • Expert Mode (-v 3)
You can easily save your report in either plaintext or formatted HTML format.

Installation of Androwarn in Kali Linux
To install Androwarn with Github, type Code in your terminal.
Code:
You Can, Log in or Register To View Codes Content !
androwarn1.png
Androwarn tool has some dependencies and to install these dependencies, follow below steps:

Install python, jinja2, git and mercurial development packages on your host:
androwarn2.png
Next download the latest Chilkat module on
You Can, Log in or Register To View URLs Content !
, according to your architecture (32 or 64 bits) and your python version (2.5, 2.6, 2.7, 3.0, 3.1, 3.2)
androwarn3.png
To install chilkat in your Kali Linux machine, follow below steps:

First step is to extract the chilkat package with the help of tar command: “tar xvf chilkat-9.5.0-python-2.7-x86_64-linux.tar.gz“.
androwarn4.png
To install chilkat package, type “python installchilkat.py” in same terminal.
androwarn5.png
To run Androwarn, type “python androwarn.py -i <yourapplication.apk> -r html -v 3
androwarn6.png
Here you can, we used -v 3, means expert mode, -i stands for input your apk file and -r stands for your report format which is HTML in this case and all the reports will be saved in “Report” folder.
androwarn7.png
To save your report in text format, type “python androwarn.py -i <yourapplication.apk> -r txt -v 3“.
androwarn8.png
Here is the sample for text format.
androwarn9.png
To view more about Androwarn tool, type “python androwarn.py -h“.
androwarn10.png
 

Similar Threads

x32x01
Replies
0
Views
48
x32x01
x32x01
x32x01
Replies
0
Views
172
x32x01
x32x01
x32x01
Replies
0
Views
471
x32x01
x32x01
x32x01
Replies
0
Views
119
x32x01
x32x01
x32x01
  • x32x01
Replies
0
Views
99
x32x01
x32x01
TAGs: Tags
open source open source apk static code

Register & Login Faster

Forgot your password?

Latest Resources

Forum Statistics

Threads
507
Messages
508
Members
42
Latest Member
Mustafa123
Back
Top