x32x01
ADMINISTRATOR
- by x32x01 ||
Androwarn - An open source APK static code analyzer
Androwarn is one of the most popular static code analyzer for malicious android applications whose main aim is to detect and warn the user about potential malicious behaviours.Features of Androwarn
Structural and data flow analysis of the bytecode targeting different malicious behaviors categories:
- Telephony identifiers exfiltration: IMEI, IMSI, MCC, MNC, LAC, CID, operator’s name…
- Device settings exfiltration: software version, usage statistics, system settings, logs…
- Geolocation information leakage: GPS/WiFi geolocation…
- Connection interfaces information exfiltration: WiFi credentials, Bluetooth MAC adress…
- Telephony services abuse: premium SMS sending, phone call composition…
- Audio/video flow interception: call recording, video capture…
- Remote connection establishment: socket open call, Bluetooth pairing, APN settings edit…
- PIM data leakage: contacts, calendar, SMS, mails…
- External memory operations: file access on SD card…
- PIM data modification: add/delete contacts, calendar events…
- Arbitrary code execution: native code using JNI, UNIX command, privilege escalation…
- Denial of Service: event notification deactivation, file deletion, process killing, virtual keyboard disable, terminal shutdown/reboot…
- Essential Mode (-v 1)
- Advanced Mode (-v 2)
- Expert Mode (-v 3)
Installation of Androwarn in Kali Linux
To install Androwarn with Github, type Code in your terminal.
Code:
git clone https://github.com/maaaaz/androwarn.git
Install python, jinja2, git and mercurial development packages on your host:
First step is to extract the chilkat package with the help of tar command: “tar xvf chilkat-9.5.0-python-2.7-x86_64-linux.tar.gz“.