№3. ScannerBox. Analysis of mobile application packages

9 April 2023 3 minutes Author: Endpool

Analysis of mobile application packages for Android

But first, let’s learn a little more about this operating system. Android was founded in Palo Alto, California. The company’s early intentions were to develop an advanced operating system for digital cameras, but it was realized that the device market was not large enough, and they focused their efforts on developing an operating system for smartphones to compete with Symbian and Windows Mobile. Despite the past achievements of its founders and early employees, Android operated in secret, announcing that it was working on software for mobile phones. Android is an operating system for smartphones, tablets, e-books, digital players, wristwatches, fitness bracelets, game consoles, laptops, netbooks, smartbooks, Google Glass, televisions, projectors and other devices. Although Android is based on the Linux kernel, it stands somewhat apart from the Linux community and Linux infrastructure. The basic element of this operating system is the Dalvik implementation of the Java virtual machine.

In the Android operating system, there are packages of mobile programs, what exactly they are, what functions they perform and what they are needed for, you will learn in this article. One such is Adhrit, an open-source set of Android APKs for reverse engineering and analysis. The tool is an attempt to find an effective solution for all mobile security testing and automation needs. One such Adhrit was created with an emphasis on flexibility and complexity. Adhrit currently uses Ghera tests to detect patterns of vulnerabilities in Android applications. The project is subject to constant updates and will include the latest methodologies and tools available. Adhrit has presented at conferences such as OWASP Seasides, ThreatCon, and Cysinfo. Feature requests and bug reports are always welcome.

Features of Adhrit

Manifest analysis

Package name, debug and backup status

Exported components (activities, services, suppliers and recipients)

Deep links

Implicit Intent Filters and Critical Permissions

Usage analysis

SQLite DBs

SharedPreferences

Vulnerability analysis

Internet problems

Storage problems

Chain

Crypto problems

Screenshots

But this is not the only program, below we will give examples of similar but different programs in terms of functionality.

APKLeaks

Scan an APK file for URIs, endpoints, and secrets.


CLICK HERE

AppInfoScanner

It is a website crawler for mobile devices.


CLICK HERE

Androwarn

Warning the user about potential malicious behavior.


CLICK HERE

Quark Script

Provides mobile security researchers with an innovative way to analyze or pentest targets.


CLICK HERE

Droidefense

This is the code name of the program analysis tools, the Android recovery tool.


CLICK HERE

Tai-e

It is a new static analysis framework for Java that incorporates the designs of classic frameworks.


CLICK HERE

Other related articles
Found an error?
If you find an error, take a screenshot and send it to the bot.