Android Security Evaluation Framework (ASEF) :
performs this analysis while alerting you about other possible issues. It will make you aware of unusual activities of your apps, will expose vulnerable components and help narrow down suspicious apps for further manual research. The framework will take a set of apps (either pre-installed on a device or as individual APK files) and migrate them to the test suite where it will run it through test cycles on a pre-configured Android Virtual Device (AVD).
ASEF is a Open Source Project to perform security analysis of Android Apps by various security measures
ASEF is an Open Source tool for scanning Android Devices for security evaluation. Users will gain access to security aspects of android apps by using this tool with its default settings. An advanced user can fine-tune this, expand upon this idea by easily integrating more test scenarios, or even find patterns out of the data it already collects. ASEF will provide automated application testing and facilitate a plug and play kind of environment to keep up with the dynamic field of Android Security.
YouTude Videos :
Demo : Running ASEF to test all installed android apps from an android device on an Android Virtual Device
Short Demo : Running ASEF to test all installed android apps from an android device on an another physical android device
Download Link : Android Security Evaluation Framework
Tools :
Running this on the Samsung Galaxy SIII yields the following:
Don’t get too excited, these SQL injection vulnerabilities don’t lead to any serious information disclosure, but you get the idea right? Don’t just look at content provider problems because these tools are available. Content providers are the tip of the iceberg! Ask us questions or bounce ideas. Create new modules with Mercury. Go forth and innovate!
performs this analysis while alerting you about other possible issues. It will make you aware of unusual activities of your apps, will expose vulnerable components and help narrow down suspicious apps for further manual research. The framework will take a set of apps (either pre-installed on a device or as individual APK files) and migrate them to the test suite where it will run it through test cycles on a pre-configured Android Virtual Device (AVD).
ASEF is a Open Source Project to perform security analysis of Android Apps by various security measures
ASEF is an Open Source tool for scanning Android Devices for security evaluation. Users will gain access to security aspects of android apps by using this tool with its default settings. An advanced user can fine-tune this, expand upon this idea by easily integrating more test scenarios, or even find patterns out of the data it already collects. ASEF will provide automated application testing and facilitate a plug and play kind of environment to keep up with the dynamic field of Android Security.
YouTude Videos :
Demo : Running ASEF to test all installed android apps from an android device on an Android Virtual Device
Short Demo : Running ASEF to test all installed android apps from an android device on an another physical android device
Download Link : Android Security Evaluation Framework
Tools :
Mercury v1.1 Tool -
bug hunters to find vulnerabilities & write proof-of-concept exploits in Android Application. Simple called as Android Apps Vulnerability Scanner.
Mercury is a framework for exploring the Android platform; to find vulnerabilities and share proof-of-concept exploits.
Mercury allows you to assume the role of a low-privileged Android app, and to interact with both other apps and the system.- Use dynamic analysis on Android applications and devices for quicker security assessments
- Share publicly known methods of exploitation on Android and proof-of-concept exploits for applications and devices
- Write custom tests and exploits, using the easy extensions interface
- Interact with the 4 IPC endpoints - activities, broadcast receivers, content providers and services
- Use a proper shell that allows you to play with the underlying Linux OS from the point of view of an unprivileged application (you will be amazed at how much you can still see)
- Find information on installed packages with optional search filters to allow for better control
- Built-in commands that can check application attack vectors on installed applications
- Transfer files between the Android device and your computer
- Create new modules to exploit your latest finding on Android, and playing with those that others have found
Sample results of running this module on a vulnerable version of the Samsung Galaxy SII is shown below:
Running this on the Samsung Galaxy SIII yields the following:
Security consultants Sample Testing :
The first set of vulnerabilities found by the MWR team was done manually by reviewing the
AndroidManifest.xml
of each package on the phone. With Mercury, a combination of the attacksurface
command and the the info
command in each section will get you the same results in a tenth of the time. If you are interested in looking for common problems on devices, the scanner
modules will be of interest to you. As an example, this is scanner.provider.sqlinjection
finding SQL injection flaws in default content providers on an Android 4.0.3 Emulator.Don’t get too excited, these SQL injection vulnerabilities don’t lead to any serious information disclosure, but you get the idea right? Don’t just look at content provider problems because these tools are available. Content providers are the tip of the iceberg! Ask us questions or bounce ideas. Create new modules with Mercury. Go forth and innovate!
EmoticonEmoticon