From 9352997c394c9d5dfe9012cea7482f6668217f1e Mon Sep 17 00:00:00 2001 From: Preetam Pinnada <32333548+preetam25@users.noreply.github.com> Date: Sat, 24 Apr 2021 18:36:01 +0530 Subject: [PATCH] Update security_analysis.html adding links to tools used in dynamic analysis section --- security_analysis.html | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/security_analysis.html b/security_analysis.html index ae39aa2..139853e 100755 --- a/security_analysis.html +++ b/security_analysis.html @@ -217,7 +217,7 @@

Dynamic Analysis

Tools

- For the purpose of this tutorial, we use a platform called AppUse, which brings together many useful tools and custom scripts for mobile application security testing under one GUI. AppUse eliminates the need of painstakingly installing numerous security tools by packaging them into a virtual machine, and thus it will require a VM player to run. Following are the links to download AppUse and VMware Player - + For the purpose of this tutorial, we use a platform called AppUse (developed by AppSec Labs), which brings together many useful tools and custom scripts for mobile application security testing under one GUI. AppUse eliminates the need of painstakingly installing numerous security tools by packaging them into a virtual machine, and thus it will require a VM player to run. Following are the links to download AppUse and VMware Player -
  1. AppUse @@ -263,7 +263,7 @@

    Memory Dump Analysis


  2. - Android emulator - For the purpose of this example we used a custom built vulnerable app called HackMePal + Android emulator - For the purpose of this tutorial we used a custom built vulnerable app called HackMePal by AppSec Labs
    Dynamic Analysis
    @@ -323,20 +323,20 @@

    Debugging

    1. - Decode apk in debug mode - apktool d -d app.apk out + Decode apk in debug mode
      +
      apktool d -d app.apk out
    2. - Make it debuggable in the AndroidManifest.xml tag - + Make it debuggable in the AndroidManifest.xml application tag
      +
      <application .. android:debuggable="true"/> 
    3. - Build new apk in debug mode - apktool b -d out + Build new apk in debug mode
      +
      apktool b -d out
    4. Sign, install, and run new apk - signapk input.apk +
      signapk input.apk 
    5. Create Netbeans project with the smali code