-
Notifications
You must be signed in to change notification settings - Fork 28
/
Copy pathMarvinStaticAnalyzer.py
131 lines (95 loc) · 4.73 KB
/
MarvinStaticAnalyzer.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
# Copyright (c) 2015, Fundacion Dr. Manuel Sadosky
# All rights reserved.
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are met:
# 1. Redistributions of source code must retain the above copyright notice, this
# list of conditions and the following disclaimer.
# 2. Redistributions in binary form must reproduce the above copyright notice,
# this list of conditions and the following disclaimer in the documentation
# and/or other materials provided with the distribution.
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
# DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
# SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
# OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
from module_import import *
from Utils import *
from SSLAnalyzer import *
# from JavascriptInterfaceAnalyzer import *
from ManifestAnalyzer import *
from SAAFAnalyzer import *
from RedisClientAnalyzer import *
from PhoneGapAnalyzer import *
from BOLTSFrameworkAnalyzer import *
from ComponentsAnalyzer import *
from WebViewFileSchemeAnalyzer import *
from VungleAdsAnalyzer import *
from DynamicReceiverAnalyzer import *
from ComponentHijackingAnalyzer import *
from ContentProviderPathTraversalAnalyzer import *
from FragmentInjectionAnalyzer import *
from SurreptitiousSharingAnalyzer import *
def analyze_vulnerabilities_from(apk_file):
_apk = apk.APK(apk_file)
vm = dvm.DalvikVMFormat(_apk.get_dex())
dx = analysis.VMAnalysis(vm)
return analyze_vulnerabilities(apk_file,_apk,vm,dx)
def analyze_vulnerabilities(apk_file,_apk,vm,dx):
# SSL Malodroid requires this objects vmx
vmx = uVMAnalysis(vm)
gx = GVMAnalysis(vmx, None)
cm = vm.get_class_manager()
vm.set_vmanalysis(dx)
vm.set_gvmanalysis(gx)
vm.create_xref()
vm.create_dref()
final_report = {}
final_report.update(ManifestAnalyzer(_apk).analyze_manifest())
final_report.update(ComponentsAnalyzer(_apk).find_exported_components())
final_report.update(ContentProviderPathTraversal(_apk,vm, dx,cm).check_providers_for_file_traversal(final_report))
final_report.update(FragmentInjectionAnalyzer(_apk,vm,dx,cm).check_for_fragment_injection(final_report))
final_report.update(ComponentHijackingAnalyzer(vm, dx, cm).check_for_intent_hijacking() )
final_report.update(DynamicReceiverAnalyzer(vm, dx, cm).check_registered_dynamic_receivers())
final_report.update(WebViewFileSchemeAnalyzer(_apk, vm, dx, cm).check_webviews_allowing_file_schemes())
final_report.update(SurreptitiousSharingAnalyzer(_apk, vm, dx, cm).check_data_sending_allowing_file_schemes())
final_report.update(RedisClientAnalyzer(vm, dx, cm).check_redis_client())
final_report.update(BOLTSFrameworkAnalyzer(_apk, vm, dx, cm).check_for_bolts_framework())
final_report.update(VungleAdsAnalyzer(_apk, vm, dx, cm).check_for_vungle())
# moved to SAAF analyzer
# final_report.update( JavascriptInterfaceAnalyzer(vm,dx,cm).check_javascript_interface() )
final_report.update(PhoneGapAnalyzer(_apk, vm, vmx, dx).check_phonegap())
final_report.update(SSLAnalyzer(vm, vmx, gx).check_ssl_errors())
final_report.update(SAAFModuleAnalyzer(apk_file).get_clean_report())
return final_report
def worker():
while True:
filename = q.get(True)
name, extension = os.path.splitext(os.path.basename(filename))
try:
print analyze_vulnerabilities_from(filename)
except:
print "There was an error with the analysis"
traceback.print_exc()
q.task_done()
if __name__ == '__main__':
if len(sys.argv) < 1:
print "No apks file folder specified"
exit(0)
num_worker_threads = 1
q = Queue()
for i in range(num_worker_threads):
t = Thread(target=worker)
t.daemon = True
t.start()
# DIRECTORY ENDS WITH /
print "===================================APKS==================================="
for filename in glob.glob(sys.argv[1] + '*.apk'):
print filename
q.put(filename)
print "===================================APKS==================================="
q.join() # block until all tasks are done