/AIS3-2020-IAAST

Android IAST

Primary LanguagePythonMIT LicenseMIT

IAAST

IAAST (Interactive Android Application Security Testing) is an Android App testing suite that combines Static Analysis and Dynamic Analysis

IAAST parses MobSF static analysis' output and run the results on a real device. Insecure functions are hooked with Frida to detect insecure function calls

Requirements

  • MobSF
    • We recommand to use docker
  • Python 3
    • Install requirements with $ pip install -r requirements.txt
  • Frida

Usage

  1. Run frida server on your Android device
  2. Connect to your Android device with root privilege
$ sudo adb start-server
$ adb devices  # You may have to click Allow on the phone
$ adb root  # Run adbd with root privileges
$ frida-ps -U  # Check if frida is working
  1. $ cd production
  2. ./run.py -p [mobsf port] [mobsf ip] [apk file]
    • example: ./run.py -p 8000 127.0.0.1 ../diva-beta.apk

IAAST will upload your apk file to MOBSF to analyze and install the apk on your device if it is not installed, and then the test will start automatically. When the test is finished, a report will be generated as a HTML file

Customization

If you want to add custom security functions, you can modify the custom.js. Or if you want to add other hook function you can modify "vuln_functions", we will generate Hook functions automatically.

License

This program is released under MIT License