Difference between revisions of "OWASP APK DISSECTOR"

From OWASP
Jump to: navigation, search
(Created page with "=Main= <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">link=</div> {| style="padding: 0;margin:0;margin-top:10px;t...")
 
Line 7: Line 7:
  
  
==OWASP Droid 10==
+
== OWASP Apk Dissector  ==
  
# OWASP Droid10
+
# OWASP Apk Dissector 
 +
[![Download APK Dissector](https://a.fsdn.com/con/app/sf-download-button)](https://sourceforge.net/projects/apkdissector/files/latest/download)
  
OWASP Droid10 is an opensource handheld based (android) web pen testing tool. It can scan for web application vulnerability from any android device.Some features can be customized according to testers need. Droid10 is a handheld system based (android) web pen testing tool. It can scan for web application bugs from any android device. The world is moving towards handheld systems . There isn't any mobile based tool from owasp to do web app pen testing from handheld systems . This app is going to be OWASP first ever mobile app to test web app security. Apart from this this tool will be developed in such a way that it can be customized in an easy way .User supplied vectors can be added easily . It will have encoders,decoders and they can be integrated with different modules easily example (Url encoding with XSS Module). In short this project will have the combined features of modern day scanners as an a mobile app .
+
## Java Based APK Decompiler
  
Some cool features list:
+
Basic useful feature list:
  
  * Automated Scan - Automated Scan to find vulnearabilities
+
  * Purely Java Based
  * Live Scan - Live View of results against attack vectors
+
* Analyze the contents of the APK file
  * Repeater - Request / Response Tester
+
  * Decompile and extract the contents of the APK file
 
+
  * Decompile the DEX files to JAVA source files (.dex to .java) [ New feature in v2.0 ]
 +
 +
## How to use this application ?
 +
1.From source
 +
2.Executable Jar
  
 +
1.You can clone/download the source and import in Eclipse and then run the ApkDissector.java file
  
You too can extend the project
 
  
* Easy to add new modules
+
2. Download and extract the zip file containing the executable Jar file from https://sourceforge.net/projects/apkdissector/
* Easy to add new vectors
 
* Easy to maintain
 
  
And this is still in development phase!
+
Double click and open the jar file
  
 +
* Select APK/DEX - Browse Selects the APK/DEX file.
 +
* Analyze - Find information about the contents inside the apk file.
 +
* Decompile APK/DEX - Decompile and extracts the contents on the APK file.
 +
 +
## How to decompile an APK file ?
  
 +
Once you click decompile it will create a folder called extract and inside that you will find a folder having same name as the file where you will get all the extracted contents of the apk
  
This is on [OWASP](https://www.owasp.org/index.php/OWASP_Droid10_Project) website. This project will soon be available in Google's Play Store.
+
* Select APK/DEX - Click this button to browse and select the APK file.
 +
* Decompile APK/DEX - Click this button to  decompile and extracts the contents on the APK file.
 +
* All the extracted files will be with in extracts directory within the folder name <apkfileName>.apk
  
 +
## How to decompile the DEX file ?
 +
* Select APK/DEX - Click this button to browse and select the DEX file which will be located inside the extracts/<apkfileName>.apk directory
 +
* Decompile APK/DEX - Click this button to  decompile and extracts the contents on the DEX file.
 +
* All the extracted files will be under extracts within <apkFilename.apk>\DEX_extracts
  
If you would like to be a contributor to this project please [contact me](http://dibsy.github.io/).
+
 +
  
Download and import this project in Android Studio to test all its features
+
## How to use this project ?
  
[[File:Newdroid10.PNG]][[File:droid103.png]]
+
If your are trying to fork or extented the project here are some information regarding this project.
  
 +
Run the AppDissector to see the output !
 +
 +
And here's some code! :+1:
 +
 +
```java
 +
System.out.println("More features will be added soon");
 +
```
 
==Description==
 
==Description==
 
The file will be available in form of apk file which runs on android device . This file can be downloaded from the github / owasp site / Google's app store .
 
The file will be available in form of apk file which runs on android device . This file can be downloaded from the github / owasp site / Google's app store .

Revision as of 20:41, 4 April 2017

OWASP Project Header.jpg


OWASP Apk Dissector

  1. OWASP Apk Dissector

[![Download APK Dissector](https://a.fsdn.com/con/app/sf-download-button)](https://sourceforge.net/projects/apkdissector/files/latest/download)

    1. Java Based APK Decompiler

Basic useful feature list:

* Purely Java Based
* Analyze the contents of the APK file
* Decompile and extract the contents of the APK file
* Decompile the DEX files to JAVA source files (.dex to .java) [ New feature in v2.0 ]

    1. How to use this application ?

1.From source 2.Executable Jar

1.You can clone/download the source and import in Eclipse and then run the ApkDissector.java file


2. Download and extract the zip file containing the executable Jar file from https://sourceforge.net/projects/apkdissector/

Double click and open the jar file

* Select APK/DEX - Browse Selects the APK/DEX file.
* Analyze - Find information about the contents inside the apk file.
* Decompile APK/DEX - Decompile and extracts the contents on the APK file.

    1. How to decompile an APK file ?

Once you click decompile it will create a folder called extract and inside that you will find a folder having same name as the file where you will get all the extracted contents of the apk

* Select APK/DEX - Click this button to browse and select the APK file.
* Decompile APK/DEX - Click this button to  decompile and extracts the contents on the APK file.
* All the extracted files will be with in extracts directory within the folder name <apkfileName>.apk
    1. How to decompile the DEX file ?
* Select APK/DEX - Click this button to browse and select the DEX file which will be located inside the extracts/<apkfileName>.apk directory
* Decompile APK/DEX - Click this button to  decompile and extracts the contents on the DEX file.
* All the extracted files will be under extracts within <apkFilename.apk>\DEX_extracts



    1. How to use this project ?

If your are trying to fork or extented the project here are some information regarding this project.

Run the AppDissector to see the output !

And here's some code! :+1:

```java System.out.println("More features will be added soon"); ```

Description

The file will be available in form of apk file which runs on android device . This file can be downloaded from the github / owasp site / Google's app store .

Licensing

This program is free software: you can redistribute it and/or modify it under the terms of the link GNU Affero General Public License 3.0 as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

Project Resources

Github[1]

Project Leader

Dibyendu Sikdar

Related Projects

OWASP_JSEC_CVE_Details

Classifications

Project Type Files TOOL.jpg
Incubator Project Owasp-breakers-small.png
Owasp-defenders-small.png
Affero General Public License 3.0
Sillycon.png

News

How can I participate in your project?

All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.

If I am not a programmer can I participate in your project?

Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. See the Road Map and Getting Involved tab for more details.

Contributors

The first contributors to the project were:


Roadmap

Currently all owasp tools are running on pc . The world is moving towards handheld systems . There isn't any mobile based tool from owasp to do web app pen testing from handheld systems . This app is going to be OWASP first ever mobile app to test web app security. Apart from this this tool will be developed in such a way that it can be customized in an easy way .User supplied vectors can be added easily . It will have encoders,decoders and they can be integrated with different modules easily example (Url encoding with XSS Module). In short this app will have the combined features of modern day scanners with an added mobility & easy customization feature . The application will be opensource . So others can fork and extend and contribute easily .

Getting Involved

Some of the ways you can help are as follows:

Coding

Localization

Testing

Feedback

The scanner has various module . Each module is independent of other . The project will be extended by adding more modules to it.