How to analyse Android Applications using APK inspector

Follow by Email
Facebook0
Facebook
Google+
https://codingsec.net/2016/09/analyse-android-applications-using-apk-inspector/

Generally we need to inspect our apps for security vulnerabilities before publishing to the Android App store but if you are new to the Android Security you may find it difficult to code Apps with High Security.

Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you.

Now APKinspector(Android Application Analysis) comes into play.

APKinspector is a powerful GUI tool for analysts to analyze the Android applications. The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code. APKInspector provides both analysis functions and graphic features for the users to gain deep insight into the malicious apps:
  • CFG
  • Call Graph
  • Static Instrumentation
  • Permission Analysis
  • Dalvik codes
  • Smali codes
  • Java codes
  • APK Information

Tutorial ::

  1. Download the latest version of APKInspector via GIT
  2. Run “./Install.sh
  3. Test if APKInspector can boot correctly, go to the directory of “APKInspector”, run “python StartQT.py”.

Download ::

Windows or Linux ::APKInspector Beta
Take your time to comment on this article.
Follow by Email
Facebook0
Facebook
Google+
https://codingsec.net/2016/09/analyse-android-applications-using-apk-inspector/

2 Comments

  1. Aavash Nekros 2016-09-02 Reply
  2. jongf 2016-10-13 Reply

Add a Comment

Your email address will not be published. Required fields are marked *

Like the article? please consider sharing it. Thank you

Advertisment ad adsense adlogger