This WhiteHat School(WHS) Project is an open-source, analysis tool to support for App Vulnerability Manual Analysis Hackers and App Developers.
The ASAP tool basically provides possible locations for vulnerabilities in code obtained using the jadx decompiler.
ASAP only supports static analysis.
Scope of Vulnerabilities in ASAP:
- SQL_Injection
Detects query statements, detects the uri address of Content Provider with exported = true, and returns it to the result value
- WebView
Detect if you use an external intent as an activity target with [exported="true"] exported from androidmanifest.xml and load the intent with loadURL => webview vulnerability detection Check presence of function that allows file access with javascripted function in same activity => xss vulnerability detection
- DeepLink
Print [scheme://host/path] from Androidmanifest.xml, detection of parameters through getQueryParameter function in smali code, adjustable host/path through addURI function, url matching scheme through 'Uri; ->parse, JavascriptInterface Detection of JavascriptInterface Available in WebView via JavascriptInterface Annotation, addJavascriptInterface Detection =>Redirect Vulnerability
- HardCoded
API Key or Credentials inside the apk
- Permission
Extract Permission from Android Manifest in xml Code
- Insecure_DataStorage (Crypto)
Extract encryption logic within Shared Preference
- Insecure_Logging (LogE)
Log detection that outputs sensitive information in Java code
git clone https://github.com/WHS-ASAP/ASAP.git
cd ASAP
pip install -r requirements.txt
Download the jadx-dev-all.jar file from here: https://drive.google.com/file/d/1u2BQv8YsoNmeNCLvpt2V9HRhnzU-51Q8/view?usp=sharing
3. If you want to set target applications, go to ASAP/src/docs/target.txt and write app package name
First, run ApkProcessor.py -> you can find ASAP/src/java_src and ASAP/src/smali_src
ASAP_Guide.mp4
(BWASP)
- PM: Yeeun Lee (@Yenniiii)
Develop WebView module
- Jeongahn Jang (@jeongahn)
Full-Stack(develop web), Development Manager(contribute all of modules)
- Seoah Myeoung (@SeoA0703)
Develop Permission, Log module
- Woohyun Son (@emerards)
Develop SQL_Injection
- Yebean Kim (@kimyebean)
Develop Crypto module
- Yunseong Lee (@hansowon)
Develop DeepLink module
- Yuwon Seol (@AR3CIA)
Develop HardCoded module
- PM : Jeongahn Jang (@jeongahn)
Develop SQL_Injection, Log module
- Yeeun Lee (@Yenniiii)
Develop WebView, DeepLink module
- Seoah Myeoung (@SeoA0703)
Develop Permission module
- Yuwon Seol (@AR3CIA)
Develop HardCoded module
This work was supported by Korea Information Technology Research Institute (KITRI) 2nd WhiteHat School (WHS) Program.
[Project Name: APP in Security (ASAP) Project]