____ __ ____ __
/ __ \__ ______ _____/ /________ _/ _/___ _________ ___ _____/ /_
/ / / / / / / __ `/ __ / ___/ __ `// // __ \/ ___/ __ \/ _ \/ ___/ __/
/ /_/ / /_/ / /_/ / /_/ / / / /_/ // // / / (__ ) /_/ / __/ /__/ /_
\___\_\__,_/\__,_/\__,_/_/ \__,_/___/_/ /_/____/ .___/\___/\___/\__/
/_/
The security of mobile devices has become a critical concern due to the increasing amount of sensitive data being stored on them. With the rise of Android OS as the most popular mobile platform, the need for effective tools to assess its security has also increased. In response to this need, a new Android framework has emerged that combines three powerful tools - AndroPass, APKUtil, RMS, and MobFS - to conduct comprehensive vulnerability analysis of Android applications. This framework is known as QuadraInspect.
QuadraInspect is an Android framework that integrates AndroPass, APKUtil, RMS and MobFS, providing a powerful tool for analyzing the security of Android applications. AndroPass is a tool that focuses on analyzing the security of Android applications' authentication and authorization mechanisms, while APKUtil is a tool that extracts valuable information from an APK file. Lastly, MobFS and RMS facilitates the analysis of an application's filesystem by mounting its storage in a virtual environment.
By combining these three tools, QuadraInspect provides a comprehensive approach to vulnerability analysis of Android applications. This framework can be used by developers, security researchers, and penetration testers to assess the security of their own or third-party applications. QuadraInspect provides a unified interface for all three tools, making it easier to use and reducing the time required to conduct comprehensive vulnerability analysis. Ultimately, this framework aims to increase the security of Android applications and protect users' sensitive data from potential threats.
sudo apt install wget build-essential libreadline-gplv2-dev libncursesw5-dev libssl-dev libsqlite3-dev tk-dev libgdbm-dev libc6-dev libbz2-dev libffi-dev zlib1g-dev
sudo su && wget https://www.python.org/ftp/python/3.10.8/Python-3.10.8.tgz && tar xzf Python-3.10.8.tgz && cd Python-3.10.8
./configure --enable-optimizations
make altinstall
To install the tools you need to:
First :
git clone https://github.com/morpheuslord/QuadraInspect
Second Open a Administrative cmd or powershell (for Mobfs setup) and run :
pip install -r requirements.txt && python main.py
or
sudo pip3.10 install -r requirements.txt && sudo python3.10 main.py
Third : Once QuadraInspect loads run this command
QuadraInspect Main>> : START install_tools
The tools will be downloaded to the tools
directory and also the setup.py and setup.bat commands will run automatically for the complete installation.
The addins are for the community to edit. Anyone who is intrested can add new tools by editing the config/additional.py
file and the tools and all the perticular configurations necessary for the smooth installation of the program.
update addins
or the update-addins
commands depending on the mode of usage.config
directory.main.py
also.
Hope many more tools will be added by you all as a support and building of the tool.As of now there is one additional tool called APKEditor mentioned in the addins. You can install that from the START addins
command and needs java RTE
to run
Each module has a help function so that the commands and the discriptions are detailed and can be altered for operation.
sudo
userAdmin
rest all can be done as a normal user These are the key points that must be addressed for smooth working:
args
or using SET target
withing the tool.target
folder as all the tool searches for the target file with that folder.There are 2 modes:
|
└─> F mode
└─> A mode
The f
mode is a mode where you get the active interface for using the interactive vaerion of the framework with the prompt, etc.
F mode is the normal mode and can be used easily
A mode or argumentative mode takes the input via arguments and runs the commands without any intervention by the user this is limited to the main menu in the future i am planning to extend this feature to even the encorporated codes.
python main.py --target <APK_file> --mode a --command install_tools/tools_name/apkleaks/mobfs/rms/apkleaks
the main menu of the entire tool has these options and commands:
Frame mode : |
Command | Discription |
---|---|---|
SET target |
SET the name of the targetfile | |
START install_tools |
If not installed this will install the tools | |
LIST tools_name |
List out the Tools Intigrated | |
START apkleaks |
Use APKLeaks tool | |
START mobfs |
Use MOBfs for dynamic and static analysis | |
START andropass |
Use AndroPass APK analizer | |
START addins |
Starts the Extra tools installer | |
update addins |
Updates the extra tools installer | |
help |
Display help menu | |
SHOW banner |
Display banner | |
quit |
Quit the program |
Args mode : |
Command | Discription |
---|---|---|
install_tools |
If not installed this will install the tools | |
tools_name |
List out the Tools Intigrated | |
apkleaks |
Use APKLeaks tool | |
mobfs |
Use MOBfs for dynamic and static analysis | |
andropass |
Use AndroPass APK analizer | |
addins |
Starts the Extra tools installer | |
addins |
Updates the extra tools installer | |
help |
Display help menu | |
banner |
Display banner |
As mentioned above the target must be set before any tool is used.
The APKLeaks menu is also really straight forward and only a few things to consider:
SET output
and SET json-out
takes file names not the actual files it creates an output in the result
directory.SET pattern
option takes a name of a json pattern file. The JSON file must be located in the pattern
directoryOPTION | SET Value |
---|---|
SET output |
Output for the scan data file name |
SET arguments |
Additional Disassembly arguments |
SET json-out |
JSON output file name |
SET pattern |
The pre-searching pattern for secrets |
help |
Displays help menu |
return |
Return to main menu |
quit |
Quit the tool |
Mobfs is pritty straight forward only the port number must be taken care of which is by default on port 5000 you just need to start the program and connect to it on 127.0.0.1:5000
over your browser.
AndroPass is also really straight forward it just takes the file as input and does its job without any other inputs.
The APK analysis framework will follow a modular architecture, similar to Metasploit. It will consist of the following modules:
Currentluy there only 3 but if wanted people can add more tools to this these are the things to be considered:
config/installer.py
config/mobfs.py , config/androp.py, config/apkleaks.py
If wanted you could do your upgrades and add it to this repository for more people to use kind of growing this tool.
Still under development
Anyone can contribute. I want this tool to be useful for as many people as possible. If anyone wants to contribute please feel free to. One way you can contribute is by adding your tools or tools you feel like can add value to the code and the complete framework.