natatapron / androguard

Automatically exported from code.google.com/p/androguard
Apache License 2.0
0 stars 0 forks source link

Searching! doesn't work #89

Closed GoogleCodeExporter closed 9 years ago

GoogleCodeExporter commented 9 years ago
What steps will reproduce the problem?
1. In androlyze interactive shell I load an application with the next line:
a, d, dx = AnalyzeAPK("/home/android/1.apk")
2. Then I try to search a string:
z = dx.tainted_variables.get_string("getDeviceId")
z.show_paths(d)

What is the expected output? What do you see instead?

The expected output is a path as:
R Lcom/google/android/smart/t; a ()V a-BB@0x3e 50

But the output is an error.

What version of the product are you using? On what operating system?

Python 2.6.5
Androlyze version 1.5.1

I'm working with Android Reverse Engineering (A.R.E.) Virtual Machine. Updated 
software version: 0.1.

Please provide any additional information below.

Full output:
https://docs.google.com/document/d/1en3dDzj39Yzdgbf8FS4JF8W_Jnjd88V7qRkBGrw9nQs/
edit

¿It's possible to search "getDeviceId" so that I could know if the method 
getDeviceId() is used?

Original issue reported on code.google.com by sergio.p...@gmail.com on 14 Nov 2012 at 2:38

GoogleCodeExporter commented 9 years ago
Could you provide the APK for testing ?

Original comment by anthony....@gmail.com on 20 Nov 2012 at 5:32

GoogleCodeExporter commented 9 years ago
Sure. Here you are:

https://docs.google.com/open?id=0BxYpeC6G5fogMmtpVHZjUlhnTGM

¿Could not be possible to call the show_paths(d) method in the variable z?

Thanks in advance.

Original comment by sergio.p...@gmail.com on 22 Nov 2012 at 4:10

GoogleCodeExporter commented 9 years ago
Please update your version with mercurial.

Search a specific method as specified in the RE tutorial.

Original comment by anthony....@gmail.com on 25 Nov 2012 at 10:47

GoogleCodeExporter commented 9 years ago
Ok! I got it. Thank you so much for this awesome tool.

Original comment by sergio.p...@gmail.com on 26 Nov 2012 at 4:00