Lobotomy:安卓系统评估渗透测试工具包
作者:admin | 时间:2016-4-21 23:46:19 | 分类:黑客工具 隐藏侧边栏展开侧边栏
Lobotomy是一款运行在Python环境下的安卓系统评估工具包,它可以帮助安全研究人员评估不同Android逆向工程任务。Lobotomy的目标是打算给安全研究人员提供一个完善的审计平台,允许其在不退出该平台环境下,利用所需要的工具加载目标程序。
Lobotomy主要包含工具:
Androguard(开源静态分析工具)
apktool(反编译工具,已验证Java版本1.7、1.8)
Dex2Jar(反编译工具)
Frida(跨平台注入工具)
已测试的Python版本:
2.7.9
2.7.10
2.7.11
参数列表
(lobotomy) help
Documented commands (type help ):
----------------------------------------
_load components edit li pause run show
_relative_load d2j frida list permissions save
attacksurface debuggable hi load profiler set
bowser decompile history loader py shell
cmdenvironment ed l logcat r shortcuts
Undocumented commands:
----------------------
EOF eof exit help q quit
连接WEB服务器
[~/Tools/mobile/android/lobotomy]> python web/run.py runserver -h 0.0.0.0
用户端信息位于:/ui/home
加载一个Android安装包
[~/Tools/mobile/android/lobotomy]> python lobotomy.py
: : :
t#, t#, t#,
i ;##W. . ;##W. ;##W.
LE :#L:WE Ef. :#L:WE GEEEEEEEL :#L:WE .. : f. ;WE.
L#E .KG ,#D E#Wi .KG ,#D ,;;L#K;;. .KG ,#D ,W, .Et E#, i#G
G#W. EE ;#f E#K#D: EE ;#f t#E EE ;#f t##, ,W#t E#t f#f
D#K. f#. t#iE#t,E#f. f#. t#i t#E f#. t#i L###, j###t E#t G#i
E#K. :#G GK E#WEE##Wt:#G GK t#E :#G GK .E#j##, G#fE#t E#jEW,
.E#E. ;#L LW. E##Ei;;;;.;#L LW. t#E ;#L LW. ;WW; ##,:K#i E#t E##E.
.K#E t#f f#: E#DWWt t#f f#: t#E t#f f#: j#E. ##f#W, E#t E#G
.K#D f#D#; E#t f#K; f#D#; t#E f#D#; .D#L ###K: E#t E#t
.W#G G#t E#Dfff##E, G#t t#E G#t :K#t ##D. E#t E#t
:W##########Wt t jLLLLLLLLL; t fE t ... #G .. EE.
:,,,,,,,,,,,,,. : j t
(lobotomy) loader /Users/benjaminwatson/Android-Web-Browsers/opera-mini/apk/com.opera.mini.native.apk
[2015-08-03 19:16:44.866870] Loading : /Users/benjaminwatson/Android-Web-Browsers/opera-mini/apk/com.opera.mini.native.apk
(lobotomy)
权限列表
(lobotomy) permissions list [2015-08-03 19:27:31.175369] Permission: android.permission.ACCESS_FINE_LOCATION [2015-08-03 19:27:31.175409] Permission: android.permission.ACCESS_NETWORK_STATE [2015-08-03 19:27:31.175421] Permission: android.permission.INTERNET [2015-08-03 19:27:31.175430] Permission: android.permission.NFC [2015-08-03 19:27:31.175438] Permission: android.permission.WRITE_EXTERNAL_STORAGE [2015-08-03 19:27:31.175446] Permission: com.android.launcher.permission.INSTALL_SHORTCUT [2015-08-03 19:27:31.175454] Permission: com.opera.GET_BRANDING [2015-08-03 19:27:31.175461] Permission: com.opera.mini.native.permission.CRASHHANDLER [2015-08-03 19:27:31.175469] Permission: com.android.browser.permission.READ_HISTORY_BOOKMARKS [2015-08-03 19:27:31.175477] Permission: android.permission.SYSTEM_ALERT_WINDOW [2015-08-03 19:27:31.175484] Permission: android.permission.WAKE_LOCK [2015-08-03 19:27:31.175491] Permission: com.google.android.c2dm.permission.RECEIVE [2015-08-03 19:27:31.175498] Permission: com.opera.mini.native.permission.C2D_MESSAGE [2015-08-03 19:27:31.175505] Permission: android.permission.READ_CONTACTS [2015-08-03 19:27:31.175571] Permission: android.permission.VIBRATE
权限映射
(lobotomy) permissions map
[2015-08-03 19:28:07.078496] Found permission mapping : android.permission.ACCESS_FINE_LOCATION
[2015-08-03 19:28:07.078543] Searching for : android.telephony.TelephonyManager
[2015-08-03 19:28:12.686411] Searching for : android.location.LocationManager
1 Lbo/app/bs;->(Landroid/content/Context; Landroid/location/LocationManager; Lbo/app/bb; Lcom/appboy/configuration/XmlAppConfigurationProvider;)V (0x120) ---> Landroid/location/LocationManager;->requestLocationUpdates(Ljava/lang/String; J F Landroid/app/PendingIntent;)V
1 Lpz;->a()V (0x20) ---> Landroid/location/LocationManager;->requestLocationUpdates(Ljava/lang/String; J F Landroid/location/LocationListener;)V
1 Lbo/app/bs;->c()Lbo/app/da; (0x2e) ---> Landroid/location/LocationManager;->getProviders(Landroid/location/Criteria; Z)Ljava/util/List;
1 Lbo/app/bs;->c()Lbo/app/da; (0x54) ---> Landroid/location/LocationManager;->getProviders(Landroid/location/Criteria; Z)Ljava/util/List;
1 Lpy;->a(Llb;)Landroid/location/Location; (0x50) ---> Landroid/location/LocationManager;->getProviders(Z)Ljava/util/List;
1 Lbo/app/bs;->c()Lbo/app/da; (0x2e) ---> Landroid/location/LocationManager;->getProviders(Landroid/location/Criteria; Z)Ljava/util/List;
1 Lbo/app/bs;->c()Lbo/app/da; (0x54) ---> Landroid/location/LocationManager;->getProviders(Landroid/location/Criteria; Z)Ljava/util/List;
1 Lkf;->detectlocation(Ljava/lang/String;)V (0x9e) --->
攻击界面
(lobotomy) attacksurface [2015-08-03 19:29:02.272276] --------- [2015-08-03 19:29:02.272317] Activites [2015-08-03 19:29:02.272327] --------- [2015-08-03 19:29:02.272472] com.opera.android.MiniActivity : Found Activity with launchMode! [2015-08-03 19:29:02.272507] com.opera.android.MiniActivity : launchMode : singleTask [2015-08-03 19:29:02.272778] com.opera.mini.android.Browser : Found Activity with launchMode! [2015-08-03 19:29:02.272793] com.opera.mini.android.Browser : launchMode : singleTask [2015-08-03 19:29:02.272900] com.opera.mini.android.Browser : Found Activity with schemes! [2015-08-03 19:29:02.272912] com.opera.mini.android.Browser : scheme : ftp [2015-08-03 19:29:02.272932] com.opera.mini.android.Browser : scheme : about [2015-08-03 19:29:02.272943] com.opera.mini.android.Browser : scheme : http [2015-08-03 19:29:02.272952] com.opera.mini.android.Browser : scheme : opera [2015-08-03 19:29:02.272961] com.opera.mini.android.Browser : scheme : adx [2015-08-03 19:29:02.272970] com.opera.mini.android.Browser : scheme : https [2015-08-03 19:29:02.273250] com.opera.mini.android.Browser : action : android.intent.action.MAIN [2015-08-03 19:29:02.273263] com.opera.mini.android.Browser : action : android.intent.action.VIEW [2015-08-03 19:29:02.273272] com.opera.mini.android.Browser : action : android.nfc.action.NDEF_DISCOVERED [2015-08-03 19:29:02.273280] com.opera.mini.android.Browser : action : android.speech.action.VOICE_SEARCH_RESULTS [2015-08-03 19:29:02.273289] com.opera.mini.android.Browser : action : android.intent.action.WEB_SEARCH [2015-08-03 19:29:02.273297] com.opera.mini.android.Browser : category : android.intent.category.LAUNCHER [2015-08-03 19:29:02.273305] com.opera.mini.android.Browser : category : android.intent.category.DEFAULT [2015-08-03 19:29:02.273313] com.opera.mini.android.Browser : category : android.intent.category.BROWSABLE [2015-08-03 19:29:02.273321] --------- [2015-08-03 19:29:02.273328] Receivers [2015-08-03 19:29:02.273335] --------- [2015-08-03 19:29:02.273712] com.AdX.tag.AdXAppTracker : Found exported receiver! [2015-08-03 19:29:02.273724] com.AdX.tag.AdXAppTracker : exported : true [2015-08-03 19:29:02.273880] com.AdX.tag.AdXAppTracker : action : com.android.vending.INSTALL_REFERRER [2015-08-03 19:29:02.274348] com.opera.android.gcm.GcmBroadcastReceiver : action : com.google.android.c2dm.intent.RECEIVE [2015-08-03 19:29:02.274361] com.opera.android.gcm.GcmBroadcastReceiver : category : com.opera.mini.native [2015-08-03 19:29:02.274821] com.opera.android.appboy.AppboyBroadcastReceiver : action : com.opera.mini.native.intent.APPBOY_PUSH_RECEIVED [2015-08-03 19:29:02.274833] com.opera.android.appboy.AppboyBroadcastReceiver : action : com.opera.mini.native.intent.APPBOY_NOTIFICATION_OPENED [2015-08-03 19:29:02.274842] --------- [2015-08-03 19:29:02.274848] Providers [2015-08-03 19:29:02.274855] --------- [2015-08-03 19:29:02.275486] --------- [2015-08-03 19:29:02.275494] Services [2015-08-03 19:29:02.275511] ---------
下载地址:点击我