Skip to content

Latest commit

 

History

History
51 lines (25 loc) · 2.23 KB

Lecture 14.md

File metadata and controls

51 lines (25 loc) · 2.23 KB

Androwarn is a tool designed to help in the analysis of Android applications by generating analysis reports. It detects potential security issues and vulnerabilities in Android APK files. Here are the steps to use Androwarn for Android malware analysis:

Step 1: Install Dependencies Androwarn requires certain dependencies to be installed. Ensure you have Python installed, and then install the necessary Python packages.

Install Python version 3.7.1

Activate Python Virtual Environemnt

image

Step 2: Download Androwarn Download the Androwarn tool from its official GitHub repository.

⁠git clone https://github.com/maaaaz/androwarn.git

cd androwarn

Install all required packages from requirement.txt

⁠pip install requirement.txt
image image

Step 3: Manually Install Androguard

image image

Step 4: Run Androwarn

⁠python androwarn.py -i diva-beta.apk -r html -v 3

Execute Androwarn to analyze the APK file. diva-beta.apk with the path to your APK file.

image

Step 5: Review the Output

Androwarn will generate a detailed report based on the analysis of the APK file. This report will highlight various aspects such as potential security issues, suspicious behaviors, and other vulnerabilities.

Step 6: Interpret the Results

Examine the report to understand the potential threats and vulnerabilities present in the APK file. The report will categorize findings and provide insights into what the APK might be doing.