漏洞分析

0

高危漏洞

6

中危漏洞

2

低危漏洞

6

警告

文件名 zANTI2.apk
上传者 77caikiki
文件大小 13.847868919373MB
MD5 b9ce1149e737661710e212c6d0cebe69
包名 com.zimperium.zanti
Main Activity com.zimperium.zanti.zcloud.ZcloudMainActivity
Min SDK 8
Target SDK 19

权限列表

# 名称 说明 提示
0 android.permission.ACCESS_COARSE_LOCATION 访问大概的位置源(例如蜂窝网络数据库)以确定手机的大概位置(如果可以)。恶意应用程序可借此确定您所处的大概位置。 注意
1 android.permission.ACCESS_FINE_LOCATION 访问精准的位置源,例如手机上的全球定位系统(如果有)。恶意应用程序可能会借此确定您所处的位置,并可能消耗额外的电池电量。 注意
2 android.permission.BROADCAST_STICKY 允许应用程序发送顽固广播,这些广播在结束后仍会保留。恶意应用程序可能会借此使手机耗用太多内存,从而降低其速度或稳定性。 注意
3 android.permission.READ_PHONE_STATE 允许应用程序访问设备的手机功能。有此权限的应用程序可确定此手机的号码和序列号,是否正在通话,以及对方的号码等。 注意
4 android.permission.RECEIVE_BOOT_COMPLETED 允许应用程序在系统完成启动后即自行启动。这样会延长手机的启动时间,而且如果应用程序一直运行,会降低手机的整体速度。 注意
5 android.permission.ACCESS_NETWORK_STATE 允许应用程序查看所有网络的状态。 提示
6 android.permission.ACCESS_WIFI_STATE 允许应用程序查看有关WLAN状态的信息。 提示
7 android.permission.CHANGE_NETWORK_STATE 允许应用程序更改网络连接的状态。 提示
8 android.permission.CHANGE_WIFI_STATE 允许应用程序连接到WLAN接入点以及与WLAN接入点断开连接,并对配置的WLAN网络进行更改。 提示
9 android.permission.GET_ACCOUNTS 允许应用程序获取手机已知的帐户列表。 提示
10 android.permission.INTERNET 允许程序访问网络. 提示
11 android.permission.KILL_BACKGROUND_PROCESSES 无论内存资源是否紧张,都允许应用程序结束其他应用程序的后台进程。 提示
12 android.permission.WAKE_LOCK 允许应用程序防止手机进入休眠状态。 提示
13 android.permission.WRITE_EXTERNAL_STORAGE 允许应用程序写入SD卡。 提示

四大组件

组件名称

com.zimperium.zanti.Anti
com.zimperium.zanti.httpserver.HttpServerController
com.zimperium.zanti.httpserver.HttpServerOptions
com.zimperium.zanti.WifiMonitor
com.zimperium.zanti.Preferences
com.zimperium.zanti.Connect
com.zimperium.zanti.PenTestInfoActivity
com.zimperium.zanti.TutorialWizard
com.zimperium.zanti.OptionsActivity
com.zimperium.zanti.Scanner.ScanResultsActivity
com.zimperium.zanti.httpserver.FolderList
com.zimperium.zanti.analyze.AnalyzeActivity
com.zimperium.zanti.analyze.AnalyzeOptionsActivity
com.zimperium.zanti.analyze.AnalyzeResultsActivity
com.zimperium.zanti.ZHttpInjector.fragments.log.AntiWebActivity
com.zimperium.zanti.samba.SambaBrowser
com.zimperium.zanti.ZHttpInjector.fragments.log.LogViewActivity
com.zimperium.zanti.history.HistoryActivity
com.zimperium.zanti.zcloud.ZcloudMainActivity
com.zimperium.zanti.zcloud.ZcloudRegisterActivity
com.zimperium.zips.ui.BackgroundDialogActivity
com.zimperium.zanti.CrackerPlugin.Cracker
com.zimperium.zanti.CrackerPlugin.CrackerOptions
com.zimperium.zanti.VersionDetailsActivity
com.zimperium.zanti.RouterPwnPlugin.RouterPwnPlugin
com.zimperium.zanti.zmitm.ZMITMActivity
com.zimperium.zanti.ztether.ZTetherActivity
com.zimperium.zanti.zetasploit.ZetasploitActivity
com.zimperium.zanti.zetasploit.ZetasploitProgressActivity
com.zimperium.zanti.zetasploit.ExploitChooserActivity
com.zimperium.zanti.zetasploit.ExploitChooserActivityClientFiltered
com.zimperium.zanti.zetasploit.ExploitInfoActivity
com.zimperium.zanti.macchanger.MacchangerActivity
com.zimperium.zanti.heartbleedplugin.HeartbleedPlugin
com.zimperium.zanti.ShellShockPlugin.ShellShockPlugin
com.zimperium.zanti.SSLPoodlePlugin.SSLPoodlePlugin
com.zimperium.zanti.ZNetworkPopupScreen
com.zimperium.zanti.zipsadvert.ZipsAdvertPopup
com.zimperium.zanti.zipsadvert.ZipsAdvertForm
org.acra.CrashReportDialog

com.zimperium.zanti.httpserver.HttpServerService
com.zimperium.zanti.ZHttpInjector.ZHttpInjectorService
com.zimperium.zanti.analyze.AnalyzeCrackerService
com.zimperium.zcloud.ZcloudRunnerService
com.zimperium.zips.ZipsFileUpdateService
com.zimperium.zanti.zetasploit.ZetasploitService

com.zimperium.zanti.BootReceiver
com.zimperium.zanti.CrackerPlugin.PluginAnnouncer
com.zimperium.zanti.RouterPwnPlugin.PluginAnnouncer
com.zimperium.zanti.zmitm.PluginAnnouncer
com.zimperium.zanti.ztether.PluginAnnouncer
com.zimperium.zanti.zetasploit.PluginAnnouncer
com.zimperium.zanti.macchanger.PluginAnnouncer
com.zimperium.zanti.heartbleedplugin.PluginAnnouncer
com.zimperium.zanti.ShellShockPlugin.PluginAnnouncer
com.zimperium.zanti.SSLPoodlePlugin.PluginAnnouncer

com.zimperium.zanti.Scanner.db.zHostProvider
com.zimperium.zanti.ZHttpInjector.database.HttpRequestLogProvider

第三方库

# 库名 介绍
0 com.paypal.android.sdk Accept PayPal and credit cards in your Android app
1 com.actionbarsherlock Action bar implementation which uses the native action bar on Android 4.0+ and a custom implementation on pre-4.0 through a single API and theme.
2 com.astuetz.viewpager.extensions A set of custom views for the ViewPager from the Android Support Package
3 com.google.protobuf Protocol Buffers - Google's data interchange format https://developers.google.com/protocol-buffers/
4 com.nineoldandroids Android library for using the Honeycomb animation API on all versions of the platform back to 1.0!
5 com.androidquery AndroidQuery
6 io.card.payment card.io provides fast, easy credit card scanning in mobile apps
7 org.acra Application Crash Reports for Android

静态扫描发现风险点

风险等级 风险名称

中危

检测到当前标志被设置成true或没设置,这会导致adb调试备份允许恶意攻击者复制应用程序数据,造成数据泄露。

中危

检测到1处证书弱校验漏洞。

位置: classes.dex
org.acra.util.e;

当移动App客户端使用https或ssl/tls进行通信时,如果不校验证书的可信性,将存在中间人攻击漏洞,可导致信息泄露,传输数据被篡改,甚至通过中间人劫持将原有信息替换成恶意链接或恶意代码程序,以达到远程控制等攻击意图。建议:
对SSL证书进行强校验,包括签名CA是否合法、证书是否是自签名、主机域名是否匹配、证书是否过期等。

参考案例:
www.wooyun.org/bugs/wooyun-2014-079358

参考资料:
http://drops.wooyun.org/tips/3296
http://wolfeye.baidu.com/blog/webview-ignore-ssl-error/
https://jaq.alibaba.com/blog.htm?id=60

中危

检测到1个未移除的敏感Test或Debug组件

com.zimperium.zanti.PenTestInfoActivity

建议:
在正式发布app前移除敏感的Test或Debug组件

中危

该app需要移除大部分日志打印代码。
经扫描该包仍存在大量打日志代码,共发现158处打日志代码.(此处扫描的日志打印代码,是指调用android.util.Log.* 打印的.)
详情如下:

位置: classes.dex
com.zimperium.zanti.zetasploit.ZetasploitService$2;->run()V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.SSLPoodlePlugin.SSLPoodlePlugin;->a(Ljava/lang/String; I)Z==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zmitm.PluginAnnouncer;->onReceive(Landroid/content/Context; Landroid/content/Intent;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.Scanner.a;->b(Landroid/content/Context; Ljava/util/ArrayList;)Lcom/zimperium/zanti/Scanner/d;==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitActivity$1;->run()V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ztether.a;->b()V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.aw;->run()V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
org.acra.l;->run()V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ZHttpInjector.h;->a(Ljava/lang/String;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.CrackerPlugin.d;->a(Ljava/lang/Void;)V==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ExploitController_Server;->remote_execute_exploit(Ljava/lang/String; Lcom/zimperium/zanti/zetasploit/ExploitController_Server$SetupZetasploitResult; I)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
org.acra.n;->a(Landroid/content/Context; Z)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.CrashReportDialog;->c()V==>android.util.Log;->v(Ljava/lang/String; Ljava/lang/String;)I
com.slidingmenu.lib.SlidingMenu;->fitSystemWindows(Landroid/graphics/Rect;)Z==>android.util.Log;->v(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->a(Ljava/lang/Throwable; Lorg/acra/ReportingInteractionMode; Z Z)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->handleSilentException(Ljava/lang/Throwable;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ztether.PluginAnnouncer;->onReceive(Landroid/content/Context; Landroid/content/Intent;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.Scanner.j;->run()V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.n;->a(Landroid/content/Context; Z)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ExploitController_Server;->startVTUN()Ljava/lang/String;==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.google.analytics.tracking.android.m;->d(Ljava/lang/String;)V==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
org.acra.sender.b;->a(Lorg/acra/collector/CrashReportData;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ZHttpInjector.fragments.log.AntiWebActivity;->onCreate(Landroid/os/Bundle;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.httpserver.p;->a([B I I Ljava/lang/String;)Ljava/lang/String;==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.e;->a()[Ljava/lang/String;==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->b(Ljava/lang/String;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.mainpage.aa;->a(Landroid/app/Activity;)Landroid/view/View;==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.httpserver.HttpServerService;->onStartCommand(Landroid/content/Intent; I I)I==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.SSLPoodlePlugin.SSLPoodlePlugin;->a(Ljava/lang/String; Ljava/lang/String; Z)Ljava/lang/String;==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ZHttpInjector.c;->a(Z)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ZHttpInjector.a.f;->a(Ljava/lang/String; I Lcom/zimperium/zanti/ZHttpInjector/q;)V==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
org.acra.c.b;->a(Ljava/lang/String; Ljava/lang/String;)I==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->d()V==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
com.google.analytics.tracking.android.m;->c(Ljava/lang/String;)V==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.Anti;->onBackPressed()V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.google.analytics.tracking.android.m;->a(Ljava/lang/String;)V==>android.util.Log;->v(Ljava/lang/String; Ljava/lang/String;)I
org.a.a.a;->b()V==>android.util.Log;->v(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zmitm.fragments.a;->c()V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.Scanner.db.a;->a(Landroid/content/Context; Ljava/lang/String; Ljava/lang/String;)Lcom/zimperium/zanti/Scanner/db/zHost;==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
org.a.a.d;->getItem(I)Landroid/support/v4/app/Fragment;==>android.util.Log;->v(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zmitm.fragments.a;->b()V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.androidquery.util.a;->a(Ljava/lang/Throwable;)V==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ztether.a;->(Landroid/content/Context;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->uncaughtException(Ljava/lang/Thread; Ljava/lang/Throwable;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.samba.e;->run()V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitPayloadWindowsVNC;->handleIncomingSocket(Lcom/zimperium/zanti/zetasploit/ZetasploitState; Lcom/zimperium/zanti/zetasploit/ZetasploitService; Lcom/zimperium/zanti/zetasploit/ZetasploitService$ZetasploitProgress; Ljava/io/InputStream; Ljava/io/OutputStream;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ZHttpInjector.fragments.log.ZoomableImageView;->setBitmap(Landroid/graphics/Bitmap;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitService;->notifyUpdateProgress(Ljava/lang/String;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->f()V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.httpserver.k;->onClick(Landroid/content/DialogInterface; I)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->uncaughtException(Ljava/lang/Thread; Ljava/lang/Throwable;)V==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ShellShockPlugin.b;->run()V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ZHttpInjector.n;->run()V==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
org.acra.util.g;->b(Landroid/content/Context;)Ljava/lang/String;==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.Scanner.db.a;->b(Landroid/content/Context; Lcom/zimperium/zanti/Scanner/db/zHost;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.CrashReportDialog;->c()V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->c()V==>android.util.Log;->v(Ljava/lang/String; Ljava/lang/String;)I
org.acra.collector.h;->a(Ljava/lang/String;)Ljava/lang/String;==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ZHttpInjector.p;->b(Ljava/lang/String; Lcom/zimperium/zanti/ZHttpInjector/q;)Ljava/lang/String;==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ZHttpInjector.b.h;->onResume()V==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.PluginAnnouncer;->onReceive(Landroid/content/Context; Landroid/content/Intent;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.RouterPwnPlugin.PluginAnnouncer;->onReceive(Landroid/content/Context; Landroid/content/Intent;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.SSLPoodlePlugin.PluginAnnouncer;->onReceive(Landroid/content/Context; Landroid/content/Intent;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
org.acra.e;->a()[Ljava/lang/String;==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
org.acra.n;->a()V==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
org.acra.util.f;->a()Landroid/content/pm/PackageInfo;==>android.util.Log;->v(Ljava/lang/String; Ljava/lang/String;)I
org.acra.n;->a(Landroid/content/Context; Ljava/lang/String;)V==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->d()V==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
org.acra.sender.HttpSender;->a(Lorg/acra/collector/CrashReportData;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ZHttpInjector.fragments.log.aa;->onClick(Landroid/view/View;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ExploitParser;->parseExploit(Lcom/fasterxml/jackson/core/JsonParser;)Lcom/zimperium/zanti/zetasploit/ZetasploitExploit;==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
com.slidingmenu.lib.h;->run()V==>android.util.Log;->v(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitPayloadWindowsEXE;->handleIncomingSocket(Lcom/zimperium/zanti/zetasploit/ZetasploitState; Lcom/zimperium/zanti/zetasploit/ZetasploitService; Lcom/zimperium/zanti/zetasploit/ZetasploitService$ZetasploitProgress; Ljava/io/InputStream; Ljava/io/OutputStream;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitService;->onStartCommand(Landroid/content/Intent; I I)I==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
org.acra.n;->a(Lorg/acra/collector/CrashReportData;)V==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->f()V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ZHttpInjector.b.j;->onServiceConnected(Landroid/content/ComponentName; Landroid/os/IBinder;)V==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.Anti;->onCreate(Landroid/os/Bundle;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.CrackerPlugin.a;->onItemClick(Landroid/widget/AdapterView; Landroid/view/View; I J)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitPayloadGenericShell$3;->onServiceDisconnected(Landroid/content/ComponentName;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.httpserver.HttpServerService;->onDestroy()V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.history.c;->onTabSelected(Lcom/actionbarsherlock/app/ActionBar$Tab; Landroid/support/v4/app/FragmentTransaction;)V==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
com.androidquery.util.a;->a(Ljava/lang/Object; Ljava/lang/Object;)V==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitPayloadWindowsEXE$ZetasploitPayloadWindowsEXEDialogFragment;->onActivityResult(I I Landroid/content/Intent;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.CrackerPlugin.PluginAnnouncer;->onReceive(Landroid/content/Context; Landroid/content/Intent;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zipsadvert.e;->run()V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
org.acra.c.b;->c(Ljava/lang/String; Ljava/lang/String;)I==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ExploitController_File;->remote_create_exploit_file(I)Ljava/lang/String;==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitActivity;->loadExploits()V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.macchanger.PluginAnnouncer;->onReceive(Landroid/content/Context; Landroid/content/Intent;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ZHttpInjector.l;->c()V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->a(Z)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
org.acra.n;->a()V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.samba.c;->a(I)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.Scanner.a;->a(Landroid/content/Context; Ljava/util/ArrayList;)Lcom/zimperium/zanti/Scanner/d;==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.Anti;->onCreate(Landroid/os/Bundle;)V==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.samba.a;->onTouchEvent(Landroid/view/MotionEvent;)Z==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.analyze.b;->a(Lcom/zimperium/zanti/analyze/AnalyzeCrackerService$TargetUserPassPort;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ZHttpInjector.ZHttpInjectorService;->onStartCommand(Landroid/content/Intent; I I)I==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitPayloadGenericShell$1$1;->run()V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.slidingmenu.lib.f;->a(Landroid/view/View; I I)V==>android.util.Log;->v(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.af;->a(Ljava/lang/String; Ljava/lang/String; Ljava/lang/String; Landroid/content/Context; Lcom/zimperium/zanti/an;)Lcom/zimperium/zanti/bh;==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ztether.a;->c()V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ExploitInfoActivity;->setupParams()V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
org.a.a.a;->a()V==>android.util.Log;->v(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.bg;->a()Lcom/zimperium/zanti/bh;==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.Scanner.db.a;->a(Landroid/content/Context; Ljava/lang/String;)Ljava/util/ArrayList;==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
org.acra.CrashReportDialog;->onCreate(Landroid/os/Bundle;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.collector.c;->a(Ljava/lang/Throwable; Z Ljava/lang/Thread;)Lorg/acra/collector/CrashReportData;==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
org.acra.collector.c;->a(Ljava/lang/Throwable; Z Ljava/lang/Thread;)Lorg/acra/collector/CrashReportData;==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitProgressActivity$1;->onReceive(Landroid/content/Context; Landroid/content/Intent;)V==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.heartbleedplugin.PluginAnnouncer;->onReceive(Landroid/content/Context; Landroid/content/Intent;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ShellShockPlugin.ShellShockPlugin;->a(Ljava/lang/String; I)Z==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.httpserver.HttpServerService;->a(Ljava/util/Properties;)Lcom/zimperium/zanti/httpserver/r;==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.collector.f;->a(Landroid/content/Context; [Ljava/lang/String;)Ljava/lang/String;==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ZHttpInjector.b.j;->onServiceDisconnected(Landroid/content/ComponentName;)V==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
com.androidquery.util.a;->a(Ljava/lang/Object;)V==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.samba.a;->a(I)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.SSLPoodlePlugin.SSLPoodlePlugin;->a(Ljava/lang/String; Ljava/lang/String; Z)Ljava/lang/String;==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.a.a.h;->onAttach(Landroid/app/Activity;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitExploitDB;->getCursorInt(Ljava/lang/String; Ljava/lang/String; Ljava/util/ArrayList;)Landroid/database/Cursor;==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.history.HistoryActivity;->a(Landroid/database/Cursor;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ExploitController_Server;->remote_setup_exploit(Ljava/lang/String;)Lcom/zimperium/zanti/zetasploit/ExploitController_Server$SetupZetasploitResult;==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.n;->onReceive(Landroid/content/Context; Landroid/content/Intent;)V==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->a(Ljava/lang/String; Lorg/acra/collector/CrashReportData;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.e;->a()[Ljava/lang/String;==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zframework.VirtualTerminal;->a(Ljava/lang/String; Lcom/zframework/s;)Lcom/zframework/t;==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.Scanner.e;->a()Ljava/util/ArrayList;==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ztether.a;->b()V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->f()V==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->a(Z Z I)V==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.MenuOptions.ScanMenuOption;->recordOptions(Landroid/view/View; Landroid/content/Context;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitPayloadGenericShell$1$1$1;->run()V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ShellShockPlugin.ShellShockPlugin;->onBackPressed()V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.google.analytics.tracking.android.m;->b(Ljava/lang/String;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitActivity;->loadExploitsSynch(Lcom/zimperium/zanti/zetasploit/ZetasploitExploitDB; Ljava/lang/String; Lcom/zimperium/zanti/zetasploit/ZetasploitExploit$ZetasploitExploitType;)Z==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitService;->fetchLPORT()I==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ShellShockPlugin.PluginAnnouncer;->onReceive(Landroid/content/Context; Landroid/content/Intent;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ExploitController_Client;->remote_create_exploit_url(I)Ljava/lang/String;==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ztether.a;->c()V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.c.b;->b(Ljava/lang/String; Ljava/lang/String;)I==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.httpserver.i;->onServiceConnected(Landroid/content/ComponentName; Landroid/os/IBinder;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
org.acra.ErrorReporter;->a(Ljava/lang/String;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitService;->handleReverseTCPSocket(Ljava/net/Socket;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.httpserver.i;->onServiceDisconnected(Landroid/content/ComponentName;)V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ztether.a;->b()V==>android.util.Log;->e(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.httpserver.HttpServerService;->onCreate()V==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.CrackerPlugin.d;->a([Lcom/zimperium/zanti/CrackerPlugin/CrackerOptions$Protocol;)Ljava/lang/Void;==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.analyze.b;->a(Lcom/zimperium/zanti/analyze/AnalyzeCrackerService$TargetUserPassPort; Ljava/io/BufferedReader;)Z==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.samba.d;->onTouch(Landroid/view/View; Landroid/view/MotionEvent;)Z==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
org.a.a.a;->c()V==>android.util.Log;->v(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitActivity;->FindHostForTarget(Ljava/lang/String;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.androidquery.util.a;->b(Ljava/lang/Object; Ljava/lang/Object;)V==>android.util.Log;->w(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.zetasploit.ZetasploitPayloadGenericShell$3;->onServiceConnected(Landroid/content/ComponentName; Landroid/os/IBinder;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.ZHttpInjector.a;->b(Ljava/lang/String;)Lcom/zimperium/zanti/ZHttpInjector/b;==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.MenuOptions.ScanMenuOption;->execute(Landroid/app/Activity;)V==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
com.zimperium.zanti.af;->c(Ljava/lang/String; Ljava/lang/String; Ljava/lang/String;)Z==>android.util.Log;->i(Ljava/lang/String; Ljava/lang/String;)I
org.acra.collector.c;->b()Ljava/util/List;==>android.util.Log;->d(Ljava/lang/String; Ljava/lang/String;)I

中危

检测到24条敏感明文信息,建议移除。

位置: classes.dex
'auth-agent-req@openssh.com' used in: Lcom/jcraft/jsch/RequestAgentForwarding;->request(Lcom/jcraft/jsch/Session; Lcom/jcraft/jsch/Channel;)V
'auth-agent@openssh.com' used in: Lcom/jcraft/jsch/Session;->run()V
'auth-agent@openssh.com' used in: Lcom/jcraft/jsch/Channel;->getChannel(Ljava/lang/String;)Lcom/jcraft/jsch/Channel;
'auth-agent@openssh.com' used in: Lcom/jcraft/jsch/ChannelAgentForwarding;->()V
'http://routerpwn.com' used in: Lcom/zimperium/zanti/RouterPwnPlugin/RouterPwnPlugin;->onCreate(Landroid/os/Bundle;)V
'http://www.google-analytics.com/collect' used in: Lcom/google/analytics/tracking/android/ax;->a(Lcom/google/analytics/tracking/android/al;)Ljava/net/URL;
'http://www.google-analytics.com/collect' used in: Lcom/google/analytics/tracking/android/ar;->a(Ljava/util/Map; J Ljava/lang/String;)V
'http://www.twitter.com/ZIMPERIUM' used in: Lcom/zimperium/zanti/o;->onClick(Landroid/view/View;)V
'http://www.twitter.com/antiproject' used in: Lcom/zimperium/zanti/p;->onClick(Landroid/view/View;)V
'https://docs.google.com/spreadsheet/formResponse?formkey=%s&ifq' used in: Lorg/acra/b;->O()Ljava/lang/String;
'https://ssl.google-analytics.com/collect' used in: Lcom/google/analytics/tracking/android/ax;->a(Lcom/google/analytics/tracking/android/al;)Ljava/net/URL;
'https://www.pentestserver.com/mitm-success.html' used in: Lcom/zimperium/zanti/ZHttpInjector/a/c;->a(Ljava/lang/String; Lcom/zimperium/zanti/ZHttpInjector/q;)Ljava/lang/String;
'https://www.salesforce.com/servlet/servlet.WebToLead?encoding=UTF-8' used in: Lcom/zimperium/zanti/zipsadvert/d;->onClick(Landroid/view/View;)V
'https://www.salesforce.com/servlet/servlet.WebToLead?encoding=UTF-8' used in: Lcom/zimperium/zanti/av;->onClick(Landroid/view/View;)V
'https://www.zimperium.com/Terms_of_Use.pdf' used in: Lcom/zimperium/zanti/zcloud/ar;->onClick(Landroid/view/View;)V
'https://www.zimperium.com/Terms_of_Use.pdf' used in: Lcom/zimperium/zanti/zcloud/ax;->onClick(Landroid/view/View;)V
'https://www.zimperium.com/company.html#footer-contact' used in: Lcom/zimperium/zanti/l;->onClick(Landroid/content/DialogInterface; I)V
'https://www.zimperium.com/get-a-quote.php' used in: Lcom/zimperium/zanti/zcloud/ay;->onClick(Landroid/view/View;)V
'https://www.zimperium.com/store.php' used in: Lcom/zimperium/zanti/topbar/b;->onClick(Landroid/view/View;)V
'keepalive@jcraft.com' used in: Lcom/jcraft/jsch/Session;->()V
'www.zimperium.com' used in: Lcom/zimperium/zanti/Scanner/db/b;->run()V
'zlib@openssh.com' used in: Lcom/jcraft/jsch/Session;->initInflater(Ljava/lang/String;)V
'zlib@openssh.com' used in: Lcom/jcraft/jsch/JSch;->()V
'zlib@openssh.com' used in: Lcom/jcraft/jsch/Session;->initDeflater(Ljava/lang/String;)V

中危

检测到1处setSavePassword密码明文存储漏洞。

位置: classes.dex
com.zimperium.zanti.ZHttpInjector.fragments.log.AntiWebActivity;

webview的保存密码功能默认设置为true。Webview会明文保存网站上的密码到本地私有文件”databases/webview.db”中。对于可以被root的系统环境或者配合其他漏洞(如webview的同源绕过漏洞),攻击者可以获取到用户密码。
建议:显示设置webView.getSetting().setSavePassword(false)。

参考案例:
www.wooyun.org/bugs/wooyun-2010-021420
www.wooyun.org/bugs/wooyun-2013-020246

参考资料:
http://wolfeye.baidu.com/blog/
www.claudxiao.net/2013/03/android-webview-cache/

低危

检测到1个WebView系统隐藏接口未移除。

位置: classes.dex
com.zimperium.zanti.ZHttpInjector.fragments.log.AntiWebActivity;->onCreate(Landroid.os.Bundle;)V

android webview组件包含3个隐藏的系统接口:searchBoxJavaBridge_,accessibilityTraversal以及accessibility,恶意程序可以利用它们实现远程代码执行。
如果使用了WebView,那么使用WebView.removeJavascriptInterface(String name) API,显示的移除searchBoxJavaBridge_、accessibility、accessibilityTraversal这三个接口。

参考资料:
http://wolfeye.baidu.com/blog/android-webview/
http://blog.csdn.net/u013107656/article/details/51729398
http://wolfeye.baidu.com/blog/android-webview-cve-2014-7224/

低危

非debug包,需要通过打包平台proguard脚本,移除大部分系统输出代码。
经扫描该包仍存在大量系统输出代码,共发现19处系统输出代码.(此处扫描的系统输出代码,是指调用System.out.print*输出的,本应在打包平台移除的系统输出代码.)
各个bundle系统输出代码详情如下:

位置: classes.dex
com.jcraft.jsch.jcraft.Compression;
com.jcraft.jzlib.ZStream;
com.zimperium.zanti.httpserver.p;
com.jcraft.jsch.ChannelSftp;
com.jcraft.jsch.DHGEX;
com.jcraft.jsch.jce.MD5;
com.jcraft.jsch.HostKey;
com.jcraft.jsch.KeyExchange;
com.jcraft.jsch.KnownHosts$HashedHostKey;
jcifs.util.d;
com.jcraft.jsch.DHG1;
com.zimperium.zanti.ZHttpInjector.d;
com.jcraft.jsch.KeyPair;
com.jcraft.jsch.Session;
com.jcraft.jsch.jcraft.HMACMD5;
com.jcraft.jsch.KnownHosts;
com.jcraft.jsch.jcraft.HMACSHA1;
com.jcraft.jsch.jce.SHA1;
com.jcraft.jsch.ChannelDirectTCPIP;

警告

检测到5处addFlags使用Intent.FLAG_ACTIVITY_NEW_TASK。

位置: classes.dex
com.zimperium.zanti.ZHttpInjector.database.c;->run
org.acra.sender.a;->a
com.zimperium.zanti.ZHttpInjector.fragments.o;->a
com.zimperium.zips.k;->a
com.zimperium.zanti.af;->a

APP创建Intent传递数据到其他Activity,如果创建的Activity不是在同一个Task中打开,就很可能被其他的Activity劫持读取到Intent内容,跨Task的Activity通过Intent传递敏感信息是不安全的。建议:
尽量避免使用包含FLAG_ACTIVITY_NEW_TASK标志的Intent来传递敏感信息。

参考资料:
http://wolfeye.baidu.com/blog/intent-data-leak

警告

检测到10个导出的组件接收其他app的消息,这些组件会被其他app引用并导致dos攻击。

receiver com.zimperium.zanti.BootReceiver
receiver com.zimperium.zanti.CrackerPlugin.PluginAnnouncer
receiver com.zimperium.zanti.RouterPwnPlugin.PluginAnnouncer
receiver com.zimperium.zanti.zmitm.PluginAnnouncer
receiver com.zimperium.zanti.ztether.PluginAnnouncer
receiver com.zimperium.zanti.zetasploit.PluginAnnouncer
receiver com.zimperium.zanti.macchanger.PluginAnnouncer
receiver com.zimperium.zanti.heartbleedplugin.PluginAnnouncer
receiver com.zimperium.zanti.ShellShockPlugin.PluginAnnouncer
receiver com.zimperium.zanti.SSLPoodlePlugin.PluginAnnouncer

建议:
(1)最小化组件暴露。对不会参与跨应用调用的组件建议显示添加android:exported="false"属性。
(2)设置组件访问权限。对provider设置权限,同时将权限的protectionLevel设置为"signature"或"signatureOrSystem"。
(3)组件传输数据验证。对组件之间,特别是跨应用的组件之间的数据传入与返回做验证和增加异常处理,防止恶意调试数据传入,更要防止敏感数据返回。

参考案例:
http://www.wooyun.org/bugs/wooyun-2010-0169746
http://www.wooyun.org/bugs/wooyun-2010-0104965

参考资料:
http://jaq.alibaba.com/blog.htm?spm=0.0.0.0.Wz4OeC&id=55
《Android安全技术解密与防范》

警告

检测到1潜在的XSS漏洞。

位置: classes.dex
com.zimperium.zanti.ZHttpInjector.fragments.log.AntiWebActivity;->onCreate(Landroid.os.Bundle;)V

允许WebView执行JavaScript(setJavaScriptEnabled),有可能导致XSS攻击。建议尽量避免使用。
(1)API等于高高于17的Android系统。出于安全考虑,为了防止Java层的函数被随意调用,Google在4.2版本之后,规定允许被调用的函数必须以@JavascriptInterface进行注解。
(2)API等于高高于17的Android系统。建议不要使用addJavascriptInterface接口,以免带来不必要的安全隐患,如果一定要使用该接口,建议使用证书校验。
u(3)使用removeJavascriptInterface移除Android系统内部的默认内置接口:searchBoxJavaBridge_、accessibility、accessibilityTraversal。

参考案例:
www.wooyun.org/bugs/wooyun-2015-0140708
www.wooyun.org/bugs/wooyun-2016-0188252

参考资料:
http://jaq.alibaba.com/blog.htm?id=48
http://blog.nsfocus.net/android-webview-remote-code-execution-vulnerability-analysis

警告

检测到9处IvParameterSpec的使用。

位置: classes.dex
com.jcraft.jsch.jce.AES128CBC;->init(I [B [B)V
com.jcraft.jsch.jce.AES128CTR;->init(I [B [B)V
com.jcraft.jsch.jce.AES192CBC;->init(I [B [B)V
com.jcraft.jsch.jce.AES192CTR;->init(I [B [B)V
com.jcraft.jsch.jce.AES256CBC;->init(I [B [B)V
com.jcraft.jsch.jce.AES256CTR;->init(I [B [B)V
com.jcraft.jsch.jce.BlowfishCBC;->init(I [B [B)V
com.jcraft.jsch.jce.TripleDESCBC;->init(I [B [B)V
com.jcraft.jsch.jce.TripleDESCTR;->init(I [B [B)V

使用IVParameterSpec函数,如果使用了固定的初始化向量,那么密码文本可预测性高得多,容易受到字典攻击等。建议禁止使用常量初始化矢量构造IVParameterSpec,使用聚安全提供的安全组件。

参考资料:
http://drops.wooyun.org/tips/15870
https://developer.android.com/training/articles/keystore.html
http://wolfeye.baidu.com/blog/weak-encryption/
http://www.freebuf.com/articles/terminal/99868.html

警告

检测到6处socket通信。

位置: classes.dex
Lcom.zimperium.zanti.ZHttpInjector.f;->
Lcom.zimperium.zanti.zetasploit.ZetasploitService;->start_local_reverse_tcp_listener
Ljcifs.netbios.e;->run
Lcom.zimperium.zanti.zetasploit.ZetasploitService$2;->run
Lcom.zimperium.zanti.zetasploit.ZetasploitPayloadGenericShell;->handleIncomingSocket
Lcom.zimperium.zanti.httpserver.HttpServerService;->onStartCommand

Android应用通常使用PF_UNIX、PF_INET、PF_NETLINK等不同domain的socket来进行本地IPC或者远程网络通信,这些暴露的socket代表了潜在的本地或远程攻击面,历史上也出现过不少利用socket进行拒绝服务、root提权或者远程命令执行的案例特别是PF_INET类型的网络socket,可以通过网络与Android应用通信,其原本用于linux环境下开放网络服务,由于缺乏对网络调用者身份或者本地调用者id、permission等细粒度的安全检查机制,在实现不当的情况下,可以突破Android的沙箱限制,以被攻击应用的权限执行命令,通常出现比较严重的漏洞

参考案例:
http://www.wooyun.org/bugs/wooyun-2015-0148406
http://www.wooyun.org/bugs/wooyun-2015-0145365

参考资料:
http://wolfeye.baidu.com/blog/open-listen-port
http://blog.csdn.net/jltxgcy/article/details/50686858
https://www.bigniu.com/article/view/10
http://drops.wooyun.org/mobile/6973

警告

检测到14处使用了加解密算法。密钥处理不当可能会导致信息泄露。

位置: classes.dex
com.jcraft.jsch.jce.AES192CTR;->init(I [B [B)V
com.jcraft.jsch.jce.HMACMD596;->init([B)V
com.jcraft.jsch.jce.ARCFOUR256;->init(I [B [B)V
com.jcraft.jsch.jce.HMACMD5;->init([B)V
com.jcraft.jsch.jce.AES256CTR;->init(I [B [B)V
com.jcraft.jsch.jce.AES128CBC;->init(I [B [B)V
com.jcraft.jsch.jce.HMACSHA1;->init([B)V
com.jcraft.jsch.jce.AES128CTR;->init(I [B [B)V
com.jcraft.jsch.jce.AES256CBC;->init(I [B [B)V
com.jcraft.jsch.jce.BlowfishCBC;->init(I [B [B)V
com.jcraft.jsch.jce.ARCFOUR;->init(I [B [B)V
com.jcraft.jsch.jce.ARCFOUR128;->init(I [B [B)V
com.jcraft.jsch.jce.HMACSHA196;->init([B)V
com.jcraft.jsch.jce.AES192CBC;->init(I [B [B)V

参考案例:
http://www.wooyun.org/bugs/wooyun-2010-0105766
http://www.wooyun.org/bugs/wooyun-2015-0162907
http://www.wooyun.org/bugs/wooyun-2010-0187287

参考资料:
http://drops.wooyun.org/tips/15870
https://developer.android.com/training/articles/keystore.html


动态扫描发现风险点

风险等级 风险名称

服务端分析

风险等级 风险名称

警告

检测到?处XSS漏洞。
开发中...

警告

检测到?处XSS跨站漏洞。
开发中...

应用证书