Lect_14 - Deekshith19/Android_Security GitHub Wiki

Lecture 14 Androwarn

Androwarn is a tool designed to help in the analysis of Android applications by generating analysis reports. It detects potential security issues and vulnerabilities in Android APK files. Here are the steps to use Androwarn for Android malware analysis:

Step 1: Install Dependencies Androwarn requires certain dependencies to be installed. Ensure you have Python installed, and then install the necessary Python packages.

Install Python version 3.7.1

Activate Python Virtual Environemnt

. ./venv/bin/activate

Step 2: Download Androwarn Download the Androwarn tool from its official GitHub repository.

 git clone https://github.com/maaaaz/androwarn.git
cd androwarn

Install all required packages from requirement.txt

pip install requirement.txt

Step 3: Manually Install Androguard

Step 4: Run Androwarn

 python androwarn.py -i diva-beta.apk -r html -v 3

Execute Androwarn to analyze the APK file. diva-beta.apk with the path to your APK file.

Step 5: Review the Output

Androwarn will generate a detailed report based on the analysis of the APK file. This report will highlight various aspects such as potential security issues, suspicious behaviors, and other vulnerabilities.

WhatsApp Image 2024-06-09 at 16 24 19_9612217f

Step 6: Interpret the Results

Examine the report to understand the potential threats and vulnerabilities present in the APK file. The report will categorize findings and provide insights into what the APK might be doing.