Android static code analyzer
Project description
Quick Android Review Kit
This tool is designed to look for several security related Android application vulnerabilities, either in source code or packaged APKs. The tool is also capable of creating “Proof-of-Concept” deployable APKs and/or ADB commands, capable of exploiting many of the vulnerabilities it finds. There is no need to root the test device, as this tool focuses on vulnerabilities that can be exploited under otherwise secure conditions.
Requirements
Tested on Python 2.7.13 and 3.6 Tested on OSX, Linux, and Windows
Usage
For more options please see the --help command.
APK:
~ qark --apk path/to/my.apk
Java source code files:
~ qark --java path/to/parent/java/folder ~ qark --java path/to/specific/java/file.java
Results
A report is generated in JSON and can be built into other format types, to change the report type please use the --report-type flag.
Installation
With pip (no security checks on requirements):
~ pip install --user qark # --user is only needed if not using a virtualenv ~ qark --help
With requirements.txt (security checks on requirements):
~ git clone https://github.com/linkedin/qark ~ cd qark ~ pip install -r requirements.txt ~ pip install . --user # --user is only needed if not using a virtualenv ~ qark --help
Exploit APK
QARK can generate a basic exploit APK for a few of the vulnerabilities that have been found.
To generate the exploit APK there are a few steps to follow. You need to have the Android SDK v21 and build-tools v21.1.2
Install the android SDK, you can get it under the ‘command line tools’: https://developer.android.com/studio/#downloads
Unzip the android SDK
Go into the new directory and generate the licenses with bin/sdkmanager –licenses
Make sure the generated licenses are in the android SDK directory.
Install the SDK and the proper build-tools version: bin/sdkmanager –install “platforms;android-21” “sources;android-21” “build-tools;21.1.2”
Checks
QARK is an easy to use tool capable of finding common security vulnerabilities in Android applications. Unlike commercial products, it is 100% free to use. QARK features educational information allowing security reviewers to locate precise, in-depth explanations of the vulnerabilities. QARK automates the use of multiple decompilers, leveraging their combined outputs, to produce superior results, when decompiling APKs. Finally, the major advantage QARK has over traditional tools, that just point you to possible vulnerabilities, is that it can produce ADB commands, or even fully functional APKs, that turn hypothetical vulnerabilities into working “POC” exploits.
Included in the types of security vulnerabilities this tool attempts to find are:
Inadvertently exported components
Improperly protected exported components
Intents which are vulnerable to interception or eavesdropping
Improper x.509 certificate validation
Creation of world-readable or world-writeable files
Activities which may leak data
The use of Sticky Intents
Insecurely created Pending Intents
Sending of insecure Broadcast Intents
Private keys embedded in the source
Weak or improper cryptography use
Potentially exploitable WebView configurations
Exported Preference Activities
Tapjacking
Apps which enable backups
Apps which are debuggable
Apps supporting outdated API versions, with known vulnerabilities
Notice
Note: QARK decompiles Android applications back to raw source code. Please do not use this tool if this may be considered illegal in your juristdiction. If you are unsure, seek legal counsel.
If you run into issues on OSX, especially relating to the outbound call to the Play Store, or the downloading of the SDK, it is likely due to your Python/OpenSSL configuration and the fact that recent changes in OSX impacted Python installed via brew. Nuking your Python installation(s) and re-installing from source may fix your issues.
License
Copyright 2015 LinkedIn Corp. All rights reserved.
Copyright 2015 LinkedIn Corp. Licensed under the Apache License, Version 2.0 (the “License”); you may not use this file except in compliance with the License.
You may obtain a copy of the License here. Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file qark-4.0.0.tar.gz
.
File metadata
- Download URL: qark-4.0.0.tar.gz
- Upload date:
- Size: 15.5 MB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.20.1 setuptools/40.5.0 requests-toolbelt/0.8.0 tqdm/4.28.1 CPython/3.7.0
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 95815ec5b1106543899c4a7f9711783c322a538190ced7cf526dcf4f651f482c |
|
MD5 | 051e7793760f203536935eef5d9363dd |
|
BLAKE2b-256 | e8340ac367a5ac1bccb70d81c828792def3e6dfcc203dab567f991a326ea8dee |
File details
Details for the file qark-4.0.0-py2.py3-none-any.whl
.
File metadata
- Download URL: qark-4.0.0-py2.py3-none-any.whl
- Upload date:
- Size: 15.7 MB
- Tags: Python 2, Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.20.1 setuptools/40.5.0 requests-toolbelt/0.8.0 tqdm/4.28.1 CPython/3.7.0
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | acebf1d00880a6665caefa96dff43cf4c8fcb392b6ad6cafc91908e615bfbe48 |
|
MD5 | bd2905badd955b98949537a80f52750a |
|
BLAKE2b-256 | c052faaf62bf968bc759dd63027b3fb3edf5e34518562fddfb42e868e18b5da7 |