在线时间:8:00-16:00
迪恩网络APP
随时随地掌握行业动态
扫描二维码
关注迪恩网络微信公众号
开源软件名称(OpenSource Name):WithSecureLabs/drozer开源软件地址(OpenSource Url):https://github.com/WithSecureLabs/drozer开源编程语言(OpenSource Language):Python 93.9%开源软件介绍(OpenSource Introduction):drozer----------------------------------------------------------------NOTEWe would like to formally announce that F-Secure has stopped further development of the drozer tool. With the amount of testing tools and techniques that have been developed since drozer's inception, it would be near impossible to incorporate everything into one tool. However, we still think drozer is a good tool for simulating a rogue application. A penetration tester does not have to develop an app with custom code to interface with a specific content provider. Instead, drozer can be used with little to no programming experience required to show the impact of letting certain components be exported on a device. To help with making sure drozer can be ran on modern systems, a Docker container was created that has a working build of Drozer.
----------------------------------------------------------------drozer (formerly Mercury) is the leading security testing framework for Android. drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoints and the underlying OS. drozer provides tools to help you use, share and understand public Android exploits. It helps you to deploy a drozer Agent to a device through exploitation or social engineering. Using weasel (MWR's advanced exploitation payload) drozer is able to maximise the permissions available to it by installing a full agent, injecting a limited agent into a running process, or connecting a reverse shell to act as a Remote Access Tool (RAT). drozer is open source software, maintained by MWR InfoSecurity, and can be downloaded from: https://labs.f-secure.com/tools/drozer/ Build StatusLinux / OSXDevelop:Master:WindowsPrerequisitesNote: On Windows please ensure that the path to the Python installation and the Scripts folder under the Python installation are added to the PATH environment variable. Note: On Windows please ensure that the path to javac.exe is added to the PATH environment variable. InstallingBuilding Python wheel
Installing Python wheel
Building for Debian/Ubuntu/Mint
Installing .deb (Debian/Ubuntu/Mint)
Building for Redhat/Fedora/CentOS
Installing .rpm (Redhat/Fedora/CentOS)
Building for WindowsNOTE: Windows Defender and other Antivirus software will flag drozer as malware (an exploitation tool without exploit code wouldn't be much fun!). In order to run drozer you would have to add an exception to Windows Defender and any antivirus software. Alternatively, we recommend running drozer in a Windows/Linux VM.
Installing .msi (Windows)
Installing (Arch Linux/BlackArch)On BlackArch or any Arch-based linux distribution where BlackArch repository was enabled:
Installing (Arch Linux/AUR)With any pacman wrapper:
PKGBUILD (WARNING: out-of-date) UsageInstalling the AgentDrozer can be installed using Android Debug Bridge (adb). Download the latest Drozer Agent here.
Starting a SessionYou should now have the drozer Console installed on your PC, and the Agent running on your test device. Now, you need to connect the two and you’re ready to start exploring. We will use the server embedded in the drozer Agent to do this. If using the Android emulator, you need to set up a suitable port forward so that your PC can connect to a TCP socket opened by the Agent inside the emulator, or on the device. By default, drozer uses port 31415:
Now, launch the Agent, select the “Embedded Server” option and tap “Enable” to start the server. You should see a notification that the server has started. Then, on your PC, connect using the drozer Console: On Linux:
On Windows:
If using a real device, the IP address of the device on the network must be specified: On Linux:
On Windows:
You should be presented with a drozer command prompt:
The prompt confirms the Android ID of the device you have connected to, along with the manufacturer, model and Android software version. You are now ready to start exploring the device. Command Reference
Licensedrozer is released under a 3-clause BSD License. See LICENSE for full details. Contacting the Projectdrozer is Open Source software, made great by contributions from the community. For full source code, to report bugs, suggest features and contribute patches please see our Github project: https://github.com/FSecureLABS/drozer Bug reports, feature requests, comments and questions can be submitted here. |
2023-10-27
2022-08-15
2022-08-17
2022-09-23
2022-08-13
请发表评论