Skip to content

Commit

Permalink
Usage for MobSF_Service (#18)
Browse files Browse the repository at this point in the history
* added usage for Androguard analyzer

* added NIST CVE analyzer details

* added mobsf_service usage

---------

Co-authored-by: spoiicy <[email protected]>
  • Loading branch information
spoiicy and spoiicy authored Dec 19, 2024
1 parent 287567f commit 822b801
Show file tree
Hide file tree
Showing 2 changed files with 9 additions and 0 deletions.
8 changes: 8 additions & 0 deletions docs/IntelOwl/advanced_usage.md
Original file line number Diff line number Diff line change
Expand Up @@ -260,6 +260,14 @@ Some analyzers could require a special configuration:
- `waiting_time`: Determines the waiting time for the page to load during the scan (in seconds).
- `private_scan`: When set to `true`, the scan results will not be shared with other `urlDNA.io` users.
- `scanned_from`: Allows selecting the country of origin for the scan using a two-letter country code (ISO 3166-1 alpha-2). This feature is available only to `urlDNA.io` Premium Users.
- `MobSF_Service`:
- The `MobSF_Service` analyzer offers various configurable parameters to optimize the automated scanning of the application as per one's requirement.
- `enable_dynamic_analysis`: Set to `True` to enable dynamic analysis though this will increase the scan time.
- `timeout`: Request timeout for each API call, configure as per your need. Default value is 30 seconds.
- `default_hooks`: Default hooks to pass to mobsf e.g root_bypass, ssl_pinning_bypass, etc.
- `auxiliary_hooks`: Auxiliary frida hooks to pass to mobsf.
- `frida_code`: Custom Frida code to be executed by mobsf
- `activity_duration`: Wait time period for mobsf to collect sufficient info from dynamic activities such as results from`frida_code` before generating report. Default value is 60 seconds. Configure as per your requirements.

## Notifications

Expand Down
1 change: 1 addition & 0 deletions docs/IntelOwl/usage.md
Original file line number Diff line number Diff line change
Expand Up @@ -116,6 +116,7 @@ The following is the list of the available analyzers you can run out-of-the-box.
- `Mobsf`: [MobSF](https://github.com/MobSF/mobsfscan/) is a static analysis tool that can find insecure code patterns in your Android and iOS source code. Supports Java, Kotlin, Android XML, Swift and Objective C Code.
- `DroidLysis`: [DroidLysis](https://github.com/cryptax/droidlysis) is a pre-analysis tool for Android apps: it performs repetitive and boring tasks we'd typically do at the beginning of any reverse engineering. It disassembles the Android sample, organizes output in directories, and searches for suspicious spots in the code to look at. The output helps the reverse engineer speed up the first few steps of analysis.
- `Artifacts`: [Artifacts](https://github.com/guelfoweb/artifacts) is a tool that does APK strings analysis. Useful for first analysis.
- `MobSF_Service`: [MobSF_Service](https://github.com/MobSF/Mobile-Security-Framework-MobSF) can be used for a variety of use cases such as mobile application security, penetration testing, malware analysis, and privacy analysis.

###### External services

Expand Down

0 comments on commit 822b801

Please sign in to comment.