Android: checking and analyzing executable files and other thoughts about it | Verification, analysis and other research APK, DEX, ODEX, JAR, etc.



Rep: (589)


Due to the continuing increase in the number of malware for Android and, accordingly, affected and suffering users, the complexity of the study of executable files, the already overgrown topicSecurity, I consider it an urgent need to create a topic devoted exclusively to the problems of checking, analyzing and researching executable files (primarily, of course, in the form of an APK).
So, I hope there are not only forum users who will post different APKs for analysis, but also those who can help with their analysis.
Theories of analysis, etc. here, too, will be happy.
P.S. If someone is ready to take on the filling and maintaining the caps on an ongoing basis, I will help translate the topic into my name.

Software
Advanced permission manager- removal of permissions from apk (closed source)
Android Permissions- shows the list of permissions of installed applications (open source)
APK-Info- View APK information on Windows (open source)
Apk analyzer- allows you to explore applications on the device, providing a detailed report not only about installed programs, but also about uninstalled apk files
APK Editor- view and edit apk-files
APK Permission Remover- removal of permissions from apk (closed source)
ApkCrack (AETool)- tool for editing apk-files
Apktool- decompilation, recompilation, application signature
App Detective- gives the most complete array of various data on the installed APK, including their contents and online analysis
App Settings- Xposed-module for fine-tuning applications, including permission management (open source)
AppBrain Ad Detector- identification of potential problems of all applications installed on the device
Donkeyguard- Xposed-module allows you to block access of applications to personal data (open source)
Exodus privacy- checking applications for privacy leaks (open source)
Inspeckage- Xposed-module for dynamic analysis of installed applications (open source)
Island- execution of applications in the sandbox (closed source)
LuckyPatcher by ChelpuS- application manager
Mobile Security Framework- a platform for testing mobile applications (Android / iOS / Windows), fully automated and capable of performing static and dynamic data analysis, identifying potential problems of all applications installed on the device (open source)
MT Manager- editing, translating, cloning, encrypting, signing and optimizing user and system (without installing frameworks) apk-files
My Android Tools- disable / enable activity, service, receiver, provider for any applications
Protect My Privacy- Xposed module for managing application permissions (closed source)
UserControl- execution of applications in the sandbox (closed source)
VirtualXposed- execution of applications in the sandbox with partial support for Xposed (open source)
Xprivacy- Xposed-module that allows you to prevent the leakage of your personal data through the application, control it or replace it to choose from (open source)
XPrivacyLua- Xposed-module for Marshmallow +, which allows you to prevent the leakage of your personal data through applications, control it or replace it with a choice (open source)


There is no curator in the subject. For questions about filling the caps, please contact the section moderators via the buttonPictureunder the messages or toVehicle in QMS. How to do it right, what would you understand the first time, it is written here .

Post has been editedokouser - 21.07.18, 14:25



Rep: (589)

For a hat (just in case).


Post has been editedferhad.necef - 16.05.18, 13:37



Rep: (158)
* okouser, You don’t want to do it yourself ..
You are welcome:
Hotspot Shield:
Running
Autostart
Name: Hotspot Shield
Packagename: hotspotshield.android.vpn
Version: 5.7.9 (57900)

Install date: Sep 5, 2017 6:56:04 AM
Last update: Sep 5, 2017 6:56:04 AM

User ID: 10020
Process name: hotspotshield.android.vpn

APK:
"/data/app/hotspotshield.android.vpn-1/base.apk"

Base code path:
"/data/app/hotspotshield.android.vpn-1"

Public data dir (s):
"/storage/sdcard0/Android/data/hotspotshield.android.vpn"

Private data dir (s):
"/data/data/hotspotshield.android.vpn"

Obb dir (s):

Size ~ 11.76MB

Permissions:
android.permission.ACCESS_WIFI_STATE
android.permission.RECEIVE_BOOT_COMPLETED
android.permission.INTERNET
android.permission.ACCESS_NETWORK_STATE
android.permission.GET_TASKS
android.permission.REAL_GET_TASKS
android.permission.PACKAGE_USAGE_STATS
android.permission.READ_PHONE_STATE
android.permission.WRITE_EXTERNAL_STORAGE
android.permission.READ_EXTERNAL_STORAGE
com.android.vending.BILLING
com.google.android.c2dm.permission.RECEIVE
android.permission.CHANGE_WIFI_STATE
hotspotshield.android.vpn.permission.C2D_MESSAGE

Services:
com.anchorfree.hotspotshield.appmonitor.AppMonitorService
com.anchorfree.hotspotshield.ads.PresentationService
com.anchorfree.hotspotshield.tracking.TrackerForwardingService
com.anchorfree.hotspotshield.firebase.MessagingService
com.anchorfree.hotspotshield.firebase.InstanceIdService
com.anchorfree.hydrasdk.vpnservice.HydraVpnService
com.anchorfree.hydrasdk.vpnservice.RemoteControlService
com.google.firebase.messaging.FirebaseMessagingService
com.cmcm.cheetahnewlocker.newslockerlib.service.LockerService
com.cmcm.cheetahnewlocker.newslockerlib.service.AssistService
com.cmcm.cheetahnewlocker.newslockerlib.service.NotificationService
com.cmcm.newssdk.service.LocalServiceSdk
com.cmcm.adsdk.report.ReportService
com.cleanmaster.base.crash.CrashReportService
com.cmcm.orion.picks.init.DownloadService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.google.firebase.iid.FirebaseInstanceIdService

Activities:
com.anchorfree.hotspotshield.ui.activity.MainActivity
com.anchorfree.hotspotshield.tracking.QuantTrackActivity
com.google.android.gms.ads.AdActivity
com.anchorfree.hotspotshield.ui.activity.WebViewAdActivity
com.vungle.publisher.VideoFullScreenAdActivity
com.vungle.publisher.MraidFullScreenAdActivity
com.facebook.ads.AudienceNetworkActivity
com.cmcm.cheetahnewlocker.newslockerlib.ui.NewsLockerActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.mopub.mobileads.RewardedMraidActivity
com.anchorfree.hydrasdk.vpnservice.StartVPNServiceShadowActivity
com.anchorfree.lockscreenlib.lock.ui.BatteryUsageActivity
com.anchorfree.lockscreenlib.lock.ui.BandwidthActivity
com.anchorfree.lockscreenlib.lock.ui.SecurityActivity
com.anchorfree.lockscreenlib.lock.ui.SpeedActivity
com.anchorfree.lockscreenlib.lock.ui.LockActivity
com.inneractive.api.ads.sdk.InneractiveInternalBrowserActivity
com.inneractive.api.ads.sdk.InneractiveInterstitialAdActivity
com.inneractive.api.ads.sdk.InneractiveRichMediaVideoPlayerActivity
com.quantcast.measurement.service.AboutQuantcastScreen
com.cmcm.orion.picks.impl.BrandScreenDetailVideoActivity
com.cmcm.orion.picks.impl.BrandScreenDetailImageActivity
com.cmcm.orion.picks.impl.BrandScreenCardVideoActivity
com.cmcm.cheetahnewlocker.newslockerlib.ui.NewsLockerSettingActivity
com.cmcm.android.cheetahnewslocker.cardviewnews.ui.CardNewsSplashActivity
com.cmcm.newssdk.ui.image.GalleryActivity
com.cmcm.newssdk.ui.NewsOnePageDetailActivity
com.cmcm.newssdk.ui.NewsWebViewDetailActivity
com.cmcm.newssdk.ui.NewsSdkAltasActivity
com.cmcm.orion.picks.PicksLoadingActivity
com.cmcm.orion.utils.internal.PicksTransparentActivity
com.cmcm.orion.picks.webview.PicksBrowser
com.cmcm.orion.picks.impl.PicksInterstitialActivity
com.cmcm.orion.picks.impl.FullScreenVideoActivity
com.cmcm.orion.picks.impl.BrandFeedDetailVideoActivity
com.cmcm.orion.picks.impl.BrandFeedDetailImageActivity
com.cmcm.orion.picks.impl.BrandFeedItemVideoActivity
com.cmcm.orion.picks.impl.BrandPGVideoActivity
com.cmcm.orion.picks.impl.IncentiveVideoPlayActivity
com.cmcm.orion.picks.impl.VideoAdDetailActivity
com.cmcm.orion.picks.api.NotiActivity
com.google.android.gms.common.api.GoogleApiActivity

Kernel user ids:
3003, 1028, 1015, 1023,

Providers:
com.anchorfree.hydrasdk.store.DBProvider
net.grandcentrix.tray.provider.TrayContentProvider
com.cmcm.newssdk.onews.storage.ONewsProvider
com.google.firebase.provider.FirebaseInitProvider

Receivers:
com.anchorfree.hotspotshield.vpn.BootCompleteReceiver
com.anchorfree.hotspotshield.vpn.VpnControlCommandReceiver
com.anchorfree.hotspotshield.firebase.PushNotificationReceiver
com.adjust.sdk.AdjustReferrerReceiver
com.quantcast.measurement.service.QCReferrerReceiver
com.ironz.binaryprefs.dump.DumpReceiver
com.cmcm.android.cheetahnewslocker.cardviewnews.ui.receiver.LanguageChangeReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.google.firebase.iid.FirebaseInstanceIdInternalReceiver

God save and save from this!


Post has been editedxynta123 - 09.09.17, 05:02



Rep: (158)
her, we have full ferstein!

Thinking about cloning a SIM card - promises a lot of bonuses!

on a tip from uvigorl4146a new one or a clone appeared®App Ops - Permission manager.. she looked - it’s full of harmful elements, I don’t want this .. well, see for yourself what's good .. didn’t put it, just looked .. 2 screenshots - 2 versions
Attached Image

Attached Image
.. internet-active - is)


Post has been editedxynta123 - 09.09.17, 05:01



Rep: (2579)
Wernow @ 01/29/18, 13:55*
And receivers with the provider are redundant to her.
Attached Image
Attached Image
<? xml version = "1.0" encoding = "utf-8"?>
<manifest xmlns: android = "http://schemas.android.com/apk/res/android" android: installLocation = "auto" android: versionCode = "157" android: versionName = "3.2.4" package = "com. simplemobiletools.gallery ">
<uses-sdk android: minSdkVersion = "16" android: targetSdkVersion = "27" />
<uses-permission android: name = "android.permission.WRITE_EXTERNAL_STORAGE" />
<uses-permission android: name = "android.permission.SET_WALLPAPER" />
<uses-permission android: name = "android.permission.USE_FINGERPRINT" />
<application android: allowBackup = "true" android: icon = "@ mipmap / ic_launcher" android: label = "@ string / app_launcher_name" android: name = "com.simplemobiletools.gallery.App" android: roundIcon = "@ mipmap / ic_launcher "android: supportsRtl =" true "android: theme =" @ style / AppTheme ">
<activity android: name = "com.simplemobiletools.gallery.activities.SplashActivity" android: theme = "@ style / SplashTheme">
<intent-filter>
<action android: name = "android.intent.action.MAIN" />
<category android: name = "android.intent.category.LAUNCHER" />
</ intent-filter>
</ activity>
<activity android: name = "com.simplemobiletools.gallery.activities.MainActivity" android: resizeableActivity = "true">
<intent-filter>
<action android: name = "android.intent.action.PICK" />
<category android: name = "android.intent.category.DEFAULT" />
<data android: mimeType = "image / *" />
<data android: mimeType = "video / *" />
<data android: mimeType = "vnd.android.cursor.dir / image" />
<data android: mimeType = "vnd.android.cursor.dir / video" />
</ intent-filter>
<intent-filter>
<action android: name = "android.intent.action.GET_CONTENT" />
<category android: name = "android.intent.category.OPENABLE" />
<category android: name = "android.intent.category.DEFAULT" />
<data android: mimeType = "image / *" />
<data android: mimeType = "video / *" />
<data android: mimeType = "vnd.android.cursor.dir / image" />
<data android: mimeType = "vnd.android.cursor.dir / video" />
</ intent-filter>
</ activity>
<activity android: name = "com.simplemobiletools.gallery.activities.MediaActivity" android: parentActivityName = "com.simplemobiletools.gallery.activities.MainActivity">
<meta-data android: name = "android.app.default_searchable" android: resource = "@ xml / searchable" />
<intent-filter>
<action android: name = "android.intent.action.SEARCH" />
</ intent-filter>
</ activity>
<activity android: configChanges = "keyboardHidden | orientation | screenSize" android: name = "com.simplemobiletools.gallery.activities.ViewPagerActivity" android: parentActivityName = "com.simplemobiletools.gallery.activities.MediaActivity">
<intent-filter>
<action android: name = "com.android.camera.action.REVIEW" />
<category android: name = "android.intent.category.BROWSABLE" />
<category android: name = "android.intent.category.DEFAULT" />
<data android: mimeType = "image / *" />
<data android: mimeType = "video / *" />
</ intent-filter>
</ activity>
<activity android: label = "@ string / about" android: name = "com.simplemobiletools.commons.activities.AboutActivity" android: parentActivityName = "com.simplemobiletools.gallery.activities.MainActivity" />
<activity android: label = "@ string / third_party_licences" android: name = "com.simplemobiletools.commons.activities.LicenseActivity" android: parentActivityName = "com.simplemobiletools.commons.activities.AboutActivity" />
<activity android: label = "@ string / customize_colors" android: name = "com.simplemobiletools.commons.activities.CustomizationActivity" android: parentActivityName = "com.simplemobiletools.gallery.activities.SettingsActivity" />
<activity android: label = "@ string / settings" android: name = "com.simplemobiletools.gallery.activities.SettingsActivity" android: parentActivityName = "com.simplemobiletools.gallery.activities.MainActivity" />
<activity android: configChanges = "keyboardHidden | orientation | screenSize" android: name = "com.simplemobiletools.gallery.activities.PhotoVideoActivity" />
<activity android: label = "@ string / include_folders" android: name = "com.simplemobiletools.gallery.activities.IncludedFoldersActivity" android: parentActivityName = "com.simplemobiletools.gallery.activities.SettingsActivity" />
<activity android: label = "@ string / excluded_folders" android: name = "com.simplemobiletools.gallery.activities.ExcludedFoldersActivity" android: parentActivityName = "com.simplemobiletools.gallery.activities.SettingsActivity" />
<activity android: label = "@ string / hidden_folders" android: name = "com.simplemobiletools.gallery.activities.HiddenFoldersActivity" android: parentActivityName = "com.simplemobiletools.gallery.activities.SettingsActivity" />
<activity android: configChanges = "keyboardHidden | orientation | screenSize" android: name = "com.simplemobiletools.gallery.activities.PhotoActivity">
<intent-filter>
<action android: name = "android.intent.action.VIEW" />
<category android: name = "android.intent.category.BROWSABLE" />
<category android: name = "android.intent.category.DEFAULT" />
<data android: mimeType = "image / *" />
</ intent-filter>
</ activity>
<activity android: configChanges = "keyboardHidden | orientation | screenSize" android: name = "com.simplemobiletools.gallery.activities.VideoActivity">
<intent-filter>
<action android: name = "android.intent.action.VIEW" />
<category android: name = "android.intent.category.BROWSABLE" />
<category android: name = "android.intent.category.DEFAULT" />
<data android: mimeType = "video / *" />
</ intent-filter>
</ activity>
<activity android: label = "@ string / editor" android: name = "com.simplemobiletools.gallery.activities.EditActivity">
<intent-filter>
<action android: name = "android.intent.action.EDIT" />
<category android: name = "android.intent.category.DEFAULT" />
<data android: mimeType = "image / *" />
</ intent-filter>
<intent-filter>
<action android: name = "com.android.camera.action.CROP" />
<data android: scheme = "content" />
<data android: scheme = "file" />
<data android: mimeType = "image / *" />
<category android: name = "android.intent.category.DEFAULT" />
<category android: name = "android.intent.category.ALTERNATIVE" />
<category android: name = "android.intent.category.SELECTED_ALTERNATIVE" />
</ intent-filter>
</ activity>
<activity android: label = "@ string / simple_wallpaper" android: name = "com.simplemobiletools.gallery.activities.SetWallpaperActivity">
<intent-filter>
<action android: name = "android.intent.action.ATTACH_DATA" />
<category android: name = "android.intent.category.DEFAULT" />
<data android: mimeType = "image / *" />
</ intent-filter>
<intent-filter>
<action android: name = "android.intent.action.SET_WALLPAPER" />
<category android: name = "android.intent.category.DEFAULT" />
</ intent-filter>
</ activity>
<provider android: authorities = "com.simplemobiletools.gallery.provider" android: exported = "false" android: grantUriPermissions = "true" android: name = "android.support.v4.content.FileProvider">
<meta-data android: name = "android.support.FILE_PROVIDER_PATHS" android: resource = "@ xml / provider_paths" />
</ provider>
<receiver android: exported = "true" android: name = "com.simplemobiletools.gallery.receivers.InstallReceiver">
<intent-filter>
<action android: name = "com.android.vending.INSTALL_REFERRER" />
</ intent-filter>
</ receiver>
<receiver android: exported = "true" android: name = "com.simplemobiletools.commons.receivers.SharedThemeReceiver">
<intent-filter>
<action android: name = "com.simplemobiletools.commons.SHARED_THEME_ACTIVATED" />
<action android: name = "com.simplemobiletools.commons.SHARED_THEME_UPDATED" />
</ intent-filter>
</ receiver>
</ application>
</ manifest>



Rep: (158)
.. Yes, and the permissions of each launcher will be worn out.
then there is a less costly option: "comparative analysis":
for example, by the number of lines of the manifesto:
framework-res 686 lines (Google shows only 6 pieces to the naked eye, and there are half a thousand of them: D, and in this situation, I begin to suspect that I probably should not dream of any security / anonymity! It's time to go to the stove ..
Settings 1362
phone aka TeleService 410
Well, etc. - this is a "bad" apk with a bunch of "bad" requests

and if somewhere in the range of 100-150 lines - it will no longer be worse, definitely better)

oh, I have to marvel for the sake of curiosity, how many lines are in the most important gaps .. I just forgot which of them is more important .. well, I'll take someone thicker then, for example GmsCore

burned nafik 10% while unpacked -GmsCore Manifest: 3211 lines of all kinds of Threats and Malicious !, 244 Kb : rofl:

<uses-permission android: name = "android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" />
<uses-permission android: name = "android.permission.DISABLE_KEYGUARD" />
<uses-permission android: name = "android.permission.CALL_PHONE" />
<uses-permission android: name = "android.permission.CALL_PRIVILEGED" />
<uses-permission android: name = "android.permission.READ_CALL_LOG" />
<uses-permission android: name = "android.permission.READ_SMS" />
<uses-permission android: name = "android.permission.READ_CONTACTS" />
<uses-permission android: name = "android.permission.READ_FRAME_BUFFER" />
"android.permission.WRITE_SECURE_SETTINGS"
.... HORROR! .. again "America" ​​opened) actually - opened: I didn’t even suspect that there was such a rich Google library, novels and novels .. but I won’t read: Burn them with all the bright flame, the demonic waste paper!

for comparison: A.N. Strugackiy, B.N. Strugackiy - Piknik na Obochine.txt 307 Kb, 1,536 lines


Post has been editedxynta123 - 23.02.18, 01:14



Rep: (158)
Express analysis by xynta123
ContactsVCF.apk

so what do I have when the advertised ContactsVCF blew into the tube, or rather, who has whom?
IMHO - They have me, my Contacts and the animal, which has already staggered and is still only thanks to the guard!
Here are the permissions for the hamster during installation:
Attached Image

and here is Manifest.xml with all the other "goodies" and "bonuses":
<? xml version = "1.0" encoding = "utf-8"?>
<manifest xmlns: android = "http://schemas.android.com/apk/res/android" android: installLocation = "auto" android: versionCode = "52" android: versionName = "3.3.52" package = "by. androld.contactsvcf "platformBuildVersionCode =" 23 "platformBuildVersionName =" 6.0-2438415 ">
<uses-sdk android: minSdkVersion = "14" android: targetSdkVersion = "25" />
<uses-feature android: name = "android.hardware.telephony" android: required = "false" />
<uses-permission android: name = "android.permission.CALL_PHONE" />
<uses-permission android: name = "android.permission.WRITE_EXTERNAL_STORAGE" />
<uses-permission android: name = "android.permission.READ_CONTACTS" />
<uses-permission android: name = "android.permission.ACCESS_NETWORK_STATE" />
<uses-permission android: name = "android.permission.INTERNET" />
<uses-permission android: name = "com.android.vending.BILLING" />
<uses-permission android: name = "android.permission.WRITE_CONTACTS" />
<uses-permission android: name = "android.permission.GET_ACCOUNTS" />
<uses-permission android: name = "android.permission.WAKE_LOCK" />
<uses-permission android: name = "com.google.android.c2dm.permission.RECEIVE" />
<permission android: name = "by.androld.contactsvcf.permission.C2D_MESSAGE" android: protectionLevel = "signature" />
<uses-permission android: name = "by.androld.contactsvcf.permission.C2D_MESSAGE" />
<meta-data android: name = "android.support.VERSION" android: value = "25.3.1" />
<application android: description = "@ string / titlee" android: icon = "@ mipmap / ic_launcher" android: label = "@ string / app_name" android: name = "by.androld.contactsvcf.App" android: supportsRtl = "true "android: theme =" @ style / AppTheme ">
<meta-data android: name = "android.max_aspect" android: value = "2.1" />
<activity android: icon = "@ mipmap / ic_launcher" android: label = "@ string / app_name" android: launchMode = "singleTask" android: name = "by.androld.contactsvcf.MainActivity" android: theme = "@ style / LauncherTheme "android: windowSoftInputMode =" adjustNothing ">
<intent-filter>
<action android: name = "android.intent.action.MAIN" />
<category android: name = "android.intent.category.LAUNCHER" />
</ intent-filter>
</ activity>
<activity android: configChanges = "keyboard | keyboardHidden | orientation | screenSize" android: name = "by.androld.contactsvcf.ErrorActivity" android: windowSoftInputMode = "stateAlwaysHidden" />
<activity android: name = "by.androld.contactsvcf.EditActivity" android: windowSoftInputMode = "stateHidden" />
<activity android: label = "@ string / title_activity_settings" android: name = "by.androld.contactsvcf.SettingsActivity" />
<activity android: label = "@ string / help" android: name = "by.androld.contactsvcf.InfoActivity" />
<activity android: excludeFromRecents = "true" android: launchMode = "singleTask" android: name = "by.androld.contactsvcf.ContactsFragmentActivity" android: parentActivityName = "by.androld.contactsvcf.MainActivity">
<meta-data android: name = "android.support.PARENT_ACTIVITY" android: value = "by.androld.contactsvcf.MainActivity" />
<intent-filter android: label = "@ string / view_vcf">
<action android: name = "android.intent.action.VIEW" />
<action android: name = "android.intent.action.EDIT" />
<category android: name = "android.intent.category.DEFAULT" />
<category android: name = "android.intent.category.BROWSABLE" />
<data android: scheme = "file" />
<data android: mimeType = "text / x-vcard" />
<data android: mimeType = "text / vcard" />
<data android: pathPattern = ". * \\. vcf" />
<data android: pathPattern = ". * \\ .. * \\. vcf" />
<data android: pathPattern = ". * \\ .. * \\ .. * \\. vcf" />
<data android: pathPattern = ". * \\ .. * \\ .. * \\ .. * \\. vcf" />
<data android: pathPattern = ". * \\ .. * \\ .. * \\ .. * \\ .. * \\. vcf" />
<data android: host = "*" />
</ intent-filter>
<intent-filter android: label = "@ string / view_vcf">
<action android: name = "android.intent.action.VIEW" />
<action android: name = "android.intent.action.EDIT" />
<category android: name = "android.intent.category.DEFAULT" />
<category android: name = "android.intent.category.BROWSABLE" />
<data android: scheme = "content" />
<data android: mimeType = "text / x-vcard" />
<data android: mimeType = "text / vcard" />
</ intent-filter>
</ activity>
<provider android: authorities = "by.androld.contactsvcf.MyContentProvider" android: exported = "false" android: name = "by.androld.contactsvcf.contentproviders.MyContentProvider" />
<meta-data android: name = "com.google.android.gms.version" android: value = "@ integer / google_play_services_version" />
<activity android: label = "@ string / pref_title_folders_for_search" android: name = "by.androld.contactsvcf.SelectFolderActivity" android: theme = "@ style / DialogActivityTheme" />
<activity android: name = "by.androld.contactsvcf.fragments.ActionsContactActivity" android: theme = "@ style / ActionsContactActivity" />
<activity android: name = "com.soundcloud.android.crop.CropImageActivity" />
<activity android: name = "by.androld.libs.PickAvatarActivity" android: theme = "@ android: style / Theme.Translucent.NoTitleBar" />
<activity android: name = "by.androld.libs.PermissionsActivity" android: theme = "@ android: style / Theme.Translucent.NoTitleBar" />
<activity android: name = "by.androld.contactsvcf.PhotoViewActivity" android: theme = "@ style / PhotoViewActivityTheme" />
<activity android: name = "by.androld.contactsvcf.WebActivity" />
<provider android: authorities = "by.androld.contactsvcf.fileprovider" android: exported = "false" android: grantUriPermissions = "true" android: name = "android.support.v4.content.FileProvider">
<meta-data android: name = "android.support.FILE_PROVIDER_PATHS" android: resource = "@ xml / file_paths" />
</ provider>
<activity android: configChanges = "keyboard | keyboardHidden | orientation | screenLayout | screenSize | smallestScreenSize | uiMode" android: excludeFromRecents = "true" android: name = "by.androld.contactsvcf.activities.GeneralLoadingActivity" android: theme = "@ style / AppTheme.Transparent "/>
<receiver android: exported = "true" android: name = "com.google.firebase.iid.FirebaseInstanceIdReceiver" android: permission = "com.google.android.c2dm.permission.SEND">
<intent-filter>
<action android: name = "com.google.android.c2dm.intent.RECEIVE" />
<category android: name = "by.androld.contactsvcf" />
</ intent-filter>
</ receiver>
<receiver android: exported = "false" android: name = "com.google.firebase.iid.FirebaseInstanceIdInternalReceiver" />
<service android: exported = "true" android: name = "com.google.firebase.iid.FirebaseInstanceIdService">
<intent-filter android: priority = "- 500">
<action android: name = "com.google.firebase.INSTANCE_ID_EVENT" />
</ intent-filter>
</ service>
<provider android: authorities = "by.androld.contactsvcf.firebaseinitprovider" android: exported = "false" android: initOrder = "100" android: name = "com.google.firebase.provider.FirebaseInitProvider" />
<activity android: configChanges = "keyboard | keyboardHidden | orientation | screenLayout | screenSize | smallestScreenSize | uiMode" android: name = "com.google.android.gms.ads.AdActivity" android: theme = "@ android: style / Theme.Translucent "/>
<activity android: name = "com.google.android.gms.ads.purchase.InAppPurchaseActivity" android: theme = "@ style / Theme.IAPTheme" />
<activity android: exported = "false" android: name = "com.google.android.gms.common.api.GoogleApiActivity" android: theme = "@ android: style / Theme.Translucent.NoTitleBar" />
<activity android: launchMode = "singleTop" android: name = "by.androld.libs.billing.BillingEmptyActivity" android: theme = "@ android: style / Theme.Translucent.NoTitleBar" />
<activity android: name = "com.soundcloud.android.crop.PickAvatarActivity" android: theme = "@ android: style / Theme.Translucent.NoTitleBar" />
</ application>
</ manifest>

the body was immediately combed for the presence of a ready-made vcf dossier, it wasn’t found, it was proposed to be compiled voluntarily .. filled out the sample - it’s weak to rush into the dialer !, but the handsome man shows off already in Droidwall
maybe someone and the master "work" with him and make him stay out of where they ask, but I have almost no tools, and my hands have not grown, and there is no time for such meaningless work ..
In general, we are all different in taste and color .. and 99% apk are the same in their desires

Well, who will enlighten me, why is this fruit that can directly call phone numbers which will be this may cost you money, not able to call the Contact I created? !!! or he still needs something for this, but in my firmware, apparently, ahaha, is missing! ) or does he have his own contact numbers for “calls”? most likely so ..
.. well, don’t worry too much, for lack of a ram and a dog for barbecue, you can only boil for a long time and according to special recipes .. it's just that I’m so picky / greedy to share my contacts / paranoid creature / everything is bad for me and everything’s wrong, and indeed, the whole world needs to be changed .. google-android - for sure! : D
.. I don’t intend to continue sniffing the analyzes - so I was calm about the beast, even without Droidwall, and now I have to watch and wait for the drain .. uninstall and.
.. about upd calls: I looked at the screenshots of the subject in his Temko .. well, he gave me only a template with filling in the names, the rest that was lower was missing .. in general, the subject was independent, dependent, possibly selling, of this or that content .. I made for my own interests, understandably .. but I'm not in pretensions and not in sadness ..

Post has been editedxynta123 - 03.03.18, 19:51



Rep: (2579)
* Cinderella__ , Pay attention to
having mastered the course "Internet Security" or learn how to develop your own service in Java on a course from Mail.ru
From MAT
Attached Image
Attached Image
Attached Image
Attached Image

And another forced registration in addition: D

Attached images
Attached Image


Post has been editedferhad.necef - 02.05.18, 13:03
Reason for editing: MAT



Rep: (589)
A difficult question: have anyone encountered apk analyzers (including the so-called antiviruses) to exploit the Janus vulnerability or think about detection options?

Post has been editedokouser - 29.05.18, 13:00



Rep: (5284)
* okouser,
Well, except that to upload to apkmirror, it detects such apk and spits an error.
Attached Image

Well, and some kind of paid uber-tool from the company that found this hole:https://www.guardsquare.com/en/dexguard

Post has been editedDisplax - 29.05.18, 00:41



Rep: (589)
Displax @ 05/28/18, 21:36*
Well, except that at apkmirror fill

Online options are also an idea.
In principle, probably, and VirusTotal should work.
Displax @ 05/28/18, 21:36*
Well, and some kind of paid uber-tool from the company that found this hole

Oh, I didn’t see the elephant.

Post has been editedokouser - 29.05.18, 00:48



Rep: (5284)
Okouser @ 05/29/18, 00:46*
In principle, probably, and VirusTotal should work.
It works a bit, yes.
https: //www.virustotal...daa57eb9be3b/analysis/
All the same, it is more in terms of viruses, not vulnerabilities. And everything depends on the anti-virus product databases, someone added to the database, someone not.

The file itself with the hole may need someone:Attached fileHelloWorld-Janus.apk(9.83 KB)


Post has been editedDisplax - 29.05.18, 00:51



Rep: (589)
Displax @ 05/28/18, 21:48*
All the same, it is more in terms of viruses, not vulnerabilities. And everything depends on the anti-virus product databases, someone added to the database, someone not.

Yes, but at the same time you can think about the option of offline detection using a suitable antivirus.
Moreover, this kind of detections (but, of course, better with previously unknown examples) shows very well which of the antiviruses is at least somehow suitable for Android.

Post has been editedokouser - 29.05.18, 12:59



Rep: (13)
Please tell me what is the permission (last) of the Fruit Mania 2 application?
Attached Image



Rep: (5284)
Cinderella__ @ 06/02/18, 20:10*
Please tell me what is the permission (last) of the Fruit Mania 2 application?
https: //developer.andr.../play/installreferrer/



Rep: (2579)
Program for analyzing apk permissions:
Android Permissions (Check requested permission details of all installed applications) -https://f-droid.org/ap...jsna.permissionchecker



Rep: (589)
Ferhad.necef @ 06/05/18, 10:30 PM*
Android Permissions

Not bad, and even in some ways pretty good.
But the absence of at least some sorting and filtering is a problem.



Rep: (2579)
* okouser The program is new, maybe they will add ...;)



Rep: (13)
I don’t know which program issued a warning when the game started.
Attached Image

It doesn’t look like LBE Master, besides there is a ban on the Internet.


Attached files

Attached fileair.com.oskankayirci.cohex-1.3.0.apk(18.26 MB)



Rep: (13)
Ha ha, in vain I was worried about removing system applications. Only standard screensavers can be turned off (until the next time you turn on the device). The rest in the settings are not active. So McAfee will have to come to terms with the existing medium-risk threat. Or can write to them in those support?



Rep: (3)
I participate in paid surveys of internetanketa.ru, they sent me a link to the application that needs to be installed on the phonehttps: //play.google.co...ymobileconnect.androidbut can it be set, or will it merge everything that I do, logins, passwords, etc.? It establishes a VPN connection for some reason, but for some reason my IP does not change


Full version    

Help     rules

Now: 08/20/19, 7:00 p.m.