Drozer - The Leading Security Assessment Framework for Android
drozer is a comprehensive security audit and attack framework for Android.
With increasing pressure to support mobile working, the ingress of
Android into the enterprise is gathering momentum. Have you considered
the threat posed by the Android app that supports your business
function, or Android devices being used as part of your BYOD strategy?
drozer helps to provide confidence that Android apps and devices
being developed by, or deployed across, your organisation do not pose an
unacceptable level of risk. By allowing you to interact with the Dalvik
VM, other apps’ IPC endpoints and the underlying OS.
drozer provides tools to help you use and share public exploits for
Android. For remote exploits, it can generate shellcode to help you to
deploy the drozer Agent as a remote administrator tool, with maximum
leverage on the device.
Faster Android Security Assessments
drozer helps to reduce the time taken for Android security assessments by automating the tedious and time-consuming.
- Discover and interact with the attack surface exposed by Android apps.
- Execute dynamic Java-code on a device, to avoid the need to compile and install small test scripts.
Test against Real Android Devices
drozer runs both in Android emulators and on real devices. It does not require USB
debugging or other development features to be enabled; so you can
perform assessments on devices in their production state to get better
results.
Automate and Extend
drozer can be easily extended with additional modules to find, test
and exploit other weaknesses; this, combined with scripting
possibilities, helps you to automate regression testing for security
issues.
Test your Exposure to Public Exploits
drozer provides point-and-go implementations of many public Android
exploits. You can use these to identify vulnerable devices in your
organisation, and to understand the risk that these pose.
Drozer - The Leading Security Assessment Framework for Android
Reviewed by Zion3R
on
9:12 PM
Rating: