Skip to content

Commit 822b801

Browse files
spoiicyspoiicy
andauthored
Usage for MobSF_Service (#18)
* added usage for Androguard analyzer * added NIST CVE analyzer details * added mobsf_service usage --------- Co-authored-by: spoiicy <[email protected]>
1 parent 287567f commit 822b801

File tree

2 files changed

+9
-0
lines changed

2 files changed

+9
-0
lines changed

docs/IntelOwl/advanced_usage.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -260,6 +260,14 @@ Some analyzers could require a special configuration:
260260
- `waiting_time`: Determines the waiting time for the page to load during the scan (in seconds).
261261
- `private_scan`: When set to `true`, the scan results will not be shared with other `urlDNA.io` users.
262262
- `scanned_from`: Allows selecting the country of origin for the scan using a two-letter country code (ISO 3166-1 alpha-2). This feature is available only to `urlDNA.io` Premium Users.
263+
- `MobSF_Service`:
264+
- The `MobSF_Service` analyzer offers various configurable parameters to optimize the automated scanning of the application as per one's requirement.
265+
- `enable_dynamic_analysis`: Set to `True` to enable dynamic analysis though this will increase the scan time.
266+
- `timeout`: Request timeout for each API call, configure as per your need. Default value is 30 seconds.
267+
- `default_hooks`: Default hooks to pass to mobsf e.g root_bypass, ssl_pinning_bypass, etc.
268+
- `auxiliary_hooks`: Auxiliary frida hooks to pass to mobsf.
269+
- `frida_code`: Custom Frida code to be executed by mobsf
270+
- `activity_duration`: Wait time period for mobsf to collect sufficient info from dynamic activities such as results from`frida_code` before generating report. Default value is 60 seconds. Configure as per your requirements.
263271

264272
## Notifications
265273

docs/IntelOwl/usage.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -116,6 +116,7 @@ The following is the list of the available analyzers you can run out-of-the-box.
116116
- `Mobsf`: [MobSF](https://github.com/MobSF/mobsfscan/) is a static analysis tool that can find insecure code patterns in your Android and iOS source code. Supports Java, Kotlin, Android XML, Swift and Objective C Code.
117117
- `DroidLysis`: [DroidLysis](https://github.com/cryptax/droidlysis) is a pre-analysis tool for Android apps: it performs repetitive and boring tasks we'd typically do at the beginning of any reverse engineering. It disassembles the Android sample, organizes output in directories, and searches for suspicious spots in the code to look at. The output helps the reverse engineer speed up the first few steps of analysis.
118118
- `Artifacts`: [Artifacts](https://github.com/guelfoweb/artifacts) is a tool that does APK strings analysis. Useful for first analysis.
119+
- `MobSF_Service`: [MobSF_Service](https://github.com/MobSF/Mobile-Security-Framework-MobSF) can be used for a variety of use cases such as mobile application security, penetration testing, malware analysis, and privacy analysis.
119120

120121
###### External services
121122

0 commit comments

Comments
 (0)