ART 在 Android 安全攻防中的应用
Tags
attack-pattern: | Data Direct Python - T1059.006 Server - T1583.004 Server - T1584.004 |
Common Information
Type | Value |
---|---|
UUID | a95dcfd7-9e6f-4520-8f7c-490cc85dc98c |
Fingerprint | fb2281a29a0d4688 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Dec. 26, 2021, midnight |
Added to db | Jan. 18, 2023, 7:48 p.m. |
Last updated | Nov. 17, 2024, 6:30 p.m. |
Headline | ART 在 Android 安全攻防中的应用 |
Title | ART 在 Android 安全攻防中的应用 |
Detected Hints/Tags/Attributes | 34/1/27 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | http://evilpan.com/2021/12/26/art-internal/ |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 188 | com.android |
|
Details | Domain | 3 | libdvm.so |
|
Details | Domain | 8 | libart.so |
|
Details | Domain | 707 | google.com |
|
Details | Domain | 1 | classes.art |
|
Details | Domain | 3 | basedexclassloader.java |
|
Details | Domain | 3 | dexpathlist.java |
|
Details | Domain | 3 | dexfile.java |
|
Details | Domain | 1 | reflection.cc |
|
Details | Domain | 1 | interpreter.cc |
|
Details | Domain | 1 | com.evilpan.foo |
|
Details | Domain | 1 | instrumentation.cc |
|
Details | 1 | bdc@google.com |
||
Details | 1 | settings@settings.apk |
||
Details | File | 1 | app_main.cpp |
|
Details | File | 1 | jni_invocation.ini |
|
Details | File | 1 | jniinvocation.ini |
|
Details | File | 10 | persist.sys |
|
Details | File | 1 | settings.apk |
|
Details | File | 3 | basedexclassloader.java |
|
Details | File | 3 | dexpathlist.java |
|
Details | File | 3 | dexfile.java |
|
Details | File | 1 | accessor.reg |
|
Details | File | 20 | dalvik.sys |
|
Details | File | 23 | base.apk |
|
Details | File | 3 | android.js |
|
Details | sha1 | 1 | 870b4f2d70d67d6dbb7d0881d101c61bed8caad2 |