Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
25 changes: 25 additions & 0 deletions apps/andro_goat/return.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
{

"isCoordinate":true,
"X": 323,
"Y": 211,
"isInput":false,
"isEnd":false,
"scrollData": {
"position": "up", -- // optional field - enum of (up|down)
},
"inputDataType":"email", -- // enum of (email|password|firstname|lastname|address|phone|id|username)

}




// --- Explanation --
// We will iterate throug every screenshot
// asking for the data, if is a coordinate - we do tap
// if is a input we do tap and enter the data
// we check for the inputdataType to decide wich kind of data
// will be sent.
// if isEnd is true. We do wrap up and finish the test
//
54 changes: 54 additions & 0 deletions apps/dfd/manager.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,54 @@
from dotenv import load_dotenv
from service.input_service import do_restart, do_open, do_close
from service import vulnerability_service as vuln_service
from apps.dfd import mapping as dfd
import os

import time

""""

DFD test manager file. All the test structure for this app
is centralized here.

"""

load_dotenv()

def do_test(package):
# - Define the Mock Data -
MOCK_USR = os.getenv("MOCK_USER_NAME")
MOCK_PASWD = os.getenv("MOCK_PASSWORD")
MOCK_EMAIL = os.getenv("MOCK_EMAIL")
MOCK_FIRST_NAME = os.getenv("MOCK_FIRST_NAME")

# - Open the App -
do_open(package)

vuln_service.check_root(package)

vuln_service.check_emulator(package)

# - Give the pentester some time to chat a bit (3 minutes) -
time.sleep(180)

vuln_service.search_sensitive_external(MOCK_USR)

# - Search for Vulnerabilities -
vuln_service.search_shared_pref(MOCK_PASWD, package)


# - Look to Sensitive Data at SQLite
vuln_service.search_sqlite(MOCK_EMAIL, package)


# - Look to Sensitive data in Logs
vuln_service.search_sensitive_log(MOCK_FIRST_NAME)
vuln_service.search_sensitive_log(MOCK_EMAIL)
vuln_service.search_sensitive_log(MOCK_PASWD)

# - Create the .sarif File Report
vuln_service.build_report()

do_close(package)

1 change: 1 addition & 0 deletions apps/dfd/mapping.py
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
# todo - implement mapping file for DFD app
Loading
Loading