{"id":14896,"date":"2021-07-01T12:26:33","date_gmt":"2021-07-01T06:56:33","guid":{"rendered":"https:\/\/www.varutra.com\/?p=14896"},"modified":"2023-03-24T15:31:59","modified_gmt":"2023-03-24T10:01:59","slug":"drozer-android-security-assessment-framework","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/","title":{"rendered":"DROZER \u2013 Android Security Assessment Framework"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2021\/07\/DROZER-\u2013-Android-Security-Assessment-Framework-1024x573.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"DROZER Android Security Assessment Framework - Varutra Consulting\"><br \/>\nDrozer is a framework for Android security assessments developed by MWR Labs. It is one of the best Android security assessment tools available for Android Security Assessments. In this blog, we will discuss some basic concepts related to Drozer.<\/p>\n<ul>\n<li>It is an open-source software<\/li>\n<li>It can do anything that an installed application can do, such as making use of Android\u2019s Inter-Process Communication (IPC) mechanism and interact with the underlying operating system<\/li>\n<li>Drozer is interactive in nature. To perform a security assessment using Drozer, the user has to run the commands on the console<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>Prerequisites<\/strong><\/h3>\n<ul>\n<li>Java Development Kit (JDK) 1.6<\/li>\n<li>Python 2.7<\/li>\n<li>Android SDK<\/li>\n<li>ADB<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>Setting Up the Lab<\/strong><strong>\u00a0<\/strong><\/h3>\n<ul>\n<li>Download the Drozer installer from the MWR website and run it<\/li>\n<li>Install the Drozer agent<\/li>\n<li>The Drozer Agent is included as an Android Package (.apk) file in all Drozer distributions. This can be installed onto your emulator or device.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14898 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/Setting-up-Drozerlab.png\" alt=\"Setting up Drozerlab for Android Security Assessment\" width=\"531\" height=\"161\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Setting-up-Drozerlab.png 531w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Setting-up-Drozerlab-300x91.png 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 1: Setting up Drozerlab<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Starting the Session<\/strong><\/h3>\n<ul>\n<li>You should now have the Drozer Console installed on your PC, and the Agent running on your test device. Now, you need to connect the two and you are ready to start exploring.<\/li>\n<li>We will use the server embedded in the Drozer Agent to do this.<\/li>\n<li>First, you need to set up a suitable port forward so that your PC can connect to a TCP socket opened by the Agent inside the emulator, or on the device. By default, Drozer uses port 31415.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14899 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/Starting-the-session.png\" alt=\"Starting the session\" width=\"401\" height=\"102\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Starting-the-session.png 401w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Starting-the-session-300x76.png 300w\" sizes=\"(max-width: 401px) 100vw, 401px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 2: Starting the session<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>How to Use Drozer for Android Security Assessment<\/strong><\/h3>\n<p>Drozer has a list of modules for interactive with android devices. Each module implements a very specific function, which lists down all the packages installed on the device. For example- \u2018list\u2019 shows a list of modules present in the current session.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14900 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/Drozermodules.png\" alt=\"Drozermodules\" width=\"580\" height=\"401\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Drozermodules.png 580w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Drozermodules-300x207.png 300w\" sizes=\"(max-width: 580px) 100vw, 580px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 3: Drozermodules<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Using Drozer for Android Security Assessment<\/strong><\/h3>\n<p>Once Drozer is installed and the session between the device and PC is established, we can use Drozer for conducting security assessment activities. In this blog, we will be using the \u2018Sieve\u2019 vulnerable android application for finding out vulnerable activities and content providers and further exploit them.<\/p>\n<ol>\n<li><strong>Retrieve Package Information<\/strong><\/li>\n<\/ol>\n<p>First step for finding out any vulnerable android components is finding out package-related information<strong>.<\/strong><\/p>\n<p><strong>Commands: <\/strong><\/p>\n<ul>\n<li>run app.package.info<\/li>\n<li>run app.package.info -a com.mwr.example.sieve<\/li>\n<\/ul>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14901\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/Retrieve-package-information.png\" alt=\"Retrieve package information\" width=\"324\" height=\"196\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Retrieve-package-information.png 324w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Retrieve-package-information-300x181.png 300w\" sizes=\"(max-width: 324px) 100vw, 324px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 4.1: Retrieve package information<\/strong><\/p>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li style=\"text-align: left\"><strong>Identify the Attack Surface<\/strong><\/li>\n<\/ol>\n<p>The second step is finding out the attack interface, i.e how many activities, content providers, etc. are exported.<\/p>\n<p><strong>Command:<\/strong><\/p>\n<ul>\n<li>run app.package.attacksurfacecom.mwr.example.sieve<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14902 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/Identify-attack-interface.png\" alt=\"Identify attack interface\" width=\"407\" height=\"106\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Identify-attack-interface.png 407w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Identify-attack-interface-300x78.png 300w\" sizes=\"(max-width: 407px) 100vw, 407px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 4.2: Identify attack interface<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<ol start=\"3\">\n<li><strong>Identify And Launch Activities<\/strong><\/li>\n<\/ol>\n<p>The third step is finding out information related to activities that are exported to true and then launch them. If you can launch activities, which can be accessed only after authentication then you are successfully able to bypass the authentication. Sometimes, directly accessing any activity will give you access to sensitive information, for example \u2013 passwords, API keys, etc.<\/p>\n<ul>\n<li><strong>Identify Activities<\/strong><\/li>\n<\/ul>\n<p><strong>Command:<\/strong><\/p>\n<ul>\n<li>run app.activity.info -a com.mwr.example.sieve<\/li>\n<\/ul>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14903\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/Identify-activities.png\" alt=\"Identify activities\" width=\"359\" height=\"109\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Identify-activities.png 359w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Identify-activities-300x91.png 300w\" sizes=\"(max-width: 359px) 100vw, 359px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 4.3.1: Identify activities<\/strong><\/p>\n<ul>\n<li><strong>Launch Activities<\/strong><\/li>\n<\/ul>\n<p><strong>Command:<\/strong><\/p>\n<ul>\n<li>run app.activity.start &#8211;component com.mwr.example.sievecom.mwr.example.sieve.PWList<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14904 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/Launch-activities.png\" alt=\"Launch activities\" width=\"469\" height=\"113\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Launch-activities.png 469w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Launch-activities-300x72.png 300w\" sizes=\"(max-width: 469px) 100vw, 469px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 4.3.2: Launch activities<\/strong><\/p>\n<p>Here is another example, using \u2018Diva\u2019 vulnerable android application. In this application, we were able to access sensitive information (API Credentials) by launching the activities directly without any authentication.<\/p>\n<p><strong>Commands:<\/strong><\/p>\n<ul>\n<li>run app.activity.info -a jakhar.aseem.diva<\/li>\n<li>run app.activity.start &#8211;component jakhar.aseem.divajakhar.aseem.diva.APICredsActivity<\/li>\n<\/ul>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14905\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/Identify-and-launch-activities.png\" alt=\"Identify and launch activities\" width=\"484\" height=\"113\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Identify-and-launch-activities.png 484w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Identify-and-launch-activities-300x70.png 300w\" sizes=\"(max-width: 484px) 100vw, 484px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 4.3.3: Identify and launch activities<\/strong><\/p>\n<p>&nbsp;<\/p>\n<ol start=\"4\">\n<li><strong>Reading From Content Providers<\/strong><\/li>\n<\/ol>\n<p>In the fourth step, we will see how to find out information related to content providers and the permissions required to launch them.<\/p>\n<p><strong>Command<\/strong><\/p>\n<ul>\n<li>run app.provider.info -a com.mwr.example.sieve<\/li>\n<\/ul>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14906\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/Identify-content-providers.png\" alt=\"Identify content providers\" width=\"411\" height=\"220\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Identify-content-providers.png 411w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Identify-content-providers-300x161.png 300w\" sizes=\"(max-width: 411px) 100vw, 411px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 4.4: Identify content providers<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<ol start=\"5\">\n<li><strong>Find Out the Content URI\u2019s<\/strong><\/li>\n<\/ol>\n<p>Drozer provides a scanner module that brings together various ways to guess paths and a list of accessible content URIs.<\/p>\n<p><strong>Command:<\/strong><\/p>\n<ul>\n<li>run scanner.provider.finduris -a com.mwr.example.sieve<\/li>\n<\/ul>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14907\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/Identify-content-URIs.png\" alt=\"Identify content URI\u2019s\" width=\"481\" height=\"191\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Identify-content-URIs.png 481w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Identify-content-URIs-300x119.png 300w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 4.5: Identify content URI\u2019s<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<ol start=\"6\">\n<li><strong>Query The Content Provider<\/strong><\/li>\n<\/ol>\n<p>In this step, we will see how to query a content provider and find out the sensitive information stored in it. In the given example, we were able to find out user id, password, and pin-related information in the application. Drozer also provides scanners to find out SQL injection vulnerabilities in <a href=\"https:\/\/www.varutra.com\/attacking-android-components-content-providers\/\">content providers<\/a>. We can use the scanners and can further explore SQL injection in vulnerable applications.<\/p>\n<p><strong>Commands:<\/strong><\/p>\n<ul>\n<li>run app.provider.query content:\/\/com.mwr.example.sieve.DBContentProvider\/Passwords<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14909 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/Query-content-provider.png\" alt=\"Query content provider\" width=\"618\" height=\"60\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Query-content-provider.png 618w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Query-content-provider-300x29.png 300w\" sizes=\"(max-width: 618px) 100vw, 618px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 4.6.1: Query content provider<\/strong><\/p>\n<ul>\n<li>run app.provider.query content:\/\/com.mwr.example.sieve.DBContentProvider\/Keys\/<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14910 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/Query-content-provider-2.png\" alt=\"Query content provider\" width=\"421\" height=\"57\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Query-content-provider-2.png 421w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/Query-content-provider-2-300x41.png 300w\" sizes=\"(max-width: 421px) 100vw, 421px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 4.6.2: Query content provider<\/strong><\/p>\n<ul>\n<li>run scanner.provider.injection -a content:\/\/com.mwr.example.sieve.DBContentProvider\/Keys<\/li>\n<\/ul>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14911\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/SQL-injection-in-content-providers.png\" alt=\"SQL injection in content providers\" width=\"475\" height=\"153\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/SQL-injection-in-content-providers.png 475w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/SQL-injection-in-content-providers-300x97.png 300w\" sizes=\"(max-width: 475px) 100vw, 475px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 4.6.3: SQL injection in content providers<\/strong><\/p>\n<ul>\n<li>run app.provider.query content:\/\/com.mwr.example.sieve.DBContentProvider\/Passwords &#8211;projection &#8220;&#8216;\u201c<\/li>\n<\/ul>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14912\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/SQL-injection-in-content-providers-2.png\" alt=\"SQL injection in content providers\" width=\"501\" height=\"36\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/SQL-injection-in-content-providers-2.png 501w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/SQL-injection-in-content-providers-2-300x22.png 300w\" sizes=\"(max-width: 501px) 100vw, 501px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 4.6.4: SQL injection in content providers<\/strong><\/p>\n<ul>\n<li>run app.provider.query content:\/\/com.mwr.example.sieve.DBContentProvider\/Passwords\/ &#8211;projection &#8220;* FROM SQLITE_MASTER WHERE type=&#8217;table&#8217;;&#8211;\u201c<\/li>\n<\/ul>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14913\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/SQL-injection-in-content-providers-3.png\" alt=\"SQL injection in content providers\" width=\"576\" height=\"68\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/SQL-injection-in-content-providers-3.png 576w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/SQL-injection-in-content-providers-3-300x35.png 300w\" sizes=\"(max-width: 576px) 100vw, 576px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 4.6.5: SQL injection in content providers<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>Drozer is an easy-to-use framework for quickly identifying weaknesses and possible vulnerabilities on Android-based applications. In this blog, we checked how to find out vulnerabilities related to vulnerable android components however, the framework still has various interestingly looking functionalities like getting the reverse shell, file upload, and download and writing you own Drozer module which can be explored further.<\/p>\n<p>&nbsp;<\/p>\n<p>Author,<\/p>\n<p><strong>Prashasti Rikhari<\/strong><\/p>\n<p>Attack &amp; PenTest Team<\/p>\n<p>Varutra Consulting Pvt. Ltd.<\/p>","protected":false},"excerpt":{"rendered":"<p>Drozer is a framework for Android security assessments developed by MWR Labs. It is one of the best Android security assessment tools available for Android&#8230;<\/p>\n","protected":false},"author":4,"featured_media":14915,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[51,264,262],"tags":[453,450,451,452,229,151],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Drozer is a comprehensive android security assessment framework used for identifying weaknesses and possible vulnerabilities on android-based applications.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"DROZER \u2013 Android Security Assessment Framework\" \/>\n\t\t<meta property=\"og:description\" content=\"Drozer is a comprehensive android security assessment framework used for identifying weaknesses and possible vulnerabilities on android-based applications.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/DROZER-\u2013-Android-Security-Assessment-Framework.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/DROZER-\u2013-Android-Security-Assessment-Framework.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1060\" \/>\n\t\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t\t<meta property=\"article:section\" content=\"Android Security\" \/>\n\t\t<meta property=\"article:tag\" content=\"android penetration testing\" \/>\n\t\t<meta property=\"article:tag\" content=\"android security\" \/>\n\t\t<meta property=\"article:tag\" content=\"device security\" \/>\n\t\t<meta property=\"article:tag\" content=\"drozer\" \/>\n\t\t<meta property=\"article:tag\" content=\"mobile security\" \/>\n\t\t<meta property=\"article:tag\" content=\"security testing\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-07-01T06:56:33+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2023-03-24T10:01:59+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"DROZER \u2013 Android Security Assessment Framework\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Drozer is a comprehensive android security assessment framework used for identifying weaknesses and possible vulnerabilities on android-based applications.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/DROZER-\u2013-Android-Security-Assessment-Framework.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/drozer-android-security-assessment-framework\\\/#article\",\"name\":\"DROZER \\u2013 Android Security Assessment Framework\",\"headline\":\"DROZER \\u2013 Android Security Assessment Framework\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/DROZER-\\u2013-Android-Security-Assessment-Framework.png\",\"width\":1060,\"height\":593,\"caption\":\"Android Security Assessment Framework\"},\"datePublished\":\"2021-07-01T12:26:33+05:30\",\"dateModified\":\"2023-03-24T15:31:59+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/drozer-android-security-assessment-framework\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/drozer-android-security-assessment-framework\\\/#webpage\"},\"articleSection\":\"Android Security, Mobile Application Security, Mobile Device Management, android penetration testing, android security, device security, drozer, Mobile Security, Security Testing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/drozer-android-security-assessment-framework\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/drozer-android-security-assessment-framework\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/drozer-android-security-assessment-framework\\\/#listItem\",\"position\":2,\"name\":\"DROZER \\u2013 Android Security Assessment Framework\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/drozer-android-security-assessment-framework\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/drozer-android-security-assessment-framework\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/drozer-android-security-assessment-framework\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/drozer-android-security-assessment-framework\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/drozer-android-security-assessment-framework\\\/\",\"name\":\"DROZER \\u2013 Android Security Assessment Framework\",\"description\":\"Drozer is a comprehensive android security assessment framework used for identifying weaknesses and possible vulnerabilities on android-based applications.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/drozer-android-security-assessment-framework\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/DROZER-\\u2013-Android-Security-Assessment-Framework.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/drozer-android-security-assessment-framework\\\/#mainImage\",\"width\":1060,\"height\":593,\"caption\":\"Android Security Assessment Framework\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/drozer-android-security-assessment-framework\\\/#mainImage\"},\"datePublished\":\"2021-07-01T12:26:33+05:30\",\"dateModified\":\"2023-03-24T15:31:59+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>DROZER \u2013 Android Security Assessment Framework<\/title>\n\n","aioseo_head_json":{"title":"DROZER \u2013 Android Security Assessment Framework","description":"Drozer is a comprehensive android security assessment framework used for identifying weaknesses and possible vulnerabilities on android-based applications.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"DROZER \u2013 Android Security Assessment Framework","og:description":"Drozer is a comprehensive android security assessment framework used for identifying weaknesses and possible vulnerabilities on android-based applications.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/DROZER-\u2013-Android-Security-Assessment-Framework.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/DROZER-\u2013-Android-Security-Assessment-Framework.png","og:image:width":"1060","og:image:height":"593","article:section":"Android Security","article:tag":["android penetration testing","android security","device security","drozer","mobile security","security testing"],"article:published_time":"2021-07-01T06:56:33+00:00","article:modified_time":"2023-03-24T10:01:59+00:00","twitter:card":"summary_large_image","twitter:title":"DROZER \u2013 Android Security Assessment Framework","twitter:description":"Drozer is a comprehensive android security assessment framework used for identifying weaknesses and possible vulnerabilities on android-based applications.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/DROZER-\u2013-Android-Security-Assessment-Framework.png","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"4 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/#article","name":"DROZER \u2013 Android Security Assessment Framework","headline":"DROZER \u2013 Android Security Assessment Framework","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/DROZER-\u2013-Android-Security-Assessment-Framework.png","width":1060,"height":593,"caption":"Android Security Assessment Framework"},"datePublished":"2021-07-01T12:26:33+05:30","dateModified":"2023-03-24T15:31:59+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/#webpage"},"articleSection":"Android Security, Mobile Application Security, Mobile Device Management, android penetration testing, android security, device security, drozer, Mobile Security, Security Testing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/#listItem","position":2,"name":"DROZER \u2013 Android Security Assessment Framework","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/","name":"DROZER \u2013 Android Security Assessment Framework","description":"Drozer is a comprehensive android security assessment framework used for identifying weaknesses and possible vulnerabilities on android-based applications.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/07\/DROZER-\u2013-Android-Security-Assessment-Framework.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/#mainImage","width":1060,"height":593,"caption":"Android Security Assessment Framework"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/#mainImage"},"datePublished":"2021-07-01T12:26:33+05:30","dateModified":"2023-03-24T15:31:59+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"14896","title":"DROZER \u2013 Android Security Assessment Framework","description":"Drozer is a comprehensive android security assessment framework used for identifying weaknesses and possible vulnerabilities on android-based applications.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Android Security Assessment\",\"analysis\":{\"keyphraseInTitle\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInURL\":{\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"score\":9,\"maxScore\":9,\"error\":0}},\"score\":90},\"additional\":[{\"keyphrase\":\"Drozer\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Security Assessment\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Android Security\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"score\":9,\"maxScore\":9,\"error\":0}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/07\/DROZER-\u2013-Android-Security-Assessment-Framework.png","og_image_width":"1060","og_image_height":"593","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Android Security","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"Article","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:11:13","updated":"2023-03-24 10:13:03"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/android-security\/\" title=\"Android Security\">Android Security<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tDROZER \u2013 Android Security Assessment Framework\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Android Security","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/android-security\/"},{"label":"DROZER \u2013 Android Security Assessment Framework","link":"https:\/\/www.varutra.com\/varutravrt3\/drozer-android-security-assessment-framework\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/14896"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=14896"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/14896\/revisions"}],"predecessor-version":[{"id":21234,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/14896\/revisions\/21234"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/14915"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=14896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=14896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=14896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}