Android Tamer Clubhack
AI Generated Summary
AI Generated Content Disclaimer
Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.
This presentation introduces Android Tamer, a comprehensive virtual machine environment designed as a one-stop toolkit for Android security operations, presented at ClubHack 2011.
Key Topics Covered
Android Market Context:
- Android holds 40%+ phone market share and 10%+ tablet market
- Supported by multiple manufacturers (LG, Samsung, SE) and backed by Google
- Linux-based operating system with growing corporate integration needs
- The entire PC malicious lifecycle is being repeated in the mobile domain
The Problem:
- Security professionals need to download and configure numerous tools separately (SDK, NDK, proxy, decompiler, etc.)
- No standardized toolkit exists for Android security operations
- OWASP is working on mobile security standards, but a consolidated toolset is needed
Android Tamer Solution:
- A VMware-based virtual machine serving as a “BackTrack for Android”
- Built on Ubuntu 10.04 LTS with all non-essential software removed
- Provides an integrated solution, not just a tool dump
- Pre-configured browser bookmarks and custom repository for automatic updates
- Supports application pentesting, malware analysis, ROM modification, ROM analysis, and native code development
Tools Included:
- Application Pentesting: OWASP ZAP, TSOCK Proxy, pre-configured emulator with ZAP certificate, DDMS
- Malware Analysis: DroidBox, APKInspector, Apktool, Dex2jar, JD-GUI, JAD, Smali/Baksmali, Androguard
- ROM Analysis/Modification: DSIXDA Android Kitchen, Unyaffs2, Split_bootimg
- Development: Eclipse + ADT, NDK, CodeSourcery C++ Lite, ARM DS-5 CE
- Rooting Tools: Rageinthecage, Psneuter, Gingerbreak, ZergRush, Z4root, Superoneclick, Universal Androot
Key Design Decisions:
- Minimum foreign repositories to avoid upgrade issues
- Pre-configured personal repository for distributing tool updates
- Transparent socket proxy (T-Proxy) for intercepting all application traffic
- Root CA certificate pre-loaded for proxy-based testing
Future Plans:
- Continuous development with repository-based updates
- Adding Agnitio for source code review
- Forensics section planned
- Community contributions welcome
Actionable Takeaways
- Android security requires a consolidated toolset rather than ad-hoc tool downloads
- VM-based approach provides isolated, pre-configured environment for security work
- Transparent proxying solves the challenge of intercepting non-browser application traffic
- Certificate pre-configuration eliminates common proxy setup friction
- Multiple decompilation approaches (dex2jar, smali) serve different analysis needs
















