mirror of
https://github.com/mvt-project/mvt.git
synced 2026-05-11 12:17:16 +02:00
c782d79974
* Run bugreport and backup modules during check-androidqf Adding support to automatically run ADB backup and bugreport modules automatically when running the check-androidqf command. This is a first step to deduplicate the code for Android modules. * Deduplicate modules which are run by the sub-commands. * Raise the proper NoAndroidQFBackup exception when a back-up isn't found * Remove check-adb command and update docs * Remove check-apk code and old dependencies * Major refactor to add structured alerting and typed indicators This commit makes a structural change to MVT by changing binary detected/not detected logic into a structured multi-level system of alerts. This gives far more power to extend MVT and manage alerts. This commit also begins the process of adding proper typing for key objects used in MVT including Indicators, IndicatorMatches, and ModuleResults. This will also be keep to programmatically using the output of MVT. * Fix up, remove ADB module base * Rework old detections tracking into stuctured alert levels * Quote STIX path in log line * Fix profile events log line * Close open archive (zip/tar) file handles * Fix root_binaries and mounts modules to use alertstore * Update tests to use alertstore instead of detected attribute * Fix alertstore method calls - use high() instead of warning() * Fix remaining test errors - Add log_latest() call in root_binaries to log each alert - Fix UnboundLocalError in cmd_check_androidqf by initializing bugreport variable - Remove incorrect backup.close() call since load_backup() returns bytes - Remove duplicate from_ab method in cmd_check_backup that was using old attributes * Log alerts on add * Remove slug from alertstore calls * update alerts.py * update alerts.py * move indicator_match to alert object * . * - Remove timeline_detected and route to alertstore * fix typing for mypy * Remove unused type imports * Fix check_receiver_prefix and check_android_property_name - check_receiver_prefix() used dict syntax (ioc["value"]) on Indicator dataclass objects from get_iocs(). Changed to ioc.value/ioc.name. - check_receiver_prefix() returned raw ioc instead of IndicatorMatch. Now returns IndicatorMatch with descriptive message. - Fixed return type annotations on both methods to Optional[IndicatorMatch]. - Removed unused Union import. * Fix residual self.detected usage in packages and dumpsys_receivers These modules still used self.detected.append() which no longer exists after the alertstore migration. Converted to alertstore calls: - packages.py: ROOT_PACKAGES detection → alertstore.high() - dumpsys_receivers.py: receiver IOC match → alertstore.critical() * Fix SMS module alertstore.high() call passing slug as message The first argument was self.get_slug() (module slug) instead of a human-readable message. The module is already auto-detected via AlertStore._get_calling_module(). Also removed redundant log_latest(). * Apply suggestions from code review Fix JSON serialization in `module.save_to_json` and fix argument order in iOS alertstore calls. Co-authored-by: tes <tesitura@users.noreply.github.com> * Remove unsupported ADB modules * Fail removed check-adb command * Fix alert serialization and logging * Close sqlite connections in iOS modules * Fix DEBUG messages not reaching handlers, save_to_json for dictionary results and TypeError on mixed event_time types in safary_history * add matched_indicator via alertstore instead of directly modifying json objects * Alert on battery daily uninstall and downgrade * Lower alert severity to medium for suspicious items * Switch version to 2026.4.28 CalVer --------- Co-authored-by: Donncha Ó Cearbhaill <donncha.ocearbhaill@amnesty.org> Co-authored-by: tes <tesitura@users.noreply.github.com> Co-authored-by: Janik Besendorf <janik.besendorf@reporter-ohne-grenzen.de>
117 lines
3.9 KiB
Python
117 lines
3.9 KiB
Python
# Mobile Verification Toolkit (MVT)
|
|
# Copyright (c) 2021-2023 The MVT Authors.
|
|
# Use of this software is governed by the MVT License 1.1 that can be found at
|
|
# https://license.mvt.re/1.1/
|
|
|
|
import logging
|
|
from pathlib import Path
|
|
|
|
import pytest
|
|
|
|
from mvt.android.modules.androidqf.root_binaries import RootBinaries
|
|
from mvt.common.module import run_module
|
|
|
|
from ..utils import get_android_androidqf, list_files
|
|
|
|
|
|
@pytest.fixture()
|
|
def data_path():
|
|
return get_android_androidqf()
|
|
|
|
|
|
@pytest.fixture()
|
|
def parent_data_path(data_path):
|
|
return Path(data_path).absolute().parent.as_posix()
|
|
|
|
|
|
@pytest.fixture()
|
|
def file_list(data_path):
|
|
return list_files(data_path)
|
|
|
|
|
|
@pytest.fixture()
|
|
def module(parent_data_path, file_list):
|
|
m = RootBinaries(target_path=parent_data_path, log=logging)
|
|
m.from_dir(parent_data_path, file_list)
|
|
return m
|
|
|
|
|
|
class TestAndroidqfRootBinaries:
|
|
def test_root_binaries_detection(self, module):
|
|
run_module(module)
|
|
|
|
# Should find 4 root binaries from the test file
|
|
assert len(module.results) == 4
|
|
assert len(module.alertstore.alerts) == 4
|
|
|
|
# Check that all results are detected as indicators
|
|
binary_paths = [result["path"] for result in module.results]
|
|
assert "/system/bin/su" in binary_paths
|
|
assert "/system/xbin/busybox" in binary_paths
|
|
assert "/data/local/tmp/magisk" in binary_paths
|
|
assert "/system/bin/magiskhide" in binary_paths
|
|
|
|
def test_root_binaries_descriptions(self, module):
|
|
run_module(module)
|
|
|
|
# Check that binary descriptions are correctly identified
|
|
su_result = next((r for r in module.results if "su" in r["binary_name"]), None)
|
|
assert su_result is not None
|
|
assert "SuperUser binary" in su_result["description"]
|
|
|
|
busybox_result = next(
|
|
(r for r in module.results if "busybox" in r["binary_name"]), None
|
|
)
|
|
assert busybox_result is not None
|
|
assert "BusyBox utilities" in busybox_result["description"]
|
|
|
|
magisk_result = next(
|
|
(r for r in module.results if r["binary_name"] == "magisk"), None
|
|
)
|
|
assert magisk_result is not None
|
|
assert "Magisk root framework" in magisk_result["description"]
|
|
|
|
magiskhide_result = next(
|
|
(r for r in module.results if "magiskhide" in r["binary_name"]), None
|
|
)
|
|
assert magiskhide_result is not None
|
|
assert "Magisk hide utility" in magiskhide_result["description"]
|
|
|
|
def test_root_binaries_warnings(self, caplog, module):
|
|
run_module(module)
|
|
|
|
# Check that warnings are logged for each root binary found
|
|
assert 'Found root binary "su" at path "/system/bin/su"' in caplog.text
|
|
assert (
|
|
'Found root binary "busybox" at path "/system/xbin/busybox"' in caplog.text
|
|
)
|
|
assert (
|
|
'Found root binary "magisk" at path "/data/local/tmp/magisk"' in caplog.text
|
|
)
|
|
assert (
|
|
'Found root binary "magiskhide" at path "/system/bin/magiskhide"'
|
|
in caplog.text
|
|
)
|
|
assert "Device shows signs of rooting with 4 root binaries found" in caplog.text
|
|
|
|
def test_serialize_method(self, module):
|
|
run_module(module)
|
|
|
|
# Test that serialize method works correctly
|
|
if module.results:
|
|
serialized = module.serialize(module.results[0])
|
|
assert serialized["module"] == "RootBinaries"
|
|
assert serialized["event"] == "root_binary_found"
|
|
assert "Root binary found:" in serialized["data"]
|
|
|
|
def test_no_root_binaries_file(self, parent_data_path):
|
|
# Test behavior when no root_binaries.json file is present
|
|
empty_file_list = []
|
|
m = RootBinaries(target_path=parent_data_path, log=logging)
|
|
m.from_dir(parent_data_path, empty_file_list)
|
|
|
|
run_module(m)
|
|
|
|
assert len(m.results) == 0
|
|
assert len(m.alertstore.alerts) == 0
|