Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
Nathan is a 5.1.1 SDK 22 AOSP Android emulator customized to perform mobile security assessment.
Supported architectures:
- x86
- arm (soon)
The emulator is equipped with the Xposed Framework and the following pre-installed modules:
- SSLUnpinning, to bypass SSL Certificate pinning.
- Inspeckage, to perform the dynamic analysis of an application.
- RootCloak, to bypass root detection.
The following tools are already installed:
- #SuperSU: Superuser access management tool
- Drozer: Comprehensive security and attack framework for Android
Features
- Only python 2.7.x required
- Hooking ready with Xposed
- Pre-installed tools for application analysis
- Fully customizable
- Snapshot and restore of user data
Installation
Download Nathan core scripts from git:
$ git clone https://github.com/mseclab/nathan/
$ cd nathan
Init Nathan for the first time (for downloading firmware files)
$ ./nathan.py init
If a proxy is required to download files, the parameter -dp is available :
$ ./nathan.py init -dp 127.0.0.1:3128
The init command downloads all the files required to run use Nathan Emulator.
Usage
To start Nathan:
$ ./nathan.py start
To redirect the traffic through a proxy (es. http://127.0.0.1:3128), the parameter -p can be used:
$ ./nathan.py start -p http://127.0.0.1:3128
To create a snapshot of current user image data with a label (current in this case):
$ ./nathan.py snapshot -sl current
To restore the emulator to the snapshot with label current:
$ ./nathan.py restore –rl current
To get a list of available snapshots to restore:
$ ./nathan.py restore –ll
Every time the emulator is started, a temporary copy of system image is created and each changes made to system data is lost when the emulator is powered off.
To keep permanent the changes, the command freeze is available:
$ ./nathan.py freeze
To push files from a folder to a running Nathan emulator, the command push is available:
$ ./nathan.py push -f folder
The complete list of command is:
usage: nathan.py [-h] [-v] [-a ARCH]
{init,start,snapshot,restore,freeze,push} …
Optional arguments:
-h, –help show this help message and exit
-v, –verbose Show emulator/kernel logs
-a ARCH, –arch ARCH Select architecture (arm/x86) – Default = x86
Command to run:
{init,start,snapshot,restore,freeze,push}
init Download and init Nathan emulator
start Start Nathan emulator
snapshot Create userdata image snapshot
restore Restore userdata image snapshot
freeze Freeze temporary system image
push Push files to Nathan emulator
The parameter -h for each command shows specific options.
www.extremehacking.org
Sadik Shaikh | Cyber Suraksha Abhiyan, Ethical Hacking Training Institute, CEHv9,CHFI,ECSAv9,CAST,ENSA, CCNA, CCNA SECURITY,MCITP,RHCE,CHECKPOINT, ASA FIREWALL,VMWARE,CLOUD,ANDROID,IPHONE,NETWORKING HARDWARE,TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking,Center For Advanced Security Training in India, ceh v9 course in Pune-India, ceh certification in pune-India, ceh v9 training in Pune-India, Ethical Hacking Course in Pune-India