lazyinformant7
Lurker
Problem 1:
There's a certain app that's automatically configuring my system settings to 'allow app' to install from 'unknown sources'
1a. What's the best way to identify (this) specific malware code (and in general) from a decompiled app?
2a. Is this an 'activity, intent or service' that's executing this code?
3a. Is a app forced to declare 'activities, intents and services' via manifest.xml?
4a. Can I force the setting to 'Don't allow' via something like build.prop?
Problem 2:
In developer settings, my usb connection protocol is set to 'Allow file transfer' instead of 'Charge This Phone' when I connect my phone to anything.
2b. Is there a way of controlling this or setting specific commands?
Problem 3:
Anti-malware apps do a good job in general but they don't always pick up every malicious app or hidden code.
3b. Does anyone know any good resources, scripts, tips, guides or methods of combating malware manually? (Please exclude generic tips such as 'download from trusted sources' as the intentions are to disect malicious code and learn from it )
There's a certain app that's automatically configuring my system settings to 'allow app' to install from 'unknown sources'
1a. What's the best way to identify (this) specific malware code (and in general) from a decompiled app?
2a. Is this an 'activity, intent or service' that's executing this code?
3a. Is a app forced to declare 'activities, intents and services' via manifest.xml?
4a. Can I force the setting to 'Don't allow' via something like build.prop?
Problem 2:
In developer settings, my usb connection protocol is set to 'Allow file transfer' instead of 'Charge This Phone' when I connect my phone to anything.
2b. Is there a way of controlling this or setting specific commands?
Problem 3:
Anti-malware apps do a good job in general but they don't always pick up every malicious app or hidden code.
3b. Does anyone know any good resources, scripts, tips, guides or methods of combating malware manually? (Please exclude generic tips such as 'download from trusted sources' as the intentions are to disect malicious code and learn from it )