0

I'm doing the static analysis on Android APK file. Given the following source code:

protected void OkHttpClientCheck() throws IOException {
        OkHttpClient client = new OkHttpClient();

        Request request = new Request.Builder()
                .url("https://www.vogella.com/index.html")
                .build();

        Response response = client.newCall(request).execute();

    }

So I can extract this source code uses OkHttpClient to open a connection and the target URL by using pattern matching (likes grep with regex). My question is, how do we map the OkHttpClient API with the corresponding url? In other words, I would like to output: "https://www.vogella.com/index.html" is called by OkHttpClient.

Can androguard do it or I need to perform static analysis with Soot or Flowdroid?

I have tried androguard but it could not extract the detail inside a method. Is it true or did I miss something?

Andrew
  • 1
  • As you can see on the [androguard](https://stackoverflow.com/questions/tagged/androguard) question history this topic is used infrequently here on SO. For questions on reverse engineering there is a special site on Stackexchange: https://reverseengineering.stackexchange.com Unfortunately Stackoverflow does not allow migration of question to this site so you have to create a new topic. – Robert Jan 19 '23 at 08:19

0 Answers0