pr Smartphone Security Malware Exercise
|
|
- Olivia Audra Ryan
- 7 years ago
- Views:
Transcription
1 Technische Universität Darmstadt Fachbereich Informatik Fachgebiet Systemsicherheit Prof. Dr.-Ing. Ahmad-Reza Sadeghi pr Smartphone Security Winter term 2012/2013 M.Sc. Sven Bugiel Version 1.1 (October 27, 2012)
2 1 Development environment In this lab we use the Eclipse IDE. 1. Open Eclipse 2. On the bottom right you see Android development specific tools such as Logcat, Emulator control etc. Figure 1: Android development specific tools 3. In the top right corner you can switch to DDMS, the debugging view for Android if required. 4. Further, in the Menu Bar, you see two new entries: (a) for the Android SDK Manager (b) for the Android AVD (Android Virtual Device) Manager Figure 2: Android Menu Bar entries 5. Open the AVD Manager and start the device for platform version 2.2. Check the Wipe user data option! 6. You can observe the log output in the LogCat tool in eclipse or open a new shell and use the adb (Android Debug Bridge): $ adb logcat For a full list of the adb features (e.g., emulator control), please refer to the adb help page. 7. Once the device has been fully booted, add some contacts via the Contacts app. You can find the Contacts app by opening the Android Launcher (cf. Figure 3), then Contacts, and then using the Menu button of the device to get to Add Contact Figure 3: Android Launcher button 8. Now start the second device with platform version Once this second device has booted, go to the SMS ( Messaging ) app and send a test SMS to the first emulator device. The phone number of each device equals the number (e.g., 5554) in the title bar of the emulator window. 10. To end emulators, simply close their windows, no special shutdown procedure is required. 2
3 2 Over-privileged Apps / Botnet First, we will have a look at an overprivileged app, which misuses its privileges to harm the user s privacy and security. To this end, a very simple app is provided, MaliciousApp, which further connects to a very simple botnet controller, AttackController. 1. Open the MaliciousApp project in Eclipse and inspect the code: (a) which permissions does it use? (AndroidManifest.xml) (b) how does it operate? (e.g. handlemsg function in MaliciousAppActivity) (c) what is the purpose of the SMSListener class? (check the receiver tag in the manifest file) 2. Now, start the AttackController. A runnable JAR file can be found in the home directory: $ java -jar AttackController.jar Listening Start the 2.2 AVD without wiping user data, in order to preserve contacts, SMS, etc., and after it has booted, install and run the MaliciousApp by right-clicking on the project in the PackageExplorer and choosing Run as Android Application 4. When the app starts, you should see that the controller receives one connection and you are able to issue commands to the app. Check the source code of the app to find out which commands. Try some of the following: retrieve contacts data retrieve the list of SMS and read some SMS (of course there must be some SMS stored on the device) send with the second device (4.0.3) an SMS to the infect device and check that the controller retrieved this SMS in real-time. Alternatively, you can send the SMS with the Android tools in Eclipse or with the adb. 5. This attack resembles the Geinimi trojan attack, which extended apps with malicious functionality and modified their manifests to request the necessary permissions for the malicious code to function. What could be the reason why such malware is successful? Can you ad-hoc think of countermeasures to mitigate such attacks? 3 Confused deputy attacks Next, we will look at some simple, known confused deputy attacks on Android Terminate any emulator and the controller from task Open the ConfusedDeputy project 3. Launch the Android 2.2 emulator and run the ConfusedDeputy app on it 4. First, try the Toggle GPS attack. To verify that the attack works, compare the status of Launcher Settings Location & security Use GPS satellites before and after toggling. You can also add the Power Control widget to the desktop and see its GPS button change its status by the attack. 5. Next, try the Download file attack. This causes the Browser to start and download an APK file provided by a HTTP server on the host machine to the SDCard. To verify that the file was downloaded, press the Check file button. 6. Investigate how the sample attacks work (use to check out the vulnerability report mentioned in the source code). 3
4 7. Briefly explain how the browser was triggered to download the file and why is not trivial to prevent this attack. 8. Open the android-froyo project and open the only bookmark for this project. This bookmark will open the SettingsAppWidgetProvider class, which is the confused deputy in case of the Toggle GPS attack. Can you explain the vulnerability at this point? 4 Collusion Attack Now, we will look at how apps can collude via covert channels similar to the ideas presented in the SoundComber attack. 1. Terminate any emulator from the previous task. 2. Launch the Android 2.2 AVD with wiping the user data 3. Install the de_zuloo_mosel_contacthcreceiver and de_zuloo_mosel_hr apps, which are the receivers of the cover channels and do not provide an Activity (i.e., they do not show up in the launcher) 4. Now install the HCActivity app 5. Send a short message such as "Hello" using (a) the Audio (b) and the Airplane Mode channels 6. Observe the communication process with adb logcat 7. Can you think about counter-measures to mitigate such attacks? 5 Root exploits Last, we will use exploit code (rage-against-the-cage) in order to escalate the app s privileges. 1. Terminate all emulators from the previous task 2. Open the RunNative project 3. Which permissions does the app possess? 4. The entry point to the code is the oncreate function. From there analyze the control flow of the app and make a high-level sketch of its functionality. 5. Launch the Android 2.2 AVD 6. Send some SMS to the device using, e.g., the emulator control, the second (4.0.3) AVD, or via $ adb emu sms send <number> <text> 7. Next, run the RunNative app and check the log for the rooted message: D/RunNative( 477): R00ted 4
5 8. The app terminates itself after the rooting. Now restart the app using the launcher on the device (the app is called hijack). Observe the log for its behavior. Most probably, the second execution will crash as well after some time. 9. Verify that (a) the app could access the SMS database via the API despite the fact that it does not hold the necessary permission. What could be the reason? Hint: Also investigate the checkpermission function of the ActivityManagerService class in the android-froyo project (LeftStrg+LeftShift+R helps you finding the class) (b) the app has installed the Evil.apk that it carried in its assets. This app has no Activity, hence does not show up in the launcher, but can be found via the Settings Applications Manage Applications. The source code of Evil.apk is provided in Eclipse, check what it does (or could do). 10. Instead of carrying the exploit code and the APK as assets, could this app without any permissions retrieve this payload from somewhere else and hence circumvent, e.g., anti-virus scanners on the mobile device? 6 Optional: Fix the Toggle GPS vulnerability We now implement a quick fix for the Toggle GPS attack from task 3. The fundamental problem to tackle is, that BroadcastReceivers on Android can not implement themselves a fine-grained access control based on intent provenance within the receivers. The reason is an indirect call chain, meaning, that broadcast intents seem as to be originating from the Android system server (UID 1000) from the receivers point of view. Thus, in order fix this problem, we will add a (static) policy-driven access control to the broadcast subsystem. Alternative methods could be the tagging of Intents with their sender UID or building IPC call chains (c.f. Quire framework in the lecture slides). 1. Open the ActivityManagerService class in the android-froyo project. Hint: LeftStrg+LeftShift+T helps you finding it. 2. Extend the broadcastintent function with the following code just before the first synchronized: if((intent.getcomponent()!=null?intent.getcomponent().getclassname().equals("com.android. settings.widget.settingsappwidgetprovider"):false) && intent.hascategory(intent.category_alternative) && (Binder.getCallingUid()!=1000)) throw new SecurityException("Toggle GPS forbidden this way!"); 3. Now we will rebuild the system and boot the modified version: $ cd ~/android-froyo $ source build/envsetup.sh $ lunch 1 $ make -j3 $ out/host/linux-x86/bin/emulator -sysdir out/target/product/generic/ \ -system out/target/product/generic/system.img \ -ramdisk out/target/product/generic/ramdisk.img \ -data out/target/product/generic/userdata.img \ -kernel prebuilt/android-arm/kernel/kernel-qemu \ -sdcard sdcard.img 4. Export the CallDeputy APK by right-clicking on the project, then Android Tools Export Signed Application Package with the following information: Location of existing keystore: /home/android-lab/android_keystore 5
6 Password keystore: android-lab Alias: evil inc. Password key: android-lab Destination APK: /home/android-lab/calldeputy.apk 5. Possibly wait until the emulator has booted and install the CallDeputy.apk: $ cd $ adb install CallDeputy.apk 2153 KB/s (39923 bytes in 0.018s) pkg: /data/local/tmp/calldeputy.apk Success 6. Verify that toggling GPS with the ConfusedDeputy app results in a crash, because the new security exception is unhandled (see also the logcat). 6
Android Security Lab WS 2014/15 Lab 1: Android Application Programming
Saarland University Information Security & Cryptography Group Prof. Dr. Michael Backes saarland university computer science Android Security Lab WS 2014/15 M.Sc. Sven Bugiel Version 1.0 (October 6, 2014)
More informationProgramming Android Smart Phones. Tom Chothia Internet Computing Workshop
Programming Android Smart Phones Tom Chothia Internet Computing Workshop What is Android? A mobile phone operating system. Best selling smart phone OS. Runs on a range of hardware Based on Linux and Java
More informationUP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
More informationAndroid Development Exercises Version - 2012.02. Hands On Exercises for. Android Development. v. 2012.02
Hands On Exercises for Android Development v. 2012.02 WARNING: The order of the exercises does not always follow the same order of the explanations in the slides. When carrying out the exercises, carefully
More informationDeveloping In Eclipse, with ADT
Developing In Eclipse, with ADT Android Developers file://v:\android-sdk-windows\docs\guide\developing\eclipse-adt.html Page 1 of 12 Developing In Eclipse, with ADT The Android Development Tools (ADT)
More informationAndroid Application Repackaging
ISA 564, Laboratory 4 Android Exploitation Software Requirements: 1. Android Studio http://developer.android.com/sdk/index.html 2. Java JDK http://www.oracle.com/technetwork/java/javase/downloads/index.html
More informationRunning a Program on an AVD
Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run
More informationHow to Install Applications (APK Files) on Your Android Phone
How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android
More informationAndroid Framework. How to use and extend it
Android Framework How to use and extend it Lecture 3: UI and Resources Android UI Resources = {XML, Raw data} Strings, Drawables, Layouts, Sound files.. UI definition: Layout example Elements of advanced
More informationOracle FLEXCUBE Direct Banking Android Tab Client Installation Guide Release 12.0.3.0.0
Oracle FLEXCUBE Direct Banking Android Tab Client Installation Guide Release 12.0.3.0.0 Part No. E52543-01 April 2014 Oracle Financial Services Software Limited Oracle Park Off Western Express Highway
More informationAndroid Programming and Security
Android Programming and Security Dependable and Secure Systems Andrea Saracino andrea.saracino@iet.unipi.it Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System
More informationLogin with Amazon Getting Started Guide for Android. Version 2.0
Getting Started Guide for Android Version 2.0 Login with Amazon: Getting Started Guide for Android Copyright 2016 Amazon.com, Inc., or its affiliates. All rights reserved. Amazon and the Amazon logo are
More informationHow To Develop Android On Your Computer Or Tablet Or Phone
AN INTRODUCTION TO ANDROID DEVELOPMENT CS231M Alejandro Troccoli Outline Overview of the Android Operating System Development tools Deploying application packages Step-by-step application development The
More informationANDROID APPS DEVELOPMENT FOR MOBILE AND TABLET DEVICE (LEVEL I)
ANDROID APPS DEVELOPMENT FOR MOBILE AND TABLET DEVICE (LEVEL I) Who am I? Lo Chi Wing, Peter Lecture 1: Introduction to Android Development Email: Peter@Peter-Lo.com Facebook: http://www.facebook.com/peterlo111
More informationFile System. /boot /system /recovery /data /cache /misc. /sdcard /sd-ext. Also Below are the for SD Card Fie System Partitions.
Android File System Babylon University, IT College, SW Dep., Android Assist. Lecturer : Wadhah R. Baiee (2014) Ref: Wei-Meng Lee, BEGINNING ANDROID 4 APPLICATION DEVELOPMENT, Ch6, John Wiley & Sons, 2012
More informationAndroid Setup Phase 2
Android Setup Phase 2 Instructor: Trish Cornez CS260 Fall 2012 Phase 2: Install the Android Components In this phase you will add the Android components to the existing Java setup. This phase must be completed
More informationIslamic University of Gaza. Faculty of Engineering. Computer Engineering Department. Mobile Computing ECOM 5341. Eng. Wafaa Audah.
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Mobile Computing ECOM 5341 By Eng. Wafaa Audah June 2013 1 Setting Up the Development Environment and Emulator Part 1:
More informationOpenCV on Android Platforms
OpenCV on Android Platforms Marco Moltisanti Image Processing Lab http://iplab.dmi.unict.it moltisanti@dmi.unict.it http://www.dmi.unict.it/~moltisanti Outline Intro System setup Write and build an Android
More informationID TECH UniMag Android SDK User Manual
ID TECH UniMag Android SDK User Manual 80110504-001-A 12/03/2010 Revision History Revision Description Date A Initial Release 12/03/2010 2 UniMag Android SDK User Manual Before using the ID TECH UniMag
More informationAndroid Development. Marc Mc Loughlin
Android Development Marc Mc Loughlin Android Development Android Developer Website:h:p://developer.android.com/ Dev Guide Reference Resources Video / Blog SeCng up the SDK h:p://developer.android.com/sdk/
More informationSmartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
More informationProgramming with Android: SDK install and initial setup. Dipartimento di Informatica: Scienza e Ingegneria Università di Bologna
Programming with Android: SDK install and initial setup Luca Bedogni Marco Di Felice Dipartimento di Informatica: Scienza e Ingegneria Università di Bologna SDK and initial setup: Outline Ø Today: How
More informationGetting Started with Android Development
Getting Started with Android Development By Steven Castellucci (v1.1, January 2015) You don't always need to be in the PRISM lab to work on your 4443 assignments. Working on your own computer is convenient
More informationAndroid Tutorial. Larry Walters OOSE Fall 2011
Android Tutorial Larry Walters OOSE Fall 2011 References This tutorial is a brief overview of some major concepts Android is much richer and more complex Developer s Guide http://developer.android.com/guide/index.html
More informationAndroid Security Evaluation Framework
INTRODUCING... A S E F Android Security Evaluation Framework - Parth Patel $ whoami_ Agenda Manual Research Automation - A S E F Let s solve problems Conclusion Android OS Open Source Security Evaluation
More informationPentesting Android Mobile Application
Pentesting Android Mobile Application Overview on Mobile applications Connect in Superior Way!! Mobile market is the worldwide rapidly developing segments since many customers are using mobile phones.
More informationESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide
ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine
More informationHacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
More informationDeveloping NFC Applications on the Android Platform. The Definitive Resource
Developing NFC Applications on the Android Platform The Definitive Resource Part 1 By Kyle Lampert Introduction This guide will use examples from Mac OS X, but the steps are easily adaptable for modern
More informationQualcomm IR-I 2 C Bridge Demo
User s Guide June 2012 UG63_01.0 Qualcomm IR-I2C Bridge Demo Demo Setup The Qualcomm IR-I2C Bridge Demo setup consists of the ice-dragon Board which includes an IR-Receiver interfaced with an ice40 mobilefpga.
More informationl What is Android? l Getting Started l The Emulator l Hello World l ADB l Text to Speech l Other APIs (camera, bitmap, etc)
today l What is Android? l Getting Started l The Emulator l Hello World l ADB l Text to Speech l Other APIs (camera, bitmap, etc) l Other: Signing Apps, SVN l Discussion and Questions introduction to android
More informationAndroid Development. http://developer.android.com/develop/ 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系
Android Development http://developer.android.com/develop/ 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系 Android 3D 1. Design 2. Develop Training API Guides Reference 3. Distribute 2 Development Training Get Started Building
More informationGetting Started with Android Programming (5 days) with Android 4.3 Jelly Bean
Getting Started with Android Programming (5 days) with Android 4.3 Jelly Bean Course Description Getting Started with Android Programming is designed to give students a strong foundation to develop apps
More informationINTRODUCTION TO ANDROID CSCI 4448/5448: OBJECT-ORIENTED ANALYSIS & DESIGN LECTURE 11 02/15/2011
INTRODUCTION TO ANDROID CSCI 4448/5448: OBJECT-ORIENTED ANALYSIS & DESIGN LECTURE 11 02/15/2011 1 Goals of the Lecture Present an introduction to the Android Framework Coverage of the framework will be
More informationAnalysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
More informationDefending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
More informationIntroduction to Android Development. Jeff Avery CS349, Mar 2013
Introduction to Android Development Jeff Avery CS349, Mar 2013 Overview What is Android? Android Architecture Overview Application Components Activity Lifecycle Android Developer Tools Installing Android
More informationThe "Eclipse Classic" version is recommended. Otherwise, a Java or RCP version of Eclipse is recommended.
Installing the SDK This page describes how to install the Android SDK and set up your development environment for the first time. If you encounter any problems during installation, see the Troubleshooting
More informationAndroid Environment SDK
Part 2-a Android Environment SDK Victor Matos Cleveland State University Notes are based on: Android Developers http://developer.android.com/index.html 1 2A. Android Environment: Eclipse & ADT The Android
More informationUsing the Push Notifications Extension Part 1: Certificates and Setup
// tutorial Using the Push Notifications Extension Part 1: Certificates and Setup Version 1.0 This tutorial is the second part of our tutorials covering setting up and running the Push Notifications Native
More informationAndroid Environment SDK
Part 2-a Android Environment SDK Victor Matos Cleveland State University Notes are based on: Android Developers http://developer.android.com/index.html 1 Android Environment: Eclipse & ADT The Android
More informationWorkshop on Android and Applications Development
Workshop on Android and Applications Development Duration: 2 Days (8 hrs/day) Introduction: With over one billion devices activated, Android is an exciting space to make apps to help you communicate, organize,
More informationTOTAL DEFENSE MOBILE SECURITY USER S GUIDE
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted
More informationAndroid Basics. Xin Yang 2016-05-06
Android Basics Xin Yang 2016-05-06 1 Outline of Lectures Lecture 1 (45mins) Android Basics Programming environment Components of an Android app Activity, lifecycle, intent Android anatomy Lecture 2 (45mins)
More informationUniversità Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012
Android Development Lecture 1 Android SDK & Development Environment Università Degli Studi di Parma Lecture Summary - 2 The Android Platform Android Environment Setup SDK Eclipse & ADT SDK Manager Android
More informationU.S. Cellular Mobile Data Security. User Guide Version 00.01
U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4
More informationTomTom PRO 82xx PRO.connect developer guide
TomTom PRO 82xx PRO.connect developer guide Contents Introduction 3 Preconditions 4 Establishing a connection 5 Preparations on Windows... 5 Preparations on Linux... 5 Connecting your TomTom PRO 82xx device
More informationAllow Installation from Unknown Sources
Part 5 - Publishing Independently It is possible to publish an application without using any of the existing Android marketplaces. This section will explain these other publishing methods and the licensing
More informationDeveloping for MSI Android Devices
Android Application Development Enterprise Features October 2013 Developing for MSI Android Devices Majority is the same as developing for any Android device Fully compatible with Android SDK We test using
More informationIntroduction to Android Programming (CS5248 Fall 2015)
Introduction to Android Programming (CS5248 Fall 2015) Aditya Kulkarni (email.aditya.kulkarni@gmail.com) August 26, 2015 *Based on slides from Paresh Mayami (Google Inc.) Contents Introduction Android
More informationAndroid Malware for Pen-testing. IOAsis San Fransicso 2014
Android Malware for Pen-testing IOAsis San Fransicso 2014 Dr. Who? Robert Erbes Senior Security Consultant (not a doctor) Target Audience The Malicious Defender i.e., Someone who believes that the best
More informationPolicy for Staff and Post 16 Student BYOD (Bring Your Own Device)
Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...
More informationPenetration Testing Android Applications
Author: Kunjan Shah Security Consultant Foundstone Professional Services Table of Contents Penetration Testing Android Applications... 1 Table of Contents... 2 Abstract... 3 Background... 4 Setting up
More informationMercury User Guide v1.1
Mercury User Guide v1.1 Tyrone Erasmus 2012-09-03 Index Index 1. Introduction... 3 2. Getting started... 4 2.1. Recommended requirements... 4 2.2. Download locations... 4 2.3. Setting it up... 4 2.3.1.
More informationAndroid Security Extensions 2. Giovanni Russello g.russello@auckland.ac.nz
Android Security Extensions 2 Giovanni Russello g.russello@auckland.ac.nz Preparing the Report A report must be provided before your presentation The report should be 4 pages long The content of the report
More informationIntroduction to Android. CSG250 Wireless Networks Fall, 2008
Introduction to Android CSG250 Wireless Networks Fall, 2008 Outline Overview of Android Programming basics Tools & Tricks An example Q&A Android Overview Advanced operating system Complete software stack
More informationDeveloper's Cookbook. Building Applications with. The Android. the Android SDK. A Addison-Wesley. James Steele Nelson To
The Android Developer's Cookbook Building Applications with the Android SDK James Steele Nelson To A Addison-Wesley Upper Saddle River, NJ Boston «Indianapolis San Francisco New York Toronto Montreal London
More informationSecurity in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
More informationThe Behavioral Analysis of Android Malware
, pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,
More informationM100 System File Manager Help
Copyright (c) Vuzix Corporation 2013-2014. All Rights Reserved. M100 System File Manager Help Section I) Installation of the M100 Section II) General Information Section III) Troubleshooting Section IV)
More informationSetting up Sudoku example on Android Studio
Installing Android Studio 1 Setting up Sudoku example on Android Studio Installing Android Studio Android Studio provides everything you need to start developing apps for Android, including the Android
More informationIntroduction to Gear VR Development in Unity APPENDIX A: SETUP (WINDOWS 7/8)
Introduction to Gear VR Development in Unity APPENDIX A: SETUP (WINDOWS 7/8) 3-hour Workshop Version 2015.07.13 Contact us at hello-dev@samsung.com Presented by Samsung Developer Connection and MSCA Engineering
More informationLab 4 In class Hands-on Android Debugging Tutorial
Lab 4 In class Hands-on Android Debugging Tutorial Submit lab 4 as PDF with your feedback and list each major step in this tutorial with screen shots documenting your work, i.e., document each listed step.
More informationPentesting Android Apps. Sneha Rajguru (@Sneharajguru)
Pentesting Android Apps Sneha Rajguru (@Sneharajguru) About Me Penetration Tester Web, Mobile and Infrastructure applications, Secure coding ( part time do secure code analysis), CTF challenge writer (at
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationUsing Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
More informationFahim Uddin http://fahim.cooperativecorner.com email@fahim.cooperativecorner.com. 1. Java SDK
PREPARING YOUR MACHINES WITH NECESSARY TOOLS FOR ANDROID DEVELOPMENT SEPTEMBER, 2012 Fahim Uddin http://fahim.cooperativecorner.com email@fahim.cooperativecorner.com Android SDK makes use of the Java SE
More informationIntroduction to Android Development
2013 Introduction to Android Development Keshav Bahadoor An basic guide to setting up and building native Android applications Science Technology Workshop & Exposition University of Nigeria, Nsukka Keshav
More informationLab 0 (Setting up your Development Environment) Week 1
ECE155: Engineering Design with Embedded Systems Winter 2013 Lab 0 (Setting up your Development Environment) Week 1 Prepared by Kirill Morozov version 1.2 1 Objectives In this lab, you ll familiarize yourself
More informationPopular Android Exploits
20-CS-6053 Network Security Spring, 2016 An Introduction To Popular Android Exploits and what makes them possible April, 2016 Questions Can a benign service call a dangerous service without the user knowing?
More informationJMC Next Generation Web-based Server Install and Setup
JMC Next Generation Web-based Server Install and Setup This document will discuss the process to install and setup a JMC Next Generation Web-based Windows Server 2008 R2. These instructions also work for
More informationESET Mobile Security Windows Mobile. Installation Manual and User Guide
ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3
More informationThree Rivers Community College Wireless Network
Three Rivers Community College Wireless Network TRCC s Information Technology Division offers free wireless network connectivity for students. The network grants students high-speed access to the Internet
More informationChanging Your Cameleon Server IP
1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may
More informationESET Mobile Security Windows Mobile
ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3
More informationField Manager Mobile Worker User Guide for RIM BlackBerry 1
Vodafone Field Manager Mobile Worker User Guide for RIM BlackBerry APPLICATION REQUIREMENTS Supported devices listed here o http://support.vodafonefieldmanager.com Application requires 600 KB of application
More informationAPPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
More informationSmartphone Security 20-00-0615-pr. Sven Bugiel
Smartphone Security 20-00-0615-pr Sven Bugiel Organizational: Teams 2-3 Students per team Register your team by email to me Names, Student IDs, and email addresses of all team members Preferred and backup
More informationZipit Chat. Functional Specification / User Manual
Zipit Chat Functional Specification / User Manual 1 Table of Contents 1. Zipit Chat Overview... 4 How to download... 4 Supported version... 4 2. Functionalities... 4 Get Started... 4 Login... 7 Payment
More informationSteps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
More informationNow SMS/MMS Android Modem Quick Start Guide
Now SMS/MMS Android Modem Quick Start Guide Using a GSM modem, or an Android phone as a modem, is a quick and efficient way to get started with SMS and/or MMS applications. No special service provider
More informationTo begin, visit this URL: http://www.ibm.com/software/rational/products/rdp
Rational Developer for Power (RDp) Trial Download and Installation Instructions Notes You should complete the following instructions using Internet Explorer or Firefox with Java enabled. You should disable
More information1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux
CSC 482/582 Assignment #2 Securing SimpleWebServer Due: September 29, 2015 The goal of this assignment is to learn how to validate input securely. To this purpose, students will add a feature to upload
More informationAndroid Application Development: Hands- On. Dr. Jogesh K. Muppala muppala@cse.ust.hk
Android Application Development: Hands- On Dr. Jogesh K. Muppala muppala@cse.ust.hk Wi-Fi Access Wi-Fi Access Account Name: aadc201312 2 The Android Wave! 3 Hello, Android! Configure the Android SDK SDK
More informationAppUse - Android Pentest Platform Unified
AppUse - Android Pentest Platform Unified Standalone Environment AppUse is designed to be a weaponized environment for Android application penetration testing. It is a unique, free, and rich platform aimed
More informationWhat else can you do with Android? Inside Android. Chris Simmonds. Embedded Linux Conference Europe 2010. Copyright 2010, 2net Limited.
What else can you do with Android? Chris Simmonds Embedded Linux Conference Europe 2010 Copyright 2010, 2net Limited 1 Overview Some background on Android Quick start Getting the SDK Running and emulated
More informationBack-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13
Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13 The information contained in this guide is not of a contractual nature and may be subject to change without prior notice. The software described in this
More informationCisco Events Mobile Application
Welcome to the new free Cisco Events mobile application! Using this tool, participants can: Connect with peers and Cisco representatives attending an event virtually or onsite Earn points towards exclusive
More informationBoard also Supports MicroBridge
This product is ATmega2560 based Freeduino-Mega with USB Host Interface to Communicate with Android Powered Devices* like Android Phone or Tab using Android Open Accessory API and Development Kit (ADK)
More informationSilk Test 15.0. Testing Mobile Web Applications
Silk Test 15.0 Testing Mobile Web Applications Micro Focus 575 Anton Blvd., Suite 510 Costa Mesa, CA 92626 Copyright Micro Focus 2014. All rights reserved. Portions Copyright 1992-2009 Borland Software
More informationBeginners Guide to Android Reverse Engineering
(W)ORK-SH/OP: Beginners Guide to Android Reverse Engineering (W)ORK-SH/OP: sam@ccc.de Hall[14], Day 3 11:00h Agenda Purpose Recommended or needed tools (De)construction of Android apps Obtaining APKs Decompiling
More informationVPS Remote Computing. Connecting to a Windows Server for the first time. 1 Your Server has been installed. 2 Finding the login details for your Server
Connecting to a Windows Server for the first time This document will take you through the process of connecting to a Windows Virtual server for the first time. To connect to your server you need to find
More informationSilk Test 17.0. Testing Mobile Applications
Silk Test 17.0 Testing Mobile Applications Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 1992-2016. All rights reserved. MICRO
More informationNew Lab Intro to KDE Terminal Konsole
New Lab Intro to KDE Terminal Konsole After completing this lab activity the student will be able to; Access the KDE Terminal Konsole and enter basic commands. Enter commands using a typical command line
More informationHelp. F-Secure Online Backup
Help F-Secure Online Backup F-Secure Online Backup Help... 3 Introduction... 3 What is F-Secure Online Backup?... 3 How does the program work?... 3 Using the service for the first time... 3 Activating
More informationProgramming with Android: SDK install and initial setup. Dipartimento di Informatica: Scienza e Ingegneria Università di Bologna
Programming with Android: SDK install and initial setup Luca Bedogni Marco Di Felice Dipartimento di Informatica: Scienza e Ingegneria Università di Bologna SDK and initial setup: Outline Today: How to
More informationHow To Develop An Android App On An Android Device
Lesson 2 Android Development Tools = Eclipse + ADT + SDK Victor Matos Cleveland State University Portions of this page are reproduced from work created and shared by Googleand used according to terms described
More informationTitle: Appium Automation for Mac OS X. Created By: Prithivirajan M. Abstract. Introduction
Title: Appium Automation for Mac OS X Created By: Prithivirajan M Abstract This document aims at providing the necessary information required for setting up mobile testing environment in Mac OS X for testing
More informationTowards Taming Privilege-Escalation Attacks on Android
Towards Taming Privilege-Escalation Attacks on Android Sven Bugiel 1, Lucas Davi 1, Alexandra Dmitrienko 3, Thomas Fischer 2, Ahmad-Reza Sadeghi 1,3, Bhargava Shastry 3 1 CASED/Technische Universität Darmstadt,
More information