Mobile Application Security Testing
|
|
|
- Arline Roberta McDaniel
- 10 years ago
- Views:
Transcription
1 Mobile Application Security Testing Author: Gursev Kalra Senior Security Consultant Foundstone Professional Services 1
2 Table of Contents Table of Contents...2 Introduction...3 Test Environment...3 Mobile Installable Applications...4 Application Footprint Analysis...4 Reverse Engineering...7 Reversing a Java MIDlet...7 Reversing a Symbian Application...9 Browser Based Mobile Applications The User-Agent Request Header The Accept Request Header Intercepting Application Traffic with a Web Proxy Configuring Proxy Settings for Nokia S40 Phones Configuring Proxy Settings for Nokia S60 Phones Web Proxy, Mobile Applications and HTTPS Various Proxy Configurations Proxy on a Static Public IP Proxy on a WLAN Proxy with One Phone Proxy with an External Internet Connection Conclusion About the Author Acknowledgements About Foundstone Professional Services
3 Introduction The consumer mobile application market has seen explosive growth in the last couple of years. These applications have provided convenient access to bank accounts, credit card data, personally identifiable information (PII), travel itineraries and personal s to name a few. The enterprise mobile applications extend corporate networks beyond the perimeter devices and thus potentially expose these organizations to new types of security threats. Security risks associated with these applications can often be identified and mitigated by subjecting them to security testing. Compared to desktop or web applications, mobile applications are harder to test for security, and hence, in our experience, are often less tested. At the same time, these applications are not necessarily more secure than desktop or web applications. We, therefore, document a methodology followed for testing mobile applications. This methodology is similar to that which experienced security testers would use for desktop or web applications, so we focus on the specific challenges that are unique to mobile application security testing. We will discuss the testing approach for mobile installable applications as well as those that are browser based. We discuss in detail the use of tools, such as proxies, to intercept and monitor all application traffic. While the examples discussed in this paper focus on Nokia related devices, the lessons learnt have been applied at Foundstone to a variety of mobile platforms with the tools being different. Test Environment Before we begin discussing the details of the methodology, it is useful to define our test environment in use throughout this paper. The software and hardware in use include: Nokia PC Suite Nokia E61i (Nokia S60 Series device). All the operations were performed on this phone unless otherwise noted. 3 Nokia 6212 (Nokia S40 Series device). Used to elaborate some scenarios. Home wireless router
4 Mobile Installable Applications These applications get installed to the phone file system. Similar to applications that are installed on desktops, a new application adds files, modifies registry entries and configuration settings, registers new services, and performs other such activities during installation. For a good penetration test, it is important that all these components be analyzed and tested. File system analysis and application reversing are two important aspects of performing client side analysis and they are discussed in this section. Application Footprint Analysis For applications that get installed on the phone, application footprint analysis begins even before the installation. The file system fingerprint of installed applications must be closely monitored and analyzed. Developers often assume that the phone memory is a safe storage location and use it to store sensitive information like usernames, passwords and other PII. Phone file system analysis is a tedious process and should be done carefully. When analyzing the phone s file system, the main goals are: 1. Identify the files created on the phone by the application during installation. If the option is available, install the application to external storage such as a Compact Flash card. This is because some mobile phone models (like Nokia S40 and S60 series phones) do not allow access to all the contents of the phone s internal storage making our job of analyzing those files difficult. Once the files are identified, further analysis like reversing the application, modifying the application and extracting hidden secrets can be performed. 2. Identify changes made to existing files over multiple application operations. 3. Analyze the information written to the phone file system during various stages of operation. We will follow a series of steps to analyze the phone file system which are discussed in detail below: Step 1 Directory & File Selection: Even though the phone file system is very small in size as compared to a desktop, the level of effort required to analyze it can be further reduced by careful selection of filesystem components. The purpose of directory selection is to reduce the number of phone file system directories and hence, files, to be analyzed during testing. The following process can be followed to come up with the minimum list of directories to be monitored for your phone and application: 4
5 1. Generate a recursive directory listing of the phone file system and store it on a different computer for future reference. 2. Install the mobile application and create a second recursive directory listing of the phone file system. Do not perform any other actions beyond application installation. Any configuration changes or application browsing may alter or remove files which, in turn, might affect the testing. 3. Compare both of the directory listings using diff tools like ExamDiff1 for Windows or diff for *NIX systems. This will provide a listing of the newly created files. 4. To be thorough, manually analyze the file system to identify the directories in which applications might install their files. 5. After careful consideration, develop a final list of files and directories which will be considered for analysis. In our test environment, out of the 16 directories available by default on the root file-system of our test phone (Nokia E61i), only 6 were chosen for active monitoring. All the newly created files were copied to a desktop for further analysis. Step 2 Fingerprinting: In step 1, our main concern was to identify the files and directories for active monitoring. Now we shift our focus to concentrate on what is inside the files and when the contents get changed. The easiest way to keep track of file changes is to create content hashes (MD5, SHA1, SHA 256 etc ) and compare them amongst various application runs. Use tools like md5deep2 (or sha1deep or sha256deep) to generate a MD5 (or SHA1 or SHA256) hash of all the files in the directories of interest. Any change made to contents of an existing file will change the file hash which can be detected when performing comparisons of file hashes between various runs. A command to create recursive file hashes of the relevant directories on the phone file system would look something like: 1 md5deep belongs to a set of open source hashing utilities which can be obtained from Other hash utilities available with this suite are hashdeep, sha1deep, sha256deep, tigerdeep and whirlpooldeep. The distributions supported are Linux, Solaris, Mac OS X, BSD and HP/UX. Other hashing tools are also available. 2 5
6 md5deep -k -r k:\sys k:\system k:\shared k:\resource k:\private k:\data > First_FingerPrint.txt This command recursively explores the directories and calculates the MD5 hash of all the files encountered. The output generated is written to the file First_FingerPrint.txt. Now we have a post installation hash of all files from our directories of interest. Step 3 Configuration and usage: Launch and configure the application and exercise the various use cases supported by the application. For example, add a credit card to a mobile wallet application, or read s if the software is a mail client. Step 4 Fingerprinting and comparison: Create a new hash fingerprint of all the directories of interest and compare the results with the results from step 2. Make a copy of files that are new and / or have their content changed. Figure 1 shows the sample diff of files generated in Step 4 and Step 2. Figure 1: Difference between two fingerprint files. Two additional files (highlighted in blue) on the left were created by the application after it was run. Step 5 Content analysis: The files copied in step 1 and 4 should be analyzed to look for sensitive information or other important data that the application might store in the mobile memory. 6
7 During Foundstone s testing of mobile applications, we have found instances of unencrypted credit card numbers, username and passwords for accounts. Testers can create appropriate regular expressions to aid in their searches. NOTE: For Nokia phones, remember to run the phone in Data Transfer Mode while generating file hashes. Hashes of the files on phone memory can be easily calculated after mounting the phone memory as a data device on your computer. Reverse Engineering We have thus far successfully installed, configured and thoroughly exercised the application under test. A thorough file system analysis is also completed. We thus know about all the files that have been installed on the phone, the changes made to these files after various actions performed and contents of these files. Armed with this knowledge, we enter the reversing phase. Application reverse engineering is performed with the following objectives: 1. Attempt to uncover application logic and code. This will help us modify the application code if needed and thus overcome any security measures the application might have. Trusting the client environment is a common occurrence in many mobile applications and hence, if we can find some way to bypass client security mechanisms, it often provides us with privileged access to the server and beyond. 2. Identify implementation and / or design flaws and find possible methods to exploit them. 3. Look for hidden secrets like passwords, encryption keys and other sensitive data in application code. The two most common types of applications available for Nokia phones are Java MIDlets and Symbian applications. An introduction to reversing each of these follows. Reversing a Java MIDlet The Java Application Descriptor (JAD) file and the Java Archive (JAR) file together are the two components of a MIDlet suite. The JAD file describes the MIDlet suite and includes its name, the location and size of the JAR 7
8 file, and the configuration and profile requirements. The file may also contain other attributes, defined by the Mobile Information Device Profile (MIDP)3, the developer, or both. The purpose of reversing is to extract information from JAR files, decompile them and then dissect the code as per the test requirements. If required, the mobile application can be modified or even re-written during the reversing phase to aid in testing. Extracting contents from a JAR: The JAR file format is built on the ZIP file format. Therefore, it is possible to create or extract JAR files using a jar command that is available with the JDK. The command jar -xf testfile.jar extracts all files from the JAR file. Popular ZIP programs like WinZip, WinRAR and gunzip can also be used to extract contents of a JAR file. To use WinZip, change the extension of the.jar file to.zip and extract the contents like a ZIP archive. Figure 2 below shows the contents of a.jar file opened within WinZip. Figure 2: A JAR file opened by WinZip Decompiling class files: After extracting all / selected files from the application JAR, select the class files on which further analysis is to be performed. Class files represent Java byte code and can be easily decompiled using a tool such as JAD
9 Source Sifting for hidden secrets: Scan the decompiled code and extracted contents for hidden secrets like encryption keys, hardcoded username/password or any other sensitive information from source code. Source code analysis, modification and re-compilation: Investigate the decompiled code to identify application functionality of interest. Per your requirement, modify or delete the obtrusive code sections and recompile the jar file. Decompiling, code analysis, modification and re-compilation become difficult if the application code was obfuscated during the compilation process. For more details on decompiling, recompiling and signing of client side Java code, refer to Foundstone s detailed paper on this topic available on our website5. Reversing a Symbian Application Symbian applications are compiled to.sis and.sisx files. Symbian applications can be installed on Nokia devices using Nokia PC Suite or by copying the file to phone memory and executing it from there. Executing.SIS and.sisx files extracts their contents and installs the corresponding application on the supported Symbian device. These applications run natively on the Symbian Operating System. SISWare and SISXplorer are two freeware tools which will aid you in Symbian application reversing. SISWare SISWare6 is a Symbian Application Install package builder. 4 JAD is a decompiler for the Java programming language. JAD provides a command line user interface to extract Java source code from class files. More information is available at
10 Figure 3: SISWare SISWare supports SISX and SIS file creation and extraction for Symbian9.x as well as previous versions. The current version of SISWare is 4.8 and is what we describe and use below. Key features of this useful utility include: Open and extract files from a SIS package. Edit, compile and re-build a SIS file. Batch extraction of multiple SIS files. Sign and Un-sign SIS files. Create self-signed certificate file. A sample screenshot of SISWare is shown in Figure 3. 10
11 SISXplorer Figure 4: SISXplorer Showing the Contents of a Symbian Application SISXplorer7 is a read only utility which allows you to inspect and extract all the content from Symbian 3rd edition installation packages. A summary of the functions supported by SISXplorer are: 7 SIS Viewer / Extractor - View and extract the files from SIS archives TXT Viewer - View text files E32 Viewer - View detailed header information RSC Viewer - View resources 11
12 MIF Viewer - View and extract SVG icons Integrated MBM Manager - View and extract images and icons from themes Integrated Hexadecimal Viewer Inspect file content Quick Open / Extract - Quickly extract files Multiple Archives View - Simultaneously work with multiple SIS archives Information Viewer View detailed information about each archive and contained files A screenshot of this tool is shown in Figure 4. Browser Based Mobile Applications A number of mobile applications we encounter are browser based and do not require any installable components. Often, attempts to access these applications using common desktop browsers either redirects users to the regular application (as opposed to the mobile version) or returns an error page. Web servers analyze the request headers to identify the device type and the browser to make their decisions on content rendering. Two request headers8 often used to make content rendering decision are the User-Agent and The Accept request header. The User-Agent Request Header All web browsers include a User-Agent header in their requests. This header is used to identify the web browser (Internet Explorer, Firefox, Opera for instance) and also the device on which the browser is running. Almost all the major mobile phone browsers include the device type in the User-Agent header. A number of web servers / applications, in turn, depend on this request header to render content and provide functionality. For example, when is accessed from a computer using Internet Explorer or Firefox, the web server redirects the browser to When the same URL ( is accessed from a mobile phone browser, the user is presented with a page where they can download a variety of Google mobile applications. As you would expect, changing (as we will
13 illustrate below) the User-Agent header on your desktop to that of a mobile device supported by the web server, causes the web pages returned to be those intended for that device. This behavior can be utilized to benefit testing and we, therefore, discuss active User-Agent manipulation using a number of techniques. Using a Web Proxy: Most web proxies (like Paros9 or Fiddler10) provide the user with an option to modify request headers using either regular expressions or through direct substitutions. In most cases, this is a onetime configuration change and requires you to know the User-Agent header for the device being tested. For example, the Nokia E61i phone User-Agent header is: User-Agent: NokiaE61i-1/3.0 ( z.05) SymbianOS/9.1 Series60/3.0 Profile/MIDP-2.0 Configuration/CLDC-1.1 Configuring the web proxy to replace the existing User-Agent header to the one above may allow you to potentially access web applications supporting E6i1 phones from your computer. Firefox User Agent Switcher add-on11: This convenient add-on allows you to create and store multiple arbitrary user agent headers as can be seen in Figures 5 and 6. A mobile user agent profile can be activated to browse the application just as you do from your mobile phone without the need for a web proxy to change the headers
14 Figure 5: Configuration of User Agent Switcher Firefox Add-on. Figure 6: User Agent Switcher activated to change the User-Agent header in Firefox to that of the E61i The Accept Request Header All web browsers include an Accept header in their requests. This header is used to notify the server about the type of data the browser can accept. For instance, web servers utilize the Accept header to determine whether the browser can read Wireless Markup Language (WML) pages and thus return the appropriate content. The WMLbrowser add-on12 for Firefox adds support to view WML pages and modifies the Accept header to reflect the same. The advantage of using a tool such as this is that once your desktop browser is configured to browse through the application, all testing can be performed as a regular web application penetration test
15 This, in our experience works in most cases. However, every once in a while we run into situations where despite changing the headers described above, the server will not treat your desktop browser as if it were a mobile device. In this case, an external web proxy can be set-up for the mobile device and all the application traffic can be routed through it. We discuss this next but, it is important to note that browsing the application from your mobile phone does have the drawbacks of a lack of speed with which testing can be performed as well as the tools available for use. Intercepting Application Traffic with a Web Proxy Until this point, while we have successfully watched the application s device footprint and perhaps accessed the application from a desktop browser, we know little about the type of requests being sent to the server or the resources that were being accessed there. Even if we are successful in application reversing / creating a new client, it helps to route our application traffic through a web proxy so that we can intercept it, view application behavior in detail and modify data for data validation, authorization and other areas of testing. Intercepting application traffic gives us complete control over the client server interaction and this, in turn, helps us perform a thorough test. Further, after successfully routing application traffic through a web proxy, all testing can be performed in a similar fashion as a regular web application using familiar tools and techniques. The examples discussed below were tested with Nokia devices on GPRS data networks. However, mobile phones over 3G networks can also be configured in a similar fashion. The Basics: In GPRS networks, data communications of a mobile phone are routed through GPRS Access Points. To initiate an Internet connection from the device, it is first necessary to point it to the correct Access Point Name (APN). Telecom operators specify different APNs for different types of services such as web browsing, and instant messaging. Each APN, as you would expect, has an associated IP Gateway / Proxy which is used to route all traffic. As testers, if we are able to change the IP Gateway / Proxy of an Access Point, we can route all application traffic through our own proxy. The technique for changing this configuration varies from device to device and, on some, can be fairly complicated. Through the rest of this paper, we will configure proxy settings for Nokia S40 and S60 phones. 15
16 Configuring Proxy Settings for Nokia S40 Phones The Nokia S40 phone is an example of a device where changing proxy settings can be non-trivial. Network access settings for S40 devices are specified in a provisioning document and there is no functionality provided by the phone operating system itself to edit the proxy settings for an access point. However, the provisioning document can be created on a PC, and then transferred to the phone. In order to do this we need to understand the basics of two languages commonly used to define such configuration: WML and WBXML. WML is based on XML and is a markup language intended for devices that implement the Wireless Application Protocol (WAP). In the context of this paper we are primarily concerned with the fact that mobile service providers typically use WML to represent their Access Point Names and corresponding settings. WBXML (WAP Binary XML) is a binary representation of WML. It was developed by the Open Mobile Alliance as a standard to allow XML documents to be transmitted in a compact manner over mobile networks. The provisioning document for Nokia S40 phones is in the WBXML file format. Given its binary format, it helps to use a WML to WBXML converter to create a provisioning document. One such converter is the open source WBXML Library13. For our purpose, we will use the xml2wbxml executable within this library to create the provisioning document. The steps to do this for the Nokia S40 are detailed below: 1. The WML file containing the GPRS settings for the mobile service provider can be obtained by contacting the service provider and / or searching for it on the Internet. While using configuration settings from the Internet sources, make sure to confirm the same with the service provider before installing them on the phone. 2. Edit the WML file containing the Access Point settings of the mobile service providers. In the WML file, change the proxy settings to point to your own proxy IP and port. This proxy will be utilized to monitor, intercept and modify the traffic generated by the mobile application. See the sample below: 3. Compile the updated WML file to create a WBXML provisioning document with the following command: xml2wbxml.exe -o Modile_Service_Provider.prov Modile_Service_Provider.wml Make sure that the output provisioning document ends with the.prov extension
17 4. Push the provisioning document to the test phone using Bluetooth. On receiving the provisioning document, the phone will recognize the configuration settings and will issue a prompt to save them. It is important to not just copy the provisioning document to the phone file system since the provisioning documents are recognized only when they are deployed Over the Air (OTA). 5. Next, browse to Menu Settings Configuration Default config. sett. and set the configuration to the compiled configuration. 6. Select Act. def. in all apps. to ensure that the new custom configuration is utilized for all communications. Example WML: XYZ-Mobile.wml <?xml version="1.0"?> <!DOCTYPE wap-provisioningdoc PUBLIC "-//WAPFORUM//DTD PROV 1.0//EN" " <wap-provisioningdoc version="1.0"> <characteristic type="bootstrap"> <!-- Name of the configuration --> <parm name="name" value="xyz-mobileweb AP"/> </characteristic> <!-- Defines how network access occurs --> <characteristic type="access"> <parm name="rule" value="default Rule"/> <!-- Connect through specified proxy --> <parm name="to-proxy" value="xyzwebproxy"/> </characteristic> <!-- Defines proxy parameters --> <characteristic type="pxlogical"> <parm name="proxy-id" value="xyzwebproxy"/> <parm name="name" value="xyzweb Proxy"/> <characteristic type="pxphysical"> <parm name="physical-proxy-id" value="xyzweb Proxy"/> <parm name="pxaddr" value=" "/> <parm name="pxaddrtype" value="ipv4"/> <parm name="pushenabled" value="0"/> <characteristic type="port"> <parm name="portnbr" value="8888"/> </characteristic> <!-- Connect through specified access point --> <parm name="to-napid" value="xyzwebnap"/> 17
18 </characteristic> </characteristic> <!-- Defines Network Access Point (NAP) parameters --> <characteristic type="napdef"> <parm name="napid" value="xyzwebnap"/> <parm name="name" value="xyzweb NAP"/> <parm name="bearer" value="gsm-gprs"/> <parm name="nap-address" value="wap.xyz.com"/> <parm name="nap-addrtype" value="apn"/> <characteristic type="napauthinfo"> <!-- PAP is "normal" authentication --> <parm name="authtype" value="pap"/> </characteristic> </characteristic> </wap-provisioningdoc> Example: Sample xml2wbxml run to compile a WML file to WBXML C:\Tools>xml2wbxml.exe -n -o XYZ-Mobile.prov XYZ-Mobile.wml Opened logfile `xml2wbxml.log' *************************** Converting file: XYZ-Mobile.wml Element: <wap-provisioningdoc> Attribute: version = 1.0 End Attributes... Element: <parm> Attribute: name = NAME Attribute: value = XYZWeb Proxy End Attributes... Element: <parm> Attribute: name = PXADDR Attribute: value = End Attributes Element: <parm> Attribute: name = PXADDRTYPE Attribute: value = IPV4 End Attributes... Element: <characteristic> Attribute: type = PORT End Attributes Element: <parm> Attribute: name = PORTNBR 18
19 Attribute: value = 8888 End Attributes End Element... xml2wbxml succeeded... C:\Tools> Configuring Proxy Settings for Nokia S60 Phones In comparison to the steps described above, changing proxy settings for Nokia S60 smart phones is easy and can be quickly accomplished. Given this, if you have a choice of devices to use for testing, always go with the smart phone. The steps on a Nokia S60 E61i phone: 1. Browse to Menu Settings Connection Access points. 2. Go to Options New access point Use existing settings. a. To use an access point of the service provider, select one of the configuration settings of the service provider and change the connection name to Custom Proxy. b. If the test phone is WLAN enabled, choose a WLAN access point for new settings and change the connection name to Custom WLAN Proxy. This will enable you to host a web proxy on your local network. 3. In either case, open the newly created access point for editing; go to Advanced Settings and change the proxy server IP and port to point to your own web proxy. Web Proxy, Mobile Applications and HTTPS It is important to note that everything discussed above would work well if the mobile application being tested does not utilize HTTPS. In the real world, however, this is often not the case. Mobile applications will generally rely on the device s certificate store to determine trusted certificate authorities. If the signing certificate is not found in this trusted certificate store, communication is not established. Fiddler is an example of a proxy which has its own signing certificate, which, as you would expect, is not part of the device s trusted store. With a little bit of tweaking however, it is possible to use such proxies for scenarios where HTTPS is involved. To use these proxies for traffic interception, we must first import their 19
20 signing certificates into the device s trusted certificate store. One of the possible ways to achieve this on Nokia S40 and S60 devices is discussed below: 1. From your PC, extract the web proxy s signing certificate in DER format. This can be easily achieved in Internet Explorer using the following steps: a. Configure Internet Explorer to route traffic through the web proxy of your choice. b. Visit any page website that requires SSL. c. Ignore the browser certificate error and continue browsing to the main page of the application. d. Choose the View Certificate option of Internet Explorer to view the web proxy s signing certificate (Figure 7 shows the options to be used in Internet Explorer). e. Copy the web proxy s signing certificate to a file in DER format (Figure 8 shows certificate export in DER format). 2. Copy the certificate file obtained above to a Web server 3. Set the MIME type of the directory to which the certificate is copied to application/x-x509-cacert (consult your web server documentation for information on how to achieve this) 4. Use the web browser in the S40/S60 device to browse to the certificate file 5. Import the certificate Once these steps or similar ones for the test device have been completed, you will be well on your way to test SSL enabled mobile applications. IMPORTANT: Make sure that the certificate imported above is deleted or untrusted soon after your testing is complete. Failing to do so may make your phone vulnerable to Man in the Middle attacks in the future. 20
21 Figure 7: Viewing a Web Proxy s signing certificate 21
22 Figure 8: Exporting Web Proxy s signing certificate in DER format Various Proxy Configurations Depending on the availability of hardware, various proxy configurations can be utilized to route, intercept and modify application traffic. This section summarizes some of the proxy configurations which you might find useful for your testing: 1. Proxy over a Static Public IP 2. Proxy over WLAN 3. Proxy with One Phone 4. Proxy with an External Internet Connection 22
23 Proxy on a Static Public IP If you have a static public IP at your disposal for testing, this is the configuration for you. Configure your firewall so that it allows traffic to reach the port on which the web proxy is listening (8888, in this case). This setup is easy to configure on mobile phones. For Nokia S40 phones, a single provisioning document can be deployed on any number of phones when required. For Nokia S60 phones, one custom configuration can be used throughout the testing. Figure 9: Outgoing traffic flow when a public IP is used to host the web proxy Proxy on a WLAN If you do not have a static public IP but the test phone supports wireless LAN, it is just as simple to setup a proxy on your internal network. Assuming the WLAN network utilizes static IPs or DHCP with a long lease 23
24 period, only one provisioning document will be necessary to complete multiple tests for Nokia S40 phones. Similarly for S60 phones, one custom configuration can be used throughout the testing. Figure 10: Outgoing traffic flow when a web proxy is hosted in a WLAN environment Proxy with One Phone If neither of the two options discussed above are available, testing can still be performed. This configuration is also useful when the server for the application being tested resides inside the premises of the service provider and the application hosting server does not accept any external traffic. This setup assumes that the test phone has a modem which can be used to connect your computer (which is hosting a web proxy) to the Internet. This is otherwise known as tethering. Once your computer is connected to the Internet, obtain its 24
25 IP address14. This address must then be configured as the address for the device web proxy. The procedure for changing the proxy is described above but, it is important to note that you might have to do this multiple times if the IP address assigned to your computer changes. Figure 11: Outgoing traffic flow when testing phone is used as a modem Proxy with an External Internet Connection A final configuration that may apply in some scenarios assumes that you have a data card or a USB modem or another phone which can be used to connect your web proxy hosting computer to the Internet. Once your computer is connected to the Internet, obtain its external IP address as before. This address must then be configured as the address for the device web proxy A service such as maybe used for this purpose.
26 Figure 12: Outgoing traffic flow when a USB modem is used to connect web proxy hosting computer to the Internet Conclusion Mobile applications have already made inroads into large enterprises and, with time, we will start seeing more mission critical applications being available for mobile devices. This whitepaper is intended to help the reader understand how they can leverage the tools and techniques they are already familiar with and apply those to mobile applications. 26
27 About the Author Gursev Kalra serves as a Senior Security Consultant at Foundstone Professional Services, A Division of McAfee. Gursev focuses on web application penetration testing, external assessments and mobile application security testing. Gursev has also developed internal tools for internal / external network assessments. At Foundstone, Gursev has had the opportunity to work with some of the biggest financial institutions, technology and telecom companies. Acknowledgements Rudolph Araujo provided significant support with reviewing the white paper. About Foundstone Professional Services Foundstone Professional Services, a division of McAfee. Inc. offers expert services and education to help organizations continuously and measurably protect their most important assets from the most critical threats. Through a strategic approach to security, Foundstone identifies and implements the right balance of technology, people, and process to manage digital risk and leverage security investments more effectively. The company s professional services team consists of recognized security experts and authors with broad security experience with multinational corporations, the public sector, and the US military. 27
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Stealth OpenVPN and SSH Tunneling Over HTTPS
Stealth OpenVPN and SSH Tunneling Over HTTPS Contents Tunneling OpenVPN and SSH via HTTPS for Windows,MAC and Linux... 1 Benefits of HTTPS Tunneling:... 2 Pre-Requisites:... 3 Part A: Step by Step Instructions
Penetration Testing Android Applications
Author: Kunjan Shah Security Consultant Foundstone Professional Services Table of Contents Penetration Testing Android Applications... 1 Table of Contents... 2 Abstract... 3 Background... 4 Setting up
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
Pentesting Android Mobile Application
Pentesting Android Mobile Application Overview on Mobile applications Connect in Superior Way!! Mobile market is the worldwide rapidly developing segments since many customers are using mobile phones.
VNC User Guide. Version 5.0. June 2012
VNC User Guide Version 5.0 June 2012 Trademarks VNC is a registered trademark of RealVNC Ltd. in the U.S. and in other countries. Other trademarks are the property of their respective owners. Protected
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
SSLSmart Smart SSL Cipher Enumeration
Author: Gursev Singh Kalra Managing Consultant Foundstone Professional Services Table of Contents SSLSmart Smart SSL Cipher Enumeration... 1 Table of Contents... 2 Introduction... 3 SSLSmart Features...
Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
Elluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
Citrix Receiver for Mobile Devices Troubleshooting Guide
Citrix Receiver for Mobile Devices Troubleshooting Guide www.citrix.com Contents REQUIREMENTS...3 KNOWN LIMITATIONS...3 TROUBLESHOOTING QUESTIONS TO ASK...3 TROUBLESHOOTING TOOLS...4 BASIC TROUBLESHOOTING
Setting Up Resources in VMware Identity Manager
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
This works very well for situations where all computers are within the same LAN and can access both the SQL server and the network shares.
AircastDB Server A networked AircastDB setup involves two types of servers: An SQL server (PostgreSQL, MSSQL) to hold the metadata for the audio files and scheduling information (library, playlists) One
Elluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Zenprise Device Manager 6.1.5
Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
Bluesocket virtual Wireless Local Area Network (vwlan) FAQ
Bluesocket virtual Wireless Local Area Network (vwlan) FAQ Updated 11/07/2011 Can I disable https on the login page of the BSC or vwlan and use http instead so I do not get a certificate error? No, https
User Guide for Paros v2.x
Table of Contents 1 Introduction...1 1.1 Paros Overview...1 1.2 History...1 2 Copyright...2 3 Installation...3 4 Configuration...4 5 Functions...6 5.1 Spider...6 5.2 Scanner...6 5.3 Filter...7 5.4 Trapping
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
Configuration Manual English version
Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
VNC User Guide. Version 5.3. December 2015
VNC User Guide Version 5.3 December 2015 Trademarks RealVNC, VNC and RFB are trademarks of RealVNC Limited and are protected by trademark registrations and/or pending trademark applications in the European
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
Proof of Concept. A New Data Validation Technique for Microsoft ASP.NET Web Applications. Foundstone Professional Services
Proof of Concept A New Data Validation Technique for Microsoft ASP.NET Web Applications Foundstone Professional Services February 2005 Introduction Despite significant awareness of security issues like
Cisco AnyConnect Secure Mobility Solution Guide
Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page
VPN: Virtual Private Network Setup Instructions
VPN: Virtual Private Network Setup Instructions Virtual Private Network (VPN): For e-journals and web-based databases, plus applications like EndNote's Online Search (formerly "Connect") and business systems.
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Interlink Networks Secure.XS and Cisco Wireless Deployment Guide
Overview Interlink Networks Secure.XS and Cisco Wireless Deployment Guide (An AVVID certification required document) This document is intended to serve as a guideline to setup Interlink Networks Secure.XS
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Bypassing CAPTCHAs by Impersonating CAPTCHA Providers
Bypassing CAPTCHAs by Impersonating CAPTCHA Providers Author: Gursev Singh Kalra Principal Consultant Foundstone Professional Services Table of Contents Bypassing CAPTCHAs by Impersonating CAPTCHA Providers...
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
ThinPoint Quick Start Guide
ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Avalanche Remote Control User Guide. Version 4.1.3
Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
SSLSmart Smart SSL Cipher Enumeration
SSLSmart Smart SSL Cipher Enumeration By Gursev Singh Kalra Managing Consultant McAfee Foundstone Professional Services Table of Contents Introduction 3 SSLSmart Features 3 SSLSmart Installation 6 SSLSmart
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3
ez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
Using a VPN with Niagara Systems. v0.3 6, July 2013
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
A70 How to Deploy Applications
Research In Motion A70 How to Deploy and Distribute Applications For BlackBerry SmartPhones Andre Fabris 09 2 P a g e Contents A70 How to Deploy Applications... 3 Introduction... 4 Desktop Manager... 5
How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip
F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration Contents Introduction 4 Purpose 5 Requirements 6 Prerequisites 6 AirWatch 6 F5 BIG-IP 6 Network Topology 7 Big-IP Configuration
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Java Client Side Application Basics: Decompiling, Recompiling and Signing
Java Client Side Application Basics: Decompiling, Recompiling and Signing Written By: Brad Antoniewicz [email protected] Introduction... 3 Java Web Start and JNLP... 3 Java Archives and META-INF...
SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013
SSL VPN Server Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
Load balancing Microsoft IAG
Load balancing Microsoft IAG Using ZXTM with Microsoft IAG (Intelligent Application Gateway) Server Zeus Technology Limited Zeus Technology UK: +44 (0)1223 525000 The Jeffreys Building 1955 Landings Drive
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Important Release Information and Technical and Deployment Support Notes
PrinterOn On-Premise Server Release Technical Support Notes Important Release Information and Technical and Deployment Support Notes During the course of product development and support, configurations
Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11
Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes
SuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
Avalanche Enabler 5.3 User Guide
Avalanche Enabler 5.3 User Guide 30/05/2012 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095 Telephone:
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Citrix Access on SonicWALL SSL VPN
Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring
Getting Started with PRTG Network Monitor 2012 Paessler AG
Getting Started with PRTG Network Monitor 2012 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying,
The interactive HTTP proxy WebScarab Installation and basic use
The interactive HTTP proxy WebScarab Installation and basic use Author: Dr. Holger Peine, Fraunhofer IESE [email protected] To actively participate in the hands-on exercises of the tutorial,
Software installation and configuration IEC-line series
Software installation and configuration IEC-line series update: 04-10-2014 IEC-line by OVERDIGIT overdigit.com Table of contents 1. Installing the software... 3 1.1. Installing CoDeSys... 4 1.2. Installing
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide
GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as
DSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
Net 2. NetApp Electronic Library. User Guide for Net 2 Client Version 6.0a
Net 2 NetApp Electronic Library User Guide for Net 2 Client Version 6.0a Table of Contents 1 INTRODUCTION AND KEY FEATURES... 3 SOME OF THE KEY FEATURES INCLUDE:... 3 INSTALLATION PREREQUISITES:... 3 2
Remote Access Platform. Architecture and Security Overview
Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards
What is the Barracuda SSL VPN Server Agent?
The standard communication model for outgoing calls is for the appliance to simply make a direct connection to the destination host. This paradigm does not suit all business needs. The Barracuda SSL VPN
