Pentesting Mobile Applications
|
|
|
- Vincent Daniels
- 10 years ago
- Views:
Transcription
1 WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司 Pentesting Mobile Applications
2 Who am I l Frank Fan: CTO of DBAPPSecurity Graduated from California State University as a Computer Science PhD. With more than ten years of technical research and project management experience in world famous security companies Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Became the first Chinese who made a speech in the World s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. The vice president of OWASP China Member of 2008 Olympic Organizing Committee security group. Member of China Computer Society Branch Columnist of China Information Security
3 catalogue iphone&adriod Application Basics Pentesting iphone Applications Pentesting Andriod Applications Major Mobile Threats
4 Apple iphone Application Basics iphone first published in
5 Apple iphone Application Basics Browser Based Application HTML+CSS+JavaScript IOS Application Program Objective C&Cocoa Touch API Ø Super set of C, Compiles into native code (ARM) Apple Store(App Store) Centralized mechanism to distribute software Only Apple signed application are available Designed to protect the Apps from piracy & No malware
6 Apple iphone Application Basics Why to build iphone application - New business - Good ways to launch new services - Urgentcy of clients - Users want them - Fame (Angry Birds /Fruit Ninja)
7 Apple iphone Application Basics iphone Applications Package Suffix.ipa Running test on iphone emulator Testing with equipment Releasing at App Store ü The application program must subject to evaluation
8 Google Android Application Basics Andriod released the growth from January to September in
9 Google Android Application Basics Andriod Holistic Architecture
10 Google Android Application Basics Android System Architecture - Application program - Application Frame - Program Library - Android Runtime Library - Linux Core
11 catalog iphone&adriodapplicationbasics PentestingiPhoneApplication PentestingAndriodApplication MajorMobileThreats
12 Pentesting iphone Application Areas of focus Include -Network Communication -Privacy -Application Data Storage -Reverse Engineering -URL Schemes -Push Notification
13 Pentesting iphone Application Jailbreak - iphone doesn`t allow unsigned applications - After Jailbreaking,full access to the device - To allow install unauthorized software - Tools: PwnageTool,redsn0w,Sn0wbreeze, Greenpois0n, jailbreakme - It makes our work easier
14 Pentesting iphone Application Some useful Cydia for safety testing as follows. - OpenSSH:Allows us to connect to the iphone remotely over SSH Adv-cmds:Comes with a set of process commands like ps, kill, finger Sqlite3:Sqlite database client GNU Debugger:For run time analysis & reverse engineering Syslogd:To view iphone logs Veency:Allows to view the phone on the workstation with the help of veency client Tcpdump:To capture network traffic on phone com.ericasadun.utlities:plutil to view property list files Grep:For searching Odcctools:otool object file displaying tool Crackulous:Decrypt iphone apps Hackulous:To install decrypted apps
15 Pentesting iphone Application Connect the SSH to iphone From Cydia Install Open SSH Install SSH Client On PC By default, iphone has two users(root mobile) Ø Root and mobile (default password : alpine ) With root user through SSH connect to phone. SSHthroughWIFI >sshroot@iphoneip > password: alpine SSH through USB >./itunnel_mux --lport 1234 >ssh p1234root@ >password:alpine
16 Pentesting iphone Application l Network communication ü Mobile application pentesting isn t really all that different. -It involves network communication ü Communication Mechanism -- Clear text Transmission (HTTP) -- Encrypted Transmission (HTTPS) -- Use of Custom or Proprietary protocols
17 Pentesting iphone Application Clear text Transmission Many applications still use clear text transport protocol by 2012.(HTTP) Be more vulnerable to the MITM attack. ü Most people by accessing WIFI, the same WiFi attackers can run like FireSheep tools of attacks To analyze HTTP traffic ü By manual proxy in iphone(set-wlan- manual)
18 Pentesting iphone Application
19 Pentesting iphone Application Encrypted Transmission HTTPS is used to transmission sensitive data With SSL communicate ü Applications may fail veridate SSL cert ü allowsanyhttpscertificateforhost An application of verifying certificate shouldn`t allow MITM To capture the traffic, it needs to loading proxy CA certificate to iphone
20 Pentesting iphone Application
21 Pentesting iphone Application Custom Protocols Identify the communication protocol, Ø On SSH terminal > tcpdump -w traffic.pcap Ø Loading.pcap in wireshark and analyze May not respect iphone proxy settings. DNS Spoofing techniques to MITM
22 Pentesting iphone Application Privacy Issues - Every iphone has an unique device identifier called UDID - Application may collect device UDID. - With UDID Ø Maybe observe user`s browsing pattern Ø Determine user`s geographical position. Ø Such as Openfient : Mobile social game nets Observe the network traffic to find out UDID transmission
23 Pentesting iphone Application Application data storage - 76% of mobile applications store data on their phones - 10% of mobile applications store data transmitted on IP network. -TheReasonforstoringdataontheirphones Ø Forthepurposeofachievingbetterperformance. Ø AccessOffline Datastoragelocation a) Plist file b) Keychain c) Logs d) Screenshot e) Home catalogue
24 Pentesting iphone Application Application directory structure - Applications run in a sandbox of mobile ermission. - Each application get a private space of file system. 路 径 Appname.app 说 明 Contains the applica.on code and sta.c data Documents Library Data that may be shared with desktop through itunes Applica.on support files Library/Preferences App specific preferences Library/Caches/ tmp Data that should persist across successive launches of the applica.on but not needed to be backed up Temporary files that do not need to persist across successive launches of the applica.on
25 Reverse Engineering Static analysis Otool Class-dump Pentesting iphone Application Dynamicdebugging gdb l IDA + GDBServer
26 Pentesting iphone Application
27 Pentesting iphone Application
28 Pentesting iphone Application
29 Pentesting iphone Application
30 Pentesting iphone Application
31 catalog iphone&adriodapplicationbasics PentestingiPhoneApplication PentestingAndriodApplication MajorMobileThreats
32 Andriod Systerm Security Feature Andriod is based on Linux, which own its security feature. Process rights management separation, Andriod starts up application with separate account to doing. Each application uses different accounts, it is more effective and safer. Data directory permissions separation, the program data catalogue owners are exactly process users, each process is different, the process directory permissions are seperate, malicious processes can't directly modifiy other process documents
33 Andriod Systerm Security Feature The application runs in the modified Java environment. It is difficult to attack application by overflowing. By default, the application cannot obtain root for changing key position of operating system
34 Pentesting Andriod Application Highlights Include Attacking test based systerm Attacking test based application Attacking test based transmission link Attacking test based wap site
35 Pentesting Andriod Application To build a test environment Root device To obtain root ermission with root application program. (Local overflow program) Install busybox (include all kinds of useful system commands) Install rights management program,such as,superuser Instal ssh server Instal QuickSSHd To get root permission by Superuser
36 Pentesting Andriod Application l To build a test environment - To build a wireless link with device. - By QuickSSHd login into and manage equipment
37 Pentesting Andriod Application l Attacking test based core Andirod is designed and developed based on linux core.meanwhile, retaining all kinds of linux core features,likewise,the way of attack linux core is also true for android system. Based on the core modules installed the rootkit, Linux core level by reforming the rootkit is easy to run in andriod system, and finish all kinds of the underlying operations. Using the development environment to compile corresponding version rootkit module. Using command insmod xxx.ko to install module and carry out backdoor function
38 Pentesting Andriod Application l Attacking test based on core - Kernel overflow attack Andriod kernel based on C language development, there may be exist overflow vulnerabilities, through the spill that based on the kernel malware programs with the highest permission of the system, the part of the program is to use the principle to operate
39 Pentesting Andriod Application Application attack testing Most of Andriod software developmented based on Java, which is difficult to overflow attack. But part of the program to improve efficiency or to achieve more advanced functions with developing dynamic module in C/C++, which is easy to overflow attacking. Though compared with traditional PC software, Andriod software`s function relatively simple, but it still there may be all kinds of logic security vulnerabilities Andriod use the default sqlite as a application database, but usually not for encryption, so part of the sensitive data easy to leak. Inquiresing the contents of sqlite database with sqlite3 Andriod Andriod application developmented with Java, which can get he corresponding source through the way of decompilation Through the use of dex2jar can programs into a jar file,
40 Pentesting Andriod Application l Transmission lines attack testing Considering the low configured phone, some application do not have the data link encryption, and sending all kinds of sensitive data in these unencrypted link Mobile phone software currently rarely have the function of through the hardware to sign encryption, so it is easy to attack and intercept the packet by intermediaries and modified. In some on-line transactions of applications, the problem is very serious
41 Pentesting Andriod Application Capturing the application web packets and test after modifying, with man-in-the-middle tool
42 Pentesting Andriod Application WAP site attack testing Most of wap sites consider to be compatible various kinds mobile phones (Most mobile phone do not support cookie function ),put session information into url,it is easy to make malicious website get session information and illegal log on though the referrer`s attack Set proxy or using man-in-the-middle attack and safety test for target wap site,find and attack wap vulnerability
43 catalog iphone&adriodapplicationbasics PentestingiPhoneApplication PentestingAndriodApplication MajorMobileThreats
44 Major Mobile Threats It is easy to lost mobile phone. Equipment and password protection Sensitive files encryption When reboot the mobile, it only design to encrypt mobile data. Boot Rom exploits All files on devise can copy in 10 minutes. Password brute force 4 digits password has been cracked in 20 minutes Mobile App Risks Veracode Top 10 OWASP Mobile Top
45 WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司
Pentesting iphone Applications. Satishb3 http://www.securitylearn.net
Pentesting iphone Applications Satishb3 http://www.securitylearn.net Agenda iphone App Basics App development App distribution Pentesting iphone Apps Methodology Areas of focus Major Mobile Threats Who
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
Pentesting iphone & ipad Apps Hack In Paris 2011 June 17
Pentesting iphone & ipad Apps Hack In Paris 2011 June 17 Who are we? Flora Bottaccio Security Analyst at ADVTOOLS Sebastien Andrivet Director, co-founder of ADVTOOLS ADVTOOLS Swiss company founded in 2002
Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus
Mobile Application Hacking for ios 3-Day Hands-On Course Syllabus Course description ios Mobile Application Hacking 3-Day Hands-On Course This course will focus on the techniques and tools for testing
Mobile Applications: The True Potential Risks Where to look for information when performing a Pentest on a Mobile Application
Mobile Applications: The True Potential Risks Where to look for information when performing a Pentest on a Mobile Application Since the introduction of the iphone, Apple has sold more than 315 million
Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH
Securing ios Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me President of OPTIMAbit GmbH Responsible for > 200 Pentests per Year Ca 50 ios Pentests and code reviews in the last two years. Overview
Mobile Application Security and Penetration Testing Syllabus
Mobile Application Security and Penetration Testing Syllabus Mobile Devices Overview 1.1. Mobile Platforms 1.1.1.Android 1.1.2.iOS 1.2. Why Mobile Security 1.3. Taxonomy of Security Threats 1.3.1.OWASP
Security Testing Guidelines for mobile Apps
The OWASP Foundation http://www.owasp.org Security Testing Guidelines for mobile Apps Florian Stahl Johannes Ströher AppSec Research EU 2013 Who we are Florian Stahl Johannes Ströher Lead Consultant for
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules
Must have skills in any penetration tester's arsenal. MASPT at a glance: 10 highly practical modules 4 hours of video material 1200+ interactive slides 20 Applications to practice with Leads to emapt certification
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Advanced ANDROID & ios Hands-on Exploitation
Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Internet Banking System Web Application Penetration Test Report
Internet Banking System Web Application Penetration Test Report Kiev - 2014 1. Executive Summary This report represents the results of the Bank (hereinafter the Client) Internet Banking Web Application
Please Complete Speaker Feedback Surveys. SecurityTube.net
Please Complete Speaker Feedback Surveys Advanced ios Applica:on Pentes:ng Vivek Ramachandran Founder, SecurityTube.net [email protected] Vivek Ramachandran B.Tech, ECE IIT Guwaha: Media Coverage
UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION. Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny
132 3089 UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION COMMISSIONERS: Edith Ramirez, Chairwoman Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny In the Matter of DOCKET
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
The Incident Response Playbook for Android and ios
SESSION ID: AIR-W03R The Incident Response Playbook for Android and ios Andrew Hoog CEO and Co-founder NowSecure @ahoog42 @NowSecureMobile Andrew Hoog Author of three books Incident Response for Android
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
MASTER'S THESIS. Android Application Security with OWASP Mobile Top 10 2014. James King 2014
MASTER'S THESIS Android Application Security with OWASP Mobile Top 10 2014 James King 2014 Master of Arts (60 credits) Master of Science in Information Security Luleå University of Technology Department
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
Security Vulnerabilities in 3rd-Party ios Applications
Security Vulnerabilities in 3rd-Party ios Applications Wentworth Institute of Technology Boston, MA Sonny Fazio Sonny Fazio - Wentworth Institute of Technology - Security Vulnerabilities in 3rd-party ios
Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved
Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Virtually Secure. a journey from analysis to remote root 0day on an industry leading SSL-VPN appliance
Virtually Secure a journey from analysis to remote root 0day on an industry leading SSL-VPN appliance Who am I? Tal Zeltzer Independent security researcher from Israel Reverse engineering (mostly embedded
Research on Situation and Key Issues of Smart Mobile Terminal Security
Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
How To Protect Your Mobile Device From Attack
Manage and Secure the Mobile Data, Not Just the Device Stijn Paumen VP Business Development, Wandera The Great Platform Shift 60,000,000 iphone BlackBerry 50,000,000 40,000,000 30,000,000 20,000,000 10,000,000
Pentesting Android Mobile Application
Pentesting Android Mobile Application Overview on Mobile applications Connect in Superior Way!! Mobile market is the worldwide rapidly developing segments since many customers are using mobile phones.
Administering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
Legal notices. Legal notices. For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html.
ADOBE AIR Security Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Installing and updating desktop applications...........................................................................
Secure your ios applications and uncover hidden vulnerabilities by conducting penetration tests
Fr ee Learning ios Penetration Testing discusses the common vulnerabilities and security-related shortcomings in an ios application and operating system, and will teach you to conduct static and dynamic
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001
CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
VPN: Virtual Private Network Setup Instructions
VPN: Virtual Private Network Setup Instructions Virtual Private Network (VPN): For e-journals and web-based databases, plus applications like EndNote's Online Search (formerly "Connect") and business systems.
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Access Your Cisco Smart Storage Remotely Via WebDAV
Application Note Access Your Cisco Smart Storage Remotely Via WebDAV WebDAV (Web-based Distributed Authoring and Versioning), is a set of extensions to the HTTP(S) protocol that allows a web server to
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
IDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
RDM+ Desktop for Windows Getting Started Guide
RDM+ Remote Desktop for Mobiles RDM+ Desktop for Windows Getting Started Guide Introduction... 3 1. Installing RDM+ Desktop on a computer... 3 2. Preparing for remote connection... 4 3. RDM+ Desktop window...
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
Mobile Application Security: Who, How and Why
Mobile Application Security: Who, How and Why Presented by: Mike Park Managing Security Consultant Trustwave SpiderLabs Who Am I Mike Park Managing Consultant, Application Security Services, Trustwave
Project X Mass interception of encrypted connections
Project X Mass interception of encrypted connections What? SSL/TLS interception TOR interception ...a thorny path Common Issues Public Key Pinning avoids rogue CA to sign certs Common Issues Google and
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
OWASP NZ Day 2011 Testing Mobile Applications
OWASP NZ Day 2011 Testing Mobile Applications Presenter: Nick von Dadelszen Date: 7 th July 2011 Company: Lateral Security (IT) Services Limited Company overview Company Lateral Security (IT) Services
Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.
Best Practice Guide (SSL Implementation) for Mobile App Development 流 動 應 用 程 式 (SSL 實 施 ) 最 佳 行 事 指 引 香 港 電 腦 事 故 協 調 中 心 ] Jointly published by [ 專 業 資 訊 保 安 協 會 ] Hong Kong Computer Emergency Response
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module
Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
TrustDefender Mobile Technical Brief
TrustDefender Mobile Technical Brief Fraud Protection for Native Mobile Applications TrustDefender Mobile from ThreatMetrix is a lightweight SDK library for Google Android and Apple ios mobile devices.
Frequently Asked Questions Enterprise Mobile Manager
Frequently Asked Questions Enterprise Mobile Manager FAQ: Enterprise Mobile Manager Contents Unable to connect the device to EMM Server... 4 Symptoms... 4 Resolution... 4 Unable to import AD into EMM Server
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
CONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
mitmproxy.org How MITMproxy has been slaying SSL Dragons OWASP The OWASP Foundation
mitmproxy.org How MITMproxy has been slaying SSL Dragons April 14 2012 Jim Cheetham University of Otago Information Security Office [email protected] Copyright The University of Otago Permission
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
Exactly the Same, but Different
Exactly the Same, but Different 1 Shayne Champion, CISSP, CISA, GSEC, ABCP Program Manager GO Cyber Security TVA v1.0 Agenda Define Mobile Device Security o o Similarities Differences Things you Should
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Mobile Application Security
Mobile Application Security Jack Mannino Anand Vemuri June 25, 2015 About Us Jack Mannino CEO at nvisium UI and UX development impaired Enjoys: Scala, Elixir Tolerates: Java Allergic To: Cats, Pollen,.NET
Android vs. Apple ios Security Showdown Tom Eston
Android vs. Apple ios Security Showdown Tom Eston About Your Presenter Tom Eston CISSP, GWAPT Manger of the SecureState Profiling & Penetration Team Specializing in Attack & Penetration, Mobile Security
Microsoft Lync Server 2010
Microsoft Lync Server 2010 Scale to a Load Balanced Enterprise Edition Pool with WebMux Walkthrough Published: March. 2012 For the most up to date version of the Scale to a Load Balanced Enterprise Edition
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Penetration Testing for iphone / ipad Applications
Penetration Testing for iphone / ipad Applications Author: Kunjan Shah Security Consultant Foundstone Professional Services Table of Contents Penetration Testing for iphone / ipad Applications... 1 Table
Mobile Application Security Testing ASSESSMENT & CODE REVIEW
Mobile Application Security Testing ASSESSMENT & CODE REVIEW Sept. 31 st 2014 Presenters ITAC 2014 Bishop Fox Francis Brown Partner Joe DeMesy Security Associate 2 Introductions FRANCIS BROWN Hi, I m Fran
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
End User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Spring Hill State Bank Mobile Banking FAQs
Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an
