Deep Dive: PenTesting the Android and iphone
|
|
|
- Jean Bennett
- 10 years ago
- Views:
Transcription
1 Deep Dive: PenTesting the Android and iphone Session 1 October 4th, :00AM Max Veytsman & Subu Ramanathan
2 Us Security Consultants from Toronto Specialize in application security Especially MIS Training Institute Session 1 - Slide 2
3 You Security analysts, developers or QA testers Fairly familiar with web application pentesting Intrigued by mobile applications Have attempted to root an Android or Jailbreak an ios device Some knowledge of programming MIS Training Institute Session 1 - Slide 3
4 This Workshop Introducing ExploitMe Mobile Mobile threat model What you need to know about Android and iphone Intercepting traffic Filesystem access Static analysis Runtime analysis (Bonus!) Mobile cryptography pitfalls (Bonus!) MIS Training Institute Session 1 - Slide 4
5 Demo INTRODUCING EXPLOITME MOBILE MIS Training Institute Session 1 - Slide 5
6 ExploitMe Mobile iphone Labs Android Labs Server MIS Training Institute Session 1 - Slide 6
7 MOBILE THREAT MODEL MIS Training Institute Session 1 - Slide 7
8 What can the developers get wrong? Backend implementation Client behavior Client-server communication MIS Training Institute Session 1 - Slide 8
9 Backend Mobile backend implementations are all susceptible to Authentication/Authorization issues Privilege escalation Input validation errors Injection Threat model is the same as a web app MIS Training Institute Session 1 - Slide 9
10 Client Insecure data storage Poor cryptography Overzealous Logging Eg. Old Android browser Memory leakage Input validation Eg. Skype XSS bug Threat includes lost/stolen phone and mobile malware MIS Training Institute Session 1 - Slide 10
11 Client-Server Communication Insecure communication Not using SSL/TLS Leaking sensitive data GPS, identifying phone information, etc Threat includes Man-in-the-Middle attacks Malicious wifi hotspots GSM base station MIS Training Institute Session 1 - Slide 11
12 Demo (Also available at BYPASSING ANDROID PASSWORD MIS Training Institute Session 1 - Slide 12
13 Mobile Security Model ANDROID MIS Training Institute Session 1 - Slide 13
14 The architecture Multiuser OS running Dalvik VM. (root being highest user) Dalvik runs compiled.dex files, similar to.class files in JAVA, optimized for low powered devices MIS Training Institute Session 1 - Slide 14
15 Key design points Each app runs as its own user and group Each app runs its own Dalvik VM Breaking out of Dalvik is useless Dalvik does not manage security User permissions do this Apps interact using permission agreed upon on installation MIS Training Institute Session 1 - Slide 15
16 Android Application Packaging MIS Training Institute Session 1 - Slide 16 Image :
17 Permissions Unique UID / GID for each applica4on MIS Training Institute Session 1 - Slide 17
18 Permissions Applications must request permissions on install Phone calls SMS Location services Calendar access Etc. Unfortunately, you can t deny specifics Install or no install imgsource: techpp.com MIS Training Institute Session 1 - Slide 18
19 Permissions Permissions are configured in the APK packaging in AndroidManifest.xml If the permissions change, user will be requested to manually reaccept <permission android:description="string resource" android:icon="drawable resource" android:label="string resource" android:name="string" android:permissiongroup="string" android:protectionlevel=["normal" "dangerous" "signature" "signatureorsystem"] /> MIS Training Institute Session 1 - Slide 19
20 Android Security Model Summary Android runs.dex files on DalvikVM, each app runs own instance of Dalvik Apps run under their own user and group IDs for segregation of user processes Security is managed through users & file permissions App permissions set in AndroidManifest.xml on install MIS Training Institute Session 1 - Slide 20
21 Mobile Security Model IPHONE MIS Training Institute Session 1 - Slide 21
22 iphone Architecture ios executes applica4ons directly Apps compiled to na4ve code ios handles sandboxing itself no reliance on UNIX permissions Imgsrc: wikipedia.com MIS Training Institute Session 1 - Slide 22
23 iphone sandboxing Applica4on limited to it s own directory on FS Applica4on limited to it s own memory pages by ios File encryp4on supported, but per app basis No permission architecture like in Android MIS Training Institute Session 1 - Slide 23
24 Application Distribution Android Installs from APK files or Market Market is vetted less strictly than Apple Sandboxing of apps managed by file permissions and UID/GID Permissions between apps managed by Manifest file on install Each app spawns its own Dalvik VM iphone App Store vetted by Apple (not clear how) Apps compiled to native code Sandboxing managed by OS (none of this permission stuff) MIS Training Institute Session 1 - Slide 24
25 INTERCEPTING TRAFFIC MIS Training Institute Session 1 - Slide 25
26 Android proxying Intercept with proxy Internet MIS Training Institute Session 1 - Slide 26
27 Proxy using what? We will discuss two Android proxy scenarios for an assessor The Android emulator A rooted Android device MIS Training Institute Session 1 - Slide 27
28 Quick requirements: The Android SDK hmp://developer.android.com/sdk/index.html Android Debugging Bridge (adb) Enable USB debugging (careful!) The Bouncy Castle Java Library hmp://bouncycastle.org/download Place in $JAVA_HOME/lib/ext Used for inser4on of cer4ficate into Android keystore MIS Training Institute Session 1 - Slide 28
29 Intercepting Traffic PROXYING THE ANDROID EMULATOR MIS Training Institute Session 1 - Slide 29
30 Proxying the Android Emulator Start up and configure an emulator using Android SDK./emulator -avd <name> -partition-size 128 MIS Training Institute Session 1 - Slide 30
31 A note on SSL Small issue: invalid SSL cert = dropped connection Proxying SSL will give invalid SSL certificate MIS Training Institute Session 1 - Slide 31
32 A note on SSL trusted certificate for our proxy Solution: modify the Android certificate store to trust our proxy certificate MIS Training Institute Session 1 - Slide 32
33 Adding a Trusted Certificate to Android adb pull /system/etc/security/cacerts.bks cacerts.bks Pull trusted cer4ficate store from device cacerts.bks MIS Training Institute Session 1 - Slide 33
34 Adding a Trusted Certificate to Android keytool -keystore cacerts.bks -storetype BKS -provider org.bouncycastle.jce.provider.bouncycastleprovider -storepass changeit -importcert -trustcacerts -alias <##CERT ALIAS HERE##> -file <##YOUR PROXY.CRT HERE##> Insert our cer4ficate into keystore using keytool Standard with JAVA JRE MIS Training Institute Session 1 - Slide 34
35 Adding a Trusted Certificate to Android adb remount Mount remote Android file system read & write MIS Training Institute Session 1 - Slide 35
36 Adding a Trusted Certificate to Android adb push cacerts.bks /system/etc/ security/ 4) Push modified CA keystore (May have to change permissions to overwrite) MIS Training Institute Session 1 - Slide 36
37 Save this system image Why? upon bootup, the keystores for the emulator reset To avoid hassle, you can save this version of system par44on MIS Training Institute Session 1 - Slide 37
38 Save this system image /adb push /path/to/mkfs.yaffs2.arm /data/mkfs 1) Upload YAFFS2 mkfs binary Here: MIS Training Institute Session 1 - Slide 38
39 >adb shell Save this system image #./data/mkfs /system /data/system.img mkfs.yaffs2: Android YAFFS2 Tool,Build by PowerGUI at Building... Build Ok. # 2) build system image on emulator MIS Training Institute Session 1 - Slide 39
40 Save this system image adb pull /data/system.img 3) Pull system image from emulator MIS Training Institute Session 1 - Slide 40
41 Restart emulator using proxy flag./emulator -avd myavd -partition-size 128 -system /path/to/system.img -http-proxy :8888 Here, we specify the hmp- proxy flag and the system par44on that we created MIS Training Institute Session 1 - Slide 41
42 A note about http-proxy flag -http-proxy :8888 Flag has problems. Browser traffic will proxy, however applica4on traffic is very hit or miss. If issues, try debug- proxy flag Used rooted Android device for true app assessments other tests can be done on the emulator MIS Training Institute Session 1 - Slide 42
43 Android emulator proxy complete! MIS Training Institute Session 1 - Slide 43
44 Tsocks for app traffic on emulator tsocks will be our solu4on to the inability to proxy app traffic in the emulator Encapsulates network traffic transparently into a SOCKS proxy Install tsocks and modify sekngs in /etc/ tsocks.conf MIS Training Institute Session 1 - Slide 44
45 Intercepting Traffic PROXYING AN ANDROID DEVICE MIS Training Institute Session 1 - Slide 45
46 Proxy real device Android does not include built in proxy support Network proxy is for browser, not apps There are workarounds we ll show you best way to proxy apps is using a device! Note: You ll need to be root and have a ROM that supports iptables such as CyanogenMod hmp:// MIS Training Institute Session 1 - Slide 46
47 Proxy real device To proxy a Android device we ll go through three steps: 1. Have rooted ROM with iptables (Cyanogen) 2. Install Superuser (if not already part of ROM) 3. Install a proxy tool such as Autoproxy MIS Training Institute Session 1 - Slide 47
48 Proxy real device Connect device to computer with USB Enable USB Debugging Sekngs > Manage Applica4ons > Development MIS Training Institute Session 1 - Slide 48
49 If you need SSL, same steps: adb pull /system/etc/security/cacerts.bks cacerts.bks keytool -keystore cacerts.bks -storetype BKS -provider org.bouncycastle.jce.provider.bouncycastlepr ovider -storepass changeit -importcert - trustcacerts -alias <##CERT ALIAS HERE##> - file <##YOUR PROXY.CRT HERE##> adb remount adb push cacerts.bks /system/etc/security/ MIS Training Institute Session 1 - Slide 49
50 Install tools 1) Enable Unknown sources MIS Training Institute Session 1 - Slide 50
51 adb install superuser.apk 2) Install Superuser (reboot) MIS Training Institute Session 1 - Slide 51
52 adb install transproxy.apk 3) Install TransProxy or AutoProxy MIS Training Institute Session 1 - Slide 52
53 Configure proxy app MIS Training Institute Session 1 - Slide 53
54 Device proxy complete! Why do we need such tools? As discussed, by default Android has no proxy mechanism for applica4on traffic these tools act as a front end to iptables If you are elite, then you can use iptables command line in Cyanogen MIS Training Institute Session 1 - Slide 54
55 One last thing tcpdump Emulator supports - tcpdump <file> flag Captures network traffic to file Great for debugging or understanding network side of emulator Use for quick traffic analysis for apps.. Doesn t need proxy MIS Training Institute Session 1 - Slide 55
56 TCPDump open with wireshark emulator -avd LabAVD tcpdump dump.cap MIS Training Institute Session 1 - Slide 56
57 Intercepting Traffic IPHONE MIS Training Institute Session 1 - Slide 57
58 iphone proxying how to Intercept with proxy Internet MIS Training Institute Session 1 - Slide 58
59 iphone proxying For the iphone, the basic proxy tools are already supported out of the box It will s4ll drop SSL traffic for an invalid cert! But, much easier to trust a cert on iphone Even easier to use the iphone simulator to intercept app traffic MIS Training Institute Session 1 - Slide 59
60 Intercepting Traffic PROXYING THE IOS SIMULATOR MIS Training Institute Session 1 - Slide 60
61 Proxy ios simulator 1) Configure your proxy app on OSX MIS Training Institute Session 1 - Slide 61 Img:
62 Proxy ios simulator 2) Change OSX network to use proxy MIS Training Institute Session 1 - Slide 62 Img:
63 Proxy ios simulator 2) If you need SSL, trust SSL cer4ficate in OSX keychain MIS Training Institute Session 1 - Slide 63
64 Proxy ios simulator 3) Simulator traffic should be captured MIS Training Institute Session 1 - Slide 64
65 Intercepting Traffic PROXYING AN IPHONE MIS Training Institute Session 1 - Slide 65
66 Set up for device proxy Router Internet Host with proxy MIS Training Institute Session 1 - Slide 66
67 Proxy iphone device The process of proxying the iphone is simple by comparison to Android can all be done on the device! Whew! MIS Training Institute Session 1 - Slide 67
68 Accepting a custom SSL certificate 1) Browse to your custom SSL cert with Safari 2) Accept custom SSL Cer@ficate MIS Training Institute Session 1 - Slide 68
69 Accepting a custom SSL certificate 3) Install trusted SSL Cer4ficate MIS Training Institute Session 1 - Slide 69
70 Configure proxy from iphone 4) Set up connec4on to proxy on iphone device MIS Training Institute Session 1 - Slide 70
71 Proxy iphone 5) Proxy iphone SSL Traffic MIS Training Institute Session 1 - Slide 71
72 Summary Both devices and emulators support SSL proxying with some work Setting up a proxy for Android is much more difficult than iphone Android needs to modify keystores on emulator / device for SSL Android apps to modify iptables Proxy on Android emulator is unreliable iphone has built in GUI making it simple MIS Training Institute Session 1 - Slide 72
73 Summary As a mobile app assessor, setting up a proxy to inspect application traffic is required You will encounter SSL traffic! Know how to trust certificates Proxying helps trap and intercept requests, invaluable tool Many devices changes have to be made, don t use your primary device as a testing tool MIS Training Institute Session 1 - Slide 73
74 Demo PARAMETER MANIPULATION MIS Training Institute Session 1 - Slide 74
75 FILESYSTEM ACCESS MIS Training Institute Session 1 - Slide 75
76 Filesystem Access ANDROID MIS Training Institute Session 1 - Slide 76
77 Android Filesystem Access We want to analyze files within the device, so how do we do this? ADB (windows, linux, mac) MIS Training Institute Session 1 - Slide 77
78 Android Filesystem Access Android Debug Bridge (adb) command Access a shell Pull/push files Many more MIS Training Institute Session 1 - Slide 78
79 ADB MIS Training Institute Session 1 - Slide 79
80 Example of ADB MIS Training Institute Session 1 - Slide 80
81 Quick look at some apps We re going to use Android s default mail client (Note this is for a rooted device) Navigate to the shared_prefs directory of the applica4on MIS Training Institute Session 1 - Slide 81
82 Quick look at some apps cat (read) the file MIS Training Institute Session 1 - Slide 82
83 Quick look at some apps aw1hcctzc2wroi8vc2ntb2jpbgvhchb0zxn0jtqwz21hawwuy29tomf iy0rfrjeym0bpbwfwlmdtywlslmnvbto5otm= Base 64 decode imap+ssl+://scmobileapptest SCMOBILETESTAPP:abcDEF123 MIS Training Institute Session 1 - Slide 83
84 Pull: Push: MIS Training Institute Session 1 - Slide 84
85 Advanced Shell (BusyBox) Alterna4ve shells exist such as Busybox. These include features not in ADB Grep, find, vi, etc. MIS Training Institute Session 1 - Slide 85
86 Filesystem Access IPHONE MIS Training Institute Session 1 - Slide 86
87 iphone Filesystem Access No file system access by default iphone is more locked down out of the box To test apps, either use the iphone simulator or Jailbreak (SSH access) MIS Training Institute Session 1 - Slide 87
88 iphone Filesystem Access MIS Training Institute Session 1 - Slide 88
89 Example: Accessing Mail in FS 1) First, set up the iphone Mail client 2) SSH to access file system The default password is alpine MIS Training Institute Session 1 - Slide 89
90 Example: Accessing Mail in FS SCP files on/off the device SQLite database MIS Training Institute Session 1 - Slide 90
91 What if the phone isn t rooted? Android ADB is limited to a few directories iphone can only grab photos/music via itunes MIS Training Institute Session 1 - Slide 91
92 Filesystem Access DATA STORAGE MIS Training Institute Session 1 - Slide 92
93 SQLite Single file rela4onal database Supported by Android & iphone APIs to store applica4on sekngs/data iphone keychains and cer4ficate chains are stored in sqlite databases MIS Training Institute Session 1 - Slide 93
94 SQLite Lis4ng tables:.tables Select statements for queries, SQL syntax MIS Training Institute Session 1 - Slide 94
95 XML Used by Android to store many things (shared prefs, manifest, etc.) Oren contains data stored by apps such as usernames or passwords MIS Training Institute Session 1 - Slide 95
96 Plist Used by iphone to store saved proper4es A.plist is: XML Binary (compressed XML) For binary files you can use: Property List Editor (in XCode) plu4l to convert to XML MIS Training Institute Session 1 - Slide 96
97 Plist Changing plists Some4mes can access hidden sekngs Example: ipod touch plist hacks to enable func4onality on less capable devices Oren useful to check preferences stored for the app Is valida4on performed? MIS Training Institute Session 1 - Slide 97
98 Property List Editor MIS Training Institute Session 1 - Slide 98
99 plutil MIS Training Institute Session 1 - Slide 99
100 Demo EXTRACTING CREDENTIALS MIS Training Institute Session 1 - Slide 100
101 LOGGING MIS Training Institute Session 1 - Slide 101
102 Logging Applica4ons may leak data through gratuitous logging In older versions of Android, the browser would log URLs visited This also logged session IDs for websites that put it in the GET request MIS Training Institute Session 1 - Slide 102
103 Viewing Android Logs Use adb logcat MIS Training Institute Session 1 - Slide 103
104 Viewing iphone Logs Use the Organizer window in xcode MIS Training Institute Session 1 - Slide 104
105 Demo INSECURE LOGGING MIS Training Institute Session 1 - Slide 105
106 Summary As amacker, file systems: Provide valuable insight into inner applica4on workings May be able to hack preferences or change app func4onality Are used by developers to store files for various reasons (offline access, autologin, etc.) Worth looking into the file system of the app Needs root access / jailbreak access MIS Training Institute Session 1 - Slide 106
107 Summary File system access: Android use ADB to access device file system (if rooted) iphone use SSH on a Jailbroken device MIS Training Institute Session 1 - Slide 107
108 Summary Important Android files XML files such as Shared preferences file Android manifest file Other XML storage SQLite Used for database storage as a lightweight database in a self contained file. Oren is a gold mine of informa4on Use standard SQL commands MIS Training Institute Session 1 - Slide 108
109 Summary Important iphone files plist files iphones version of stored configura4on, XML or compressed binary Contain configura4on that may be altered to change app behavior May contain sensi4ve informa4on depending on developer SQLite Same as for android MIS Training Institute Session 1 - Slide 109
110 CLIENT ANALYSIS MIS Training Institute Session 1 - Slide 110
111 Client Analysis ANDROID MIS Training Institute Session 1 - Slide 111
112 Android Application Layout Apps are packaged in an APK file (zip archive) What s in it? Dalvik class files (dex) Assets and Resources AndroidManifest.xml (packed in a binary format) APKs stored at /data/app on a device Can extract this MIS Training Institute Session 1 - Slide 112
113 Android Application Layout Android JAVA Original.java.java Compiled.dex.class Optimized.odex n/a Packaging.apk.jar Modification Apktool, baksmali Jad, java decompiler MIS Training Institute Session 1 - Slide 113
114 Android Application Layout MIS Training Institute Session 1 - Slide 114 Image :
115 AndroidManifest.xml Enumerates permissions We are most interested in permissions and metadata MIS Training Institute Session 1 - Slide 115
116 Analyzing an APK The files inside an APK aren t directly useful Need to unpack the XML, disassemble the dex class files Apktool does this!! hmp://code.google.com/p/android- apktool/ MIS Training Institute Session 1 - Slide 116
117 Apktool Uses APK APK (reengineered) MIS Training Institute Session 1 - Slide 117
118 Disassembly to Smali Smali is the Dalvik assembly Unlike JVM, register based Fairly readable.class public LHelloWorld;.super Ljava/lang/Object;.method public sta4c main([ljava/lang/string;)v.registers 2 sget- object v0, Ljava/lang/System;- >out:ljava/io/printstream; const- string v1, "Hello World! invoke- virtual {v0, v1}, Ljava/io/PrintStream;- >println(ljava/lang/string;)v return- void.end method MIS Training Institute Session 1 - Slide 118
119 Decompilation Looking at decompiled java is easier than reading Smali You may be familiar with jad or jdgui Use dex2jar to get a (JVM) jar from an apk Perform source review on decompiled app Doesnt work for all apks MIS Training Institute Session 1 - Slide 119
120 Decompilation MIS Training Institute Session 1 - Slide 120
121 Client Analysis IPHONE MIS Training Institute Session 1 - Slide 121
122 iphone Application Layout An iphone applica4on is packaged in.ipa file Stored in.app directory Executable code Assets and Resources Info.plist and other preset property lists /private/var/mobile/applica4ons/ MIS Training Institute Session 1 - Slide 122
123 Info.plist Stores applica4on metadata Package name File type associa4ons Applica4on- wide se4ngs Example: DetectJailbreaking flag in Info.plist set whether app will run on a jailbroken phone We can change this on a jailbroken phone at run4me MIS Training Institute Session 1 - Slide 123
124 Enabling hidden functionality Facebook ipad GUI hidden in iphone Not a hack, but demonstrates possibility Weaknesses in hiding func4onality in config files MIS Training Institute Session 1 - Slide 124
125 Analyzing the Binary Analyzing the binary is much more difficult than Android Use a disassembler like IDA Pro App Store binaries are DRM encrypted Use gdb to decrypt and dump code MIS Training Institute Session 1 - Slide 125
126 IDA for iphone Not a joke! But not that useful either MIS Training Institute Session 1 - Slide 126
127 Demo CLIENT ANALYSIS MIS Training Institute Session 1 - Slide 127
128 Summary Android Apps are compiled into dex format. Use APKtool to extract APKs and disassemble into smali format to read Can also be decompiled (less reliable) APKtool can also reengineer APKs MIS Training Institute Session 1 - Slide 128
129 Summary iphone Native code, so binary analysis of iphone apps are more low level, can use IDAPro AppStore files are DRM encrypted, use gdb to decrypt MIS Training Institute Session 1 - Slide 129
130 Summary Approach like traditional application reverse engineering Be aware of attack vectors buffer overflow type bugs not always fruitful Lot s of apps have poor key management Try to turn off jailbreaking detection either through patching or application settings MIS Training Institute Session 1 - Slide 130
131 RUNTIME ANALYSIS MIS Training Institute Session 1 - Slide 131
132 Why Do Runtime Analysis Companion to sta4c analysis Explore execu4on through a debugger Access stack values Extract code from encrypted binary (ios only) Possible amack vector Use a debugger to jump through a security check MIS Training Institute Session 1 - Slide 132
133 Why Do Runtime Analysis Many things that happen in an app lifecycle memory branch MIS Training Institute Session 1 - Slide 133
134 Debugging as an Attack Vector Jump over client- side business logic checks ipad app client- enforced restric4ons Jump over the branch to access other areas of code MIS Training Institute Session 1 - Slide 134
135 Debugging as an Attack Vector Using a debugger to get confidential data in memory (lost or stolen phone) MIS Training Institute Session 1 - Slide 135
136 Debugging as an Attack Vector Locked banking app manually call Intents? Certain 4mes can bypass screens by directly launching ac4vi4es MIS Training Institute Session 1 - Slide 136
137 Side topic: How easy to root? how easy is it to root a found device? If lockscreen isn t enabled we can enable USB debugging to provide ADB access (yes big if) ADB server is created on a uid=shell user which is not a privileged user in the android world. MIS Training Institute Session 1 - Slide 137
138 Side topic: How easy to root? Quick example Rage against the cage (Android local root exploit) MIS Training Institute Session 1 - Slide 138
139 Side topic: How easy to root? Arer restar4ng adb, you ll be connected as root Exploited shell to perform root ac4ons on device Install shell, busybox, pull data, apks MIS Training Institute Session 1 - Slide 139
140 Runtime Analysis ANDROID DEBUGGING MIS Training Institute Session 1 - Slide 140
141 Android Debugging We use ddms (Dalvik Debug Monitor Server) available in the SDK Dump the applica4on's heap AMach a remote debugger MIS Training Institute Session 1 - Slide 141
142 Attach to process MIS Training Institute Session 1 - Slide 142
143 Dump the heap (hprof) MIS Training Institute Session 1 - Slide 143
144 A Note on HPROF HPROF is java s heap and cpu profiling file format This is used by developers to profile cpu and memory usage We use it to browse heap values at the 4me of the heap dump MIS Training Institute Session 1 - Slide 144
145 Convert HPROF file We need to convert the file from the Dalvik HPROF format to the format used by Java We can then use Java tools to analyze it hprof- conv com.android. .hprof com.android. .fixed.hprof MIS Training Institute Session 1 - Slide 145
146 Analyze Heap MIS Training Institute Session 1 - Slide 146
147 Memory Analyzer Dominator tree Group by List objects MIS Training Institute Session 1 - Slide 147
148 Finding Heap Values MIS Training Institute Session 1 - Slide 148
149 Finding Heap Values MIS Training Institute Session 1 - Slide 149
150 Demo (Android) DUMPING MEMORY MIS Training Institute Session 1 - Slide 150
151 iphone Debugging iphone apps don t retain symbols Debugging is more blind than in Android Xcode won t help us debug without sources We install gdb on a jailbroken phone and use that MIS Training Institute Session 1 - Slide 151
152 Summary Run4me analysis is complimentary Can use debugging tools to jump rou4nes and access hidden areas of applica4ons Analyze memory to see how informa4on may be stored within a snapshot of 4me As a developer Ensure you clear variables and use garbage collec4on if sensi4ve data no longer required MIS Training Institute Session 1 - Slide 152
153 MOBILE CRYPTOGRAPHY MIS Training Institute Session 1 - Slide 153
154 Mobile Cryptography We must treat the mobile device as hos4le Don t store sensi4ve data unencrypted! (Basic Encryp4on lab) Doing encryp4on well is HARD (Advanced Encryp4on lab) Best prac4ce: don t store any sensi4ve data on device MIS Training Institute Session 1 - Slide 154
155 If You Must Encrypt Issues of cryptography are issues of implementa4on This is oren taken to mean Don t write your own AES library, but no. We mean key management We mean how the cipher is used MIS Training Institute Session 1 - Slide 155
156 Data in transit SSL/TLS is the golden standard here Easy to plug into mobile app, use HTTPS We find some mobile apps add a second layer of encryp4on over SSL/TLS Make it harder to analyze app s traffic Extra security MIS Training Institute Session 1 - Slide 156
157 Data at rest Easier to get right than data in transit S4ll hard to do right Your main concern is key management If the client can decrypt data on its own, an amacker can too (reverse engineering) We need to have a secret not stored on the client MIS Training Institute Session 1 - Slide 157
158 External Secret The user can type in the encryp4on key Difficult to remember/type The backend can give the client the encryp4on key arer user authen4cates Need secure authen4ca4on framework OR we can have the user remember a password, and somehow derive a key from it MIS Training Institute Session 1 - Slide 158
159 Password Based Key Derivation In ExploitMe Mobile we had the user authen4cate with local password This was ini4ally used as a UI lock, in case the phone was lost/stolen We will use this password to generate a key The standard we use is PBKDF2 MIS Training Institute Session 1 - Slide 159
160 Password Based Key Derivation public SecretKey genkeypwkdf2(string password, byte[] salt, int iterations) throws { SecretKeyFactory f =SecretKeyFactory.getInstance ("PBKDF2WithHmacSHA1"); PBEKeySpec keyspec = new PBEKeySpec( password.tochararray(), salt, iterations, KEY_BITS); SecretKey generatedkey = f.generatesecret(keyspec); return generatedkey; } MIS Training Institute Session 1 - Slide 160
161 How Do We Use This? public int unlockapplication(string password) throws exceptions { if (checkpassword(password)) { mcryptokey=mcipher.genkeypwkdf2(password, getpbksalt(), CryptoTool.NUM_ITERATIONS).getEncoded(); cleartextserveruser = mcipher.decryptb64string( getrestusername(), mcryptokey, getrestusernameiv()); cleartextserverpass = mcipher.decryptb64string( getrestpassword(), mcryptokey, getrestpasswordiv()); int statuscode = performlogin( cleartextserveruser, cleartextserverpass); if (statuscode == RestClient.NULL_ERROR) { locked = false; return statuscode; } } return RestClient.NO_OP; } MIS Training Institute Session 1 - Slide 161
162 Checking the Password Note if (checkpassword(password)) We perform a password check against a hash If we stored hashed passwords on the device, an amacker could crack it We can also use PBKD as an authen4ca4on mechanism MIS Training Institute Session 1 - Slide 162
163 Using PBE for authentication As before, use the password entered by the user to generate the key Now encrypt a known value with that key When the user enters a password, try to decrypt the known value with the derived key If it is successful, the user has the correct password, otherwise the user doesn t MIS Training Institute Session 1 - Slide 163
164 Other Considerations An amacker can build up a rainbow table, especially if they know an encrypted value we store Or they can pre- compute keys derived from common passwords Salt the password used for PBKDF Enforce strong local passwords MIS Training Institute Session 1 - Slide 164
165 Questions? Max Veytsman Subu Ramanathan MIS Training Institute Session 1 - Slide 165
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Mobile Application Security and Penetration Testing Syllabus
Mobile Application Security and Penetration Testing Syllabus Mobile Devices Overview 1.1. Mobile Platforms 1.1.1.Android 1.1.2.iOS 1.2. Why Mobile Security 1.3. Taxonomy of Security Threats 1.3.1.OWASP
SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules
Must have skills in any penetration tester's arsenal. MASPT at a glance: 10 highly practical modules 4 hours of video material 1200+ interactive slides 20 Applications to practice with Leads to emapt certification
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
Pentesting Android Apps. Sneha Rajguru (@Sneharajguru)
Pentesting Android Apps Sneha Rajguru (@Sneharajguru) About Me Penetration Tester Web, Mobile and Infrastructure applications, Secure coding ( part time do secure code analysis), CTF challenge writer (at
Bypassing SSL Pinning on Android via Reverse Engineering
Bypassing SSL Pinning on Android via Reverse Engineering Denis Andzakovic Security-Assessment.com 15 May 2014 Table of Contents Bypassing SSL Pinning on Android via Reverse Engineering... 1 Introduction...
Pentesting Mobile Applications
WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司 Pentesting Mobile Applications www.dbappsecurity.com.cn Who am I l Frank Fan: CTO of DBAPPSecurity Graduated from California State University as a Computer
Advanced ANDROID & ios Hands-on Exploitation
Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
Pentesting iphone Applications. Satishb3 http://www.securitylearn.net
Pentesting iphone Applications Satishb3 http://www.securitylearn.net Agenda iphone App Basics App development App distribution Pentesting iphone Apps Methodology Areas of focus Major Mobile Threats Who
Hacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus
Mobile Application Hacking for ios 3-Day Hands-On Course Syllabus Course description ios Mobile Application Hacking 3-Day Hands-On Course This course will focus on the techniques and tools for testing
AppUse - Android Pentest Platform Unified
AppUse - Android Pentest Platform Unified Standalone Environment AppUse is designed to be a weaponized environment for Android application penetration testing. It is a unique, free, and rich platform aimed
Mobile Application Security: Who, How and Why
Mobile Application Security: Who, How and Why Presented by: Mike Park Managing Security Consultant Trustwave SpiderLabs Who Am I Mike Park Managing Consultant, Application Security Services, Trustwave
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
Blackbox Android. Breaking Enterprise Class Applications and Secure Containers. Marc Blanchou Mathew Solnik 10/13/2011. https://www.isecpartners.
Blackbox Android Breaking Enterprise Class Applications and Secure Containers Marc Blanchou Mathew Solnik 10/13/2011 https://www.isecpartners.com Agenda Background Enterprise Class Applications Threats
Pentesting iphone & ipad Apps Hack In Paris 2011 June 17
Pentesting iphone & ipad Apps Hack In Paris 2011 June 17 Who are we? Flora Bottaccio Security Analyst at ADVTOOLS Sebastien Andrivet Director, co-founder of ADVTOOLS ADVTOOLS Swiss company founded in 2002
Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH
Securing ios Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me President of OPTIMAbit GmbH Responsible for > 200 Pentests per Year Ca 50 ios Pentests and code reviews in the last two years. Overview
Beginners Guide to Android Reverse Engineering
(W)ORK-SH/OP: Beginners Guide to Android Reverse Engineering (W)ORK-SH/OP: [email protected] Hall[14], Day 3 11:00h Agenda Purpose Recommended or needed tools (De)construction of Android apps Obtaining APKs Decompiling
Please Complete Speaker Feedback Surveys. SecurityTube.net
Please Complete Speaker Feedback Surveys Advanced ios Applica:on Pentes:ng Vivek Ramachandran Founder, SecurityTube.net [email protected] Vivek Ramachandran B.Tech, ECE IIT Guwaha: Media Coverage
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001
CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Pentesting Android Mobile Application
Pentesting Android Mobile Application Overview on Mobile applications Connect in Superior Way!! Mobile market is the worldwide rapidly developing segments since many customers are using mobile phones.
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
OWASP NZ Day 2011 Testing Mobile Applications
OWASP NZ Day 2011 Testing Mobile Applications Presenter: Nick von Dadelszen Date: 7 th July 2011 Company: Lateral Security (IT) Services Limited Company overview Company Lateral Security (IT) Services
Mobile Application Security Testing ASSESSMENT & CODE REVIEW
Mobile Application Security Testing ASSESSMENT & CODE REVIEW Sept. 31 st 2014 Presenters ITAC 2014 Bishop Fox Francis Brown Partner Joe DeMesy Security Associate 2 Introductions FRANCIS BROWN Hi, I m Fran
XenMobile Logs Collection Guide
XenMobile Logs Collection Guide 1 Contents Summary... 3 Background... 3 How to Collect Logs from Server Components... 4 Support Bundle Contents... 4 Operations Supported for Server Components... 5 Configurations
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Penetration Testing Android Applications
Author: Kunjan Shah Security Consultant Foundstone Professional Services Table of Contents Penetration Testing Android Applications... 1 Table of Contents... 2 Abstract... 3 Background... 4 Setting up
Lab 4 In class Hands-on Android Debugging Tutorial
Lab 4 In class Hands-on Android Debugging Tutorial Submit lab 4 as PDF with your feedback and list each major step in this tutorial with screen shots documenting your work, i.e., document each listed step.
Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications
Android & ios Application Vulnerability Assessment & Penetration Testing Training 2-Day hands on workshop on VAPT of Android & ios Applications Course Title Workshop on VAPT of Android & ios Applications
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
ANDROID APPS DEVELOPMENT FOR MOBILE AND TABLET DEVICE (LEVEL I)
ANDROID APPS DEVELOPMENT FOR MOBILE AND TABLET DEVICE (LEVEL I) Who am I? Lo Chi Wing, Peter Lecture 1: Introduction to Android Development Email: [email protected] Facebook: http://www.facebook.com/peterlo111
Mobile Applications: The True Potential Risks Where to look for information when performing a Pentest on a Mobile Application
Mobile Applications: The True Potential Risks Where to look for information when performing a Pentest on a Mobile Application Since the introduction of the iphone, Apple has sold more than 315 million
The Seven Habits of State-of-the-Art Mobile App Security
#mstrworld The Seven Habits of State-of-the-Art Mobile App Security Mobile Security 8 July 2014 Anand Dwivedi, Product Manager, MicroStrategy strworld Agenda - Seven Habits of State of the Art Mobile App
Project X Mass interception of encrypted connections
Project X Mass interception of encrypted connections What? SSL/TLS interception TOR interception ...a thorny path Common Issues Public Key Pinning avoids rogue CA to sign certs Common Issues Google and
The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases
The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases Elba Horta Regional Sales Manager, Southern Europe SSH Communica1ons Security [email protected] ENABLE,
Running a Program on an AVD
Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run
Android Programming and Security
Android Programming and Security Dependable and Secure Systems Andrea Saracino [email protected] Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
Mobile security, forensics & malware analysis with Santoku Linux. * Copyright 2013 viaforensics, LLC. Proprietary Information.
Mobile security, forensics & malware analysis with Santoku Linux PRESENTER - ANDREW HOOG CEO/Co-founder of viaforensics Andrew is a published author, computer scientist, and mobile security & forensics
Securing your Mobile Applications. Karson Chan Security Consultant
Securing your Mobile Applications Karson Chan Security Consultant NTT Com Security Threat can come from anywhere that s why we are everywhere 1,000+ Staff Our knowledge is your security 8,000+ Customers
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Security Testing Guidelines for mobile Apps
The OWASP Foundation http://www.owasp.org Security Testing Guidelines for mobile Apps Florian Stahl Johannes Ströher AppSec Research EU 2013 Who we are Florian Stahl Johannes Ströher Lead Consultant for
Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved
Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing
Reversing Android Malware
Reversing Android Malware The Honeynet Project 10 th Annual Workshop ESIEA PARIS.FR 2011-03-21 MAHMUD AB RAHMAN (MyCERT, CyberSecurity Malaysia) Copyright 2011 CyberSecurity Malaysia MYSELF Mahmud Ab Rahman
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Chapter 1. Introduction to ios Development. Objectives: Touch on the history of ios and the devices that support this operating system.
Chapter 1 Introduction to ios Development Objectives: Touch on the history of ios and the devices that support this operating system. Understand the different types of Apple Developer accounts. Introduce
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business Dmitry Dessiatnikov DISCLAIMER All informa,on in this presenta,on is provided for informa,on purposes only and in
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Forensic analysis of iphone backups
Forensic analysis of iphone backups The goal of iphone Backup Forensics analysis is extracting data and artefacts from the itunes backups without altering any information. iphone forensics can be performed
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Tushar Dalvi Sr. Security Engineer at LinkedIn Penetration Tester. Responsible for securing a large suite mobile apps
Tony Trummer Staff Engineer, Information Security at LinkedIn Penetration tester and mobile security enthusiast #3 in Android Security Acknowledgements Tushar Dalvi Sr. Security Engineer at LinkedIn Penetration
MOBILE SECURITY. As seen by FortConsult. Lars Syberg Head of Security Services
MOBILE SECURITY As seen by FortConsult Lars Syberg Head of Security Services FortConsult A/S Tranevej 16, 2400 Copenhagen, Denmark + 45 70207527 www.fortconsult.net About FortConsult Founded in 2002,
How To Test For Security On A Mobile Device
Security testing in mobile applications José Manuel Ortega Candel About me Ø Centers Technician at Everis Ø Computer engineer by Alicante University Ø Frontend and backend developer in Java/J2EE Ø Speaker
Android Security Evaluation Framework
INTRODUCING... A S E F Android Security Evaluation Framework - Parth Patel $ whoami_ Agenda Manual Research Automation - A S E F Let s solve problems Conclusion Android OS Open Source Security Evaluation
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
An Introduction to Android
An Introduction to Android Michalis Katsarakis M.Sc. Student [email protected] Tutorial: hy439 & hy539 16 October 2012 http://www.csd.uoc.gr/~hy439/ Outline Background What is Android Android as a
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
App Distribution Guide
App Distribution Guide Contents About App Distribution 10 At a Glance 11 Enroll in an Apple Developer Program to Distribute Your App 11 Generate Certificates and Register Your Devices 11 Add Store Capabilities
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Android Packer. facing the challenges, building solutions. Rowland YU. Senior Threat Researcher Virus Bulletin 2014
Android Packer facing the challenges, building solutions Rowland YU Senior Threat Researcher Virus Bulletin 2014 1 What is Android Packer? Android packers are able to encrypt an original classes.dex file,
Introduction to Android
Introduction to Android Poll How many have an Android phone? How many have downloaded & installed the Android SDK? How many have developed an Android application? How many have deployed an Android application
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Android (in)security. Having fun with Android. Sarantis Makoudis
Android (in)security Having fun with Android Sarantis Makoudis About Me BSc in Digital Systems, University of Piraeus, 2010 MSc in Information Security, Royal Holloway, University of London,2012 Penetration
Android Application Repackaging
ISA 564, Laboratory 4 Android Exploitation Software Requirements: 1. Android Studio http://developer.android.com/sdk/index.html 2. Java JDK http://www.oracle.com/technetwork/java/javase/downloads/index.html
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014]
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014] Table of Contents 1. CONFIGURING SSL ON ORACLE WEBLOGIC... 1-1 1.1 INTRODUCTION... 1-1 1.2 SETTING UP
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA. ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York
ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an
MASTER'S THESIS. Android Application Security with OWASP Mobile Top 10 2014. James King 2014
MASTER'S THESIS Android Application Security with OWASP Mobile Top 10 2014 James King 2014 Master of Arts (60 credits) Master of Science in Information Security Luleå University of Technology Department
Mercury User Guide v1.1
Mercury User Guide v1.1 Tyrone Erasmus 2012-09-03 Index Index 1. Introduction... 3 2. Getting started... 4 2.1. Recommended requirements... 4 2.2. Download locations... 4 2.3. Setting it up... 4 2.3.1.
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
The OWASP Foundation http://www.owasp.org
Android reverse engineering: understanding third-party applications OWASP EU Tour 2013 June 5, 2013. Bucharest (Romania) Vicente Aguilera Díaz OWASP Spain Chapter Leader Co-founder of Internet Security
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
Virtually Secure. a journey from analysis to remote root 0day on an industry leading SSL-VPN appliance
Virtually Secure a journey from analysis to remote root 0day on an industry leading SSL-VPN appliance Who am I? Tal Zeltzer Independent security researcher from Israel Reverse engineering (mostly embedded
Legal notices. Legal notices. For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html.
ADOBE AIR Security Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Installing and updating desktop applications...........................................................................
Analyzing the Security Schemes of Various Cloud Storage Services
Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services
Storing Encrypted Plain Text Files Using Google Android
Storing Encrypted Plain Text Files Using Google Android Abstract Jared Hatfield University of Louisville Google Android is an open source operating system that is available on a wide variety of smart phones
Silk Test 17.0. Testing Mobile Applications
Silk Test 17.0 Testing Mobile Applications Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 1992-2016. All rights reserved. MICRO
Pentesting ios Apps Runtime Analysis and Manipulation. Andreas Kurtz
Pentesting ios Apps Runtime Analysis and Manipulation Andreas Kurtz About PhD candidate at the Security Research Group, Department of Computer Science, University of Erlangen-Nuremberg Security of mobile
Security Issues in Android Custom ROMs
Security Issues in Android Custom ROMs HTML Version Anant Shrivastava http://anantshri.info Contents Abstract... 3 Introduction to Android... 3 What is Android ROM... 3 Types of ROM... 4 Advantages of
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
INTRODUCTION TO ANDROID CSCI 4448/5448: OBJECT-ORIENTED ANALYSIS & DESIGN LECTURE 11 02/15/2011
INTRODUCTION TO ANDROID CSCI 4448/5448: OBJECT-ORIENTED ANALYSIS & DESIGN LECTURE 11 02/15/2011 1 Goals of the Lecture Present an introduction to the Android Framework Coverage of the framework will be
CS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 2: Operating System Structures Prof. Alan Mislove ([email protected]) Operating System Services Operating systems provide an environment for
Threema security assessment
Threema security assessment Research project for Security of Systems and Networks Master System and Network Engineering Hristo Dimitrov, Jan Laan, Guido Pineda December 22, 2013 1 Abstract The research
