Forensics II. Android reverse engineering Logs [repetition]
|
|
|
- Darrell Poole
- 10 years ago
- Views:
Transcription
1 Forensics II Android reverse engineering Logs [repetition]
2 Android reverse enginering tools dex2jar A group of tools to work with android.dex and java.class files in combination with for example Java Decompiler smali/baksmali An assembler/disassembler for the dex format used by dalvik, Android's Java VM implementation android-apktool A tool for reverse engineering 3rd party, closed, binary Android apps It can decode resources to nearly original form and rebuild them after making some modifications (smali/baksmali integration) It makes possible to debug smali code step by step via DDMS (wiki) apk-signer
3 Reversing an Android app Task get rid of the lockout time nag in the Android Bluetooth GPS output program Tools Apktool, dex2jar, Java Decompiler and jarsigner (Java JDK) Get hold of the apk file e.g. /data/app/com.meowsbox.btgps.apk, (can also be in /data/app-private/) from the Android phone or Internet Unzip the com.meowsbox.btgps.apk file and grab classes.dex file Run d2j-dex2jar classes.dex which will convert the dex file into a ordinary jar file which can be opened with Java Decompiler Run apktool d com.meowsbox.btgps.apk which will decompress it and disassembly the apk file A folder is created with the resources and.smali dalvik code etc. Using Java Decompiler try to localize where the time nag is in the java code and find the corresponding code in the smali assemblies
4 Java vs. dalvik code I changed the opcode from if-eqz to if-nez in BluetoothChat.smali.method public sendnmeastring(ljava/lang/string;)v.locals 8.parameter "nmeastring".prologue const/4 v7, 0x1 public void sendnmeastring(string paramstring) { if (this.mchatservice.getstate() == 3) { if (!this.isregistered) break label44; byte[] arrayofbyte1 = paramstring.getbytes(); this.mchatservice.write(arrayofbyte1); int i = this.limit_nmeacount + 1; this.limit_nmeacount = i; } while (true) { return; label44: if (this.limit_nmeacount < 3000) { byte[] arrayofbyte2 = paramstring.getbytes(); this.mchatservice.write(arrayofbyte2); int j = this.limit_nmeacount + 1; this.limit_nmeacount = j; continue; } TextView localtextview = (TextView)findViewById( ); localtextview.settext( "***Trial time limit reached: GPS output disabled.");.line 954 iget-object v4, p0, Lcom/meowsbox/btgps/BluetoothChat;->mChatService:Lcom/meowsbox/btgps/BluetoothChatService; invoke-virtual {v4}, Lcom/meowsbox/btgps/BluetoothChatService;->getState()I move-result v4 const/4 v5, 0x3 First if jump to :cond_0 if-ne v4, v5, :cond_0.line 955 iget-boolean v4, p0, Lcom/meowsbox/btgps/BluetoothChat;->isRegistered:Z if-nez v4, :cond_1.line 956 invoke-virtual {p1}, Ljava/lang/String;->getBytes()[B Second if jump!
5 Repackaging and protection When the smali code changes are saved run apktool b com.meowsbox.btgps com.meowsbox.btgps_new.apk After rebuilding the application it needs to be signed, run "C:\Program Files\Java\jdk1.7.0_XX\bin\jarsigner" -keystore C:\Users\hjo\.android\debug.keystore com.meowsbox.btgps_new.apk androiddebugkey Use the password android After this you can install the cracked app with ADB etc. To protect your code enable proguard in the project.properties file proguard.config == proguard-project.txt Note that Proguard never runs when you compile debug code! To obfuscate your android program (android:debuggable should be off in the AndroidManifest.xml as well) and create release code In eclipse mark your project and select File > Export > Android > Export Android Application which will compile and align your code Then follow the wizard and point out your debug keystore (as above) or your registred developer keystore and enter the password
6 Virtuous Ten Studio Fully featured IDE (free, small time nag) Seamless integration of useful external tools ApkTool, Smali/Baksmali, ADB, Zipalign, Sign, dex2jar Winmerge, Remote Theme Injector (RTI) and many more Work with your apks just like having real java code Edit smali code like never before Syntax highlighting, Live syntax error checking Jumping to smali references (method calls, fields, classes, gotos), Help files on almost every smali command and topic Enhanced XML workflow Unpack and repack boot images Edit any content of your boot.img (no need of Linux) Direct communication with the Android device Tutorials
7 Virtuous Ten Studio (VTS)
8 AndroChef Java Decompiler AndroChef Java Decompiler builds upon DJ Java Decompiler at: AndroChef:
9 JEB - The Interactive Android Decompiler Full-fledged Dalvik decompiler. At its core, JEB's unique feature is its ability to directly decompile Dalvik bytecode to Java source code Interactivity. Analysts need flexible tools, especially when they deal with obfuscated or protected pieces of code Full APK view. Take advantage of the full APK view, including decompressed manifest, resources, certificates, strings, constants, etc. API for Automation. Use JEB's Application Programming Interface (API) to write Python scripts and plugins, and automate your analysis needs. Track your progress. Save your analysis to binary files, track progress through JEB's revision history mechanism Technical support and Multi-platform
10 Some Android Trojans analysis Geinimi Trojan Technical Analysis Read, collect, send and delete SMS messages Pull all contact information and send it to a remote server (number, name, the time they were last contacted) Place a phone call Silently download files Launch a web browser with a specific URL Android Bgserv Google released a security solution to deal with the Trojan:Android/DroidDream.A An app may contain an exploit which root your phone silently Rageagainstthecage - CVE-2010-EASY Android local root exploit (C) 2010 by 743C Patched/closed in and later Solutions? AV and firewall tools?
11 Android reversing resources Androguard Reverse Engineering Malware and goodware analysis of Android applications Wiki page have a open source database of Android Malwares Virtual Machine for Android Reverse Engineering XDA developers Android Development and Hacking > Android Software Development Android cracking Got many nice crackmes and tutorials (Way of the android cracker) Google for Android malware reversing (run apk in full speed)
12 How to read and examine logs? We can usually open the log as a text file, but not convenient in general (due to the information size) We can write our own code to examine Perl and Python are the common languages used for this Advantages: flexible, answer your needs (if you got the skills) We can use dedicated software specialized in log analysis Logs are the collection of basic events One basic event is often not really important but several events can lead to interesting conclusions Sometimes it is the only reliable source of information left Cross-analyze log files may be useful Statistical analysis is also important The analysis and understanding is often not obvious We have to re-build the puzzle!
13 Common Log Format The Common Log Format is a standardized text file format used by web servers which may be analyzed by a variety of analysis programs, example: Apache access.log Each line in a file stored in the Common Log Format has the following syntax: host ident auth-user date request status bytes A "-" in a field indicates missing data is the IP address of the client (remote host) which made the request to the server - RFC 1413 identity of the client, more info: frank is the user id of the person requesting the document [10/Oct/2000:13:55: ] is the date, time, and time zone when the server finished processing the request "GET /apache_pb.gif HTTP/1.0" is the request line from the client. The method GET, /apache_pb.gif the resource requested, and HTTP/1.0 the HTTP protocol 200 is the HTTP status code returned to the client. 2xx is a successful response, 3xx a redirection, 4xx a client error and 5xx a server error 2326 is the size of the object returned to the client, measured in bytes
14 Combined Log Format Another commonly used format string is called the Combined Log Format This format is exactly the same as the Common Log Format, with the addition of two more fields Referer (html page where apache_pb.gif originated) and User-agent (the client) Apache error.log format The first item in the log entry is the date and time of the message The second item lists the severity of the error being reported depending on the configured LogLevel LogLevels The third item gives the IP address of the client that generated the error Beyond that is the message itself, a very wide variety of different messages can appear In this case a client was denied to access /export/home/live/ap/htdocs/test
15 Windows XP IIS Logs Microsoft web server is called Internet Information Services (IIS) Detailed logging is enabled by default Most common and default format is W3C Extended Log File Format Log timestamps are GMT Default location: %SystemRoot%\System32\Logfiles\W3SVC1\ Log per day in format exyymmdd.log, where yy=year, mm=month and dd=day Example of IIS Log Entry
16 Windows Vista/7 IIS 7.5 Logs W3SVC1 and W3SVC2 u_ex... files
17 Windows XP FTP Logs Microsoft FTP Server Detailed logging enabled by default Most common and default format is W3C Extended Log File Format Log timestamps are GMT Default location: %SystemRoot%\System32\Logfiles\MSFTPSVC1\ Log per day in format exyymmdd.log, where yy=year, mm=month and dd=day Example of FTP Log Entry
18 Microsoft DHCP Server Logs Dynamic Host Configuration Protocol (DHCP) service in which IP address assigned dynamically upon request by host Microsoft servers provide this services IP address loaned for a short period and thus which machine had which IP address is based on particular point in time Logs record host to which IP was assigned Time is local system time zone! Default location for log is: %SystemRoot%\System32\DHCP\ Logs stored in one file per day basis Format of log file name is: DhcpSrvLog-XXX.log, where XXX=three letters of day of week, i.e. DhcpSrvLog-Sat.log Therefore, only 1 full week stored!
19 DHCP Log example Event ID - see table, Date, Time (Local system time zone) Description - action, IP address - IP assigned Host name - to which IP assigned MAC address - to which IP assigned
20 Windows XP Firewall Logs Firewall added to XP with SP 2 Firewall on by default Good logging utility, however, it is off by default Enabling is buried deep in user interface Don t expect to find it enabled often, except in domain settings with good administrator! Default location of firewall logs is: %SystemRoot%\pfirewall.log Always look for it anyway Windows Firewall Log Header and data
21 Windows Vista/7 Firewall Logs
22 Microsoft Port Reporter Port Reporter is a logging service which runs on Microsoft Windows 2000, XP, Server 2003 and newer...? Useful for troubleshooting, security, application profiling, application development, and so on... Port Reporter logs Ports that are used and the time they are used Processes that use the ports Whether a process is a service All the modules that each process has loaded The user account that each process runs under Also logs TCP/IP port usage data and port changes Increase or decrease in connections, port state changes etc. Port Reporter comes from MS PortrQry used in local mode Similar to netstat.exe -ano
23 Port Reporter Service Log files The service creates 3 log files with a name which uses date and time in 24-hour format (the *) when the file was created PR-INITIAL-*.log Contains data about the ports, processes and modules running on system when the service started up PR-PORTS-*.log Contains summary data about TCP and UDP port activity on computer listed using comma-separated value (.csv) format: date, time, protocol, local port, local IP address, remote port, remote IP address, PID, module, user context PR-PIDS-*.log Contains detailed information about ports, processes, related modules and user account process uses to run Each line in PR-PORTS log has a corresponding entry in the PR-PIDS log In summary the 3 log files provide Snapshot of port usage when service starts Summary data on ongoing port usage Detail data on ongoing port usage
24 Microsoft Port Reporter Parser Helps reviewing log data and apply filters and criterias to identify interesting ports, processes, modules and IP addresses etc.
25 Sawmill
26 Splunk 1
27 Splunk 2
28 MicroSoft Log Parser (free) As an application developer you often need to write some logs for your application There is many logging framework to choose among: Log4net, Log4j, Microsoft Logging Application Block, etc. But when it come to read those logs, search for data, create reports, extract statistics or perform some alert/action on them, things become harder Log Parser performs SQL queries against a variety of log files and other system data sources You can query any log and data sources (database, event log, IIS logs, file system, registry, etc.) with a complex SQL query! On the down side, using it from the command line become quickly unpractical as you need to type your SQL query in a DOS prompt logparser -i:evt "SELECT TOP 20 * FROM Security WHERE EventID=5032 ORDER BY TimeGenerated DESC" -o DATAGRID logparser -i:w3c -o:datagrid SELECT RowNumber, date, time, action, protocol, src-ip, dst-ip, src-port, dst-port FROM c:\pfirewall.log WHERE dst-port IN (80; 443) ORDER BY RowNumber
29 Log Parser Architecture Swiss Army knife for processing Windows logs of all types (and others). The world is your database with Log Parser! Input Formats are generic record providers Input Formats can be thought of as SQL tables containing the data you want to process Manage.evtx (Vista/7) event logs as well A SQL-Like Engine Core processes the records generated by an Input Format SQL language (SELECT, WHERE, GROUP BY, HAVING, ORDER BY etc.) Aggregate functions (SUM, COUNT, AVG, MAX, MIN etc.) A rich set of functions (e.g. SUBSTR, CASE, REVERSEDNS, etc.) Output Formats are generic consumers of records They can be thought of as SQL tables that receive the results of the data processing BSD syslog protocol, RFC 3164
30 Log Parser Lizard
31 SQALP (Simple Query Analyzer for Log Parser) batch file alternative (%filename% in sql) echo off cls logparser.exe -i:w3c file:winfw.sql? filename=c:\pfirewall.log -o:datagrid DATAGRID
32 MicroSoft Log Parser, events etc. Log Parser download ols/logparser/default.mspx Visual Log Parser GUI (SQALP) Log Parser Help File Very good resource! Book with loads of scripts and queries Microsoft log events (what does it mean?) Forensic Log Parsing with Microsoft's Log Parser Mastering Windows Network Forensics and Investigation have a good tutorial as well!
Analys och spårning. Text based logs Analysing and working with logs Surveillance and tracking
Analys och spårning Text based logs Analysing and working with logs Surveillance and tracking How to read and examine logs? We can usually open the log as a text file, but not convenient in general (due
Pentesting Android Apps. Sneha Rajguru (@Sneharajguru)
Pentesting Android Apps Sneha Rajguru (@Sneharajguru) About Me Penetration Tester Web, Mobile and Infrastructure applications, Secure coding ( part time do secure code analysis), CTF challenge writer (at
Beginners Guide to Android Reverse Engineering
(W)ORK-SH/OP: Beginners Guide to Android Reverse Engineering (W)ORK-SH/OP: [email protected] Hall[14], Day 3 11:00h Agenda Purpose Recommended or needed tools (De)construction of Android apps Obtaining APKs Decompiling
The OWASP Foundation http://www.owasp.org
Android reverse engineering: understanding third-party applications OWASP EU Tour 2013 June 5, 2013. Bucharest (Romania) Vicente Aguilera Díaz OWASP Spain Chapter Leader Co-founder of Internet Security
Reversing Android Malware
Reversing Android Malware The Honeynet Project 10 th Annual Workshop ESIEA PARIS.FR 2011-03-21 MAHMUD AB RAHMAN (MyCERT, CyberSecurity Malaysia) Copyright 2011 CyberSecurity Malaysia MYSELF Mahmud Ab Rahman
Android Application Repackaging
ISA 564, Laboratory 4 Android Exploitation Software Requirements: 1. Android Studio http://developer.android.com/sdk/index.html 2. Java JDK http://www.oracle.com/technetwork/java/javase/downloads/index.html
Bypassing SSL Pinning on Android via Reverse Engineering
Bypassing SSL Pinning on Android via Reverse Engineering Denis Andzakovic Security-Assessment.com 15 May 2014 Table of Contents Bypassing SSL Pinning on Android via Reverse Engineering... 1 Introduction...
Log Processing Tools. PS Tools Suite. PSTools Suite. PSTools Suite
Log Processing Tools Dr. Guillermo A Francia, III Jacksonville State University PS Tools Suite Developed by Mark Russinovich and Dave Solomon of SysInternals A collection of tools for viewing the detailed
AppUse - Android Pentest Platform Unified
AppUse - Android Pentest Platform Unified Standalone Environment AppUse is designed to be a weaponized environment for Android application penetration testing. It is a unique, free, and rich platform aimed
Hacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
Oracle FLEXCUBE Direct Banking Android Tab Client Installation Guide Release 12.0.3.0.0
Oracle FLEXCUBE Direct Banking Android Tab Client Installation Guide Release 12.0.3.0.0 Part No. E52543-01 April 2014 Oracle Financial Services Software Limited Oracle Park Off Western Express Highway
User Guide Zend Server Community 4.0.3
User Guide Zend Server Community 4.0.3 By Zend Technologies www.zend.com Table of Contents Abstract... 1 Password Management... 1 Support... 2 Zend Support Center... 2 Administration Interface... 3 General
Healthstone Monitoring System
Healthstone Monitoring System Patrick Lambert v1.1.0 Healthstone Monitoring System 1 Contents 1 Introduction 2 2 Windows client 2 2.1 Installation.............................................. 2 2.2 Troubleshooting...........................................
How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2
BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
Knowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database?
Knowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database? Date: January 11th, 2011 Last Update: January 21st, 2013 (see Section 2, C, 4) Problem: You want to create
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
Android Environment SDK
Part 2-a Android Environment SDK Victor Matos Cleveland State University Notes are based on: Android Developers http://developer.android.com/index.html 1 2A. Android Environment: Eclipse & ADT The Android
Mercury User Guide v1.1
Mercury User Guide v1.1 Tyrone Erasmus 2012-09-03 Index Index 1. Introduction... 3 2. Getting started... 4 2.1. Recommended requirements... 4 2.2. Download locations... 4 2.3. Setting it up... 4 2.3.1.
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Running a Program on an AVD
Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run
Ekran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
SafeCom Smart Printing Administrator s Quick Guide
SafeCom Smart Printing Administrator s Quick Guide D10600-08 March 2012 Trademarks: SafeCom, SafeCom Go, SafeCom P:Go, SafeCom epay and the SafeCom logo are trademarks of SafeCom a/s. Company and product
Introduction to Android
Introduction to Android 26 October 2015 Lecture 1 26 October 2015 SE 435: Development in the Android Environment 1 Topics for Today What is Android? Terminology and Technical Terms Ownership, Distribution,
Tushar Dalvi Sr. Security Engineer at LinkedIn Penetration Tester. Responsible for securing a large suite mobile apps
Tony Trummer Staff Engineer, Information Security at LinkedIn Penetration tester and mobile security enthusiast #3 in Android Security Acknowledgements Tushar Dalvi Sr. Security Engineer at LinkedIn Penetration
ADT Plugin for Eclipse
ADT Plugin for Eclipse Android Development Tools (ADT) is a plugin for the Eclipse IDE that is designed to give you a powerful, integrated environment in which to build Android applications. ADT extends
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
Adaptive Log Exporter Users Guide
IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,
Android Environment SDK
Part 2-a Android Environment SDK Victor Matos Cleveland State University Notes are based on: Android Developers http://developer.android.com/index.html 1 Android Environment: Eclipse & ADT The Android
Bitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
Setting up an MS SQL Server for IGSS
Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3
24x7 Scheduler Multi-platform Edition 5.2
24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table
KonyOne Server Prerequisites _ MS SQL Server
KonyOne Server Prerequisites _ MS SQL Server KonyOne Platform Release 5.0 Copyright 2012-2013 Kony Solutions, Inc. All Rights Reserved. Page 1 of 13 Copyright 2012-2013 by Kony Solutions, Inc. All rights
Version 7.7 PREEMPTIVE SOLUTIONS DASHO. User Guide
Version 7.7 PREEMPTIVE SOLUTIONS DASHO User Guide 1998-2015 by PreEmptive Solutions, LLC All rights reserved. Manual Version 7.7 www.preemptive.com TRADEMARKS DashO, Overload-Induction, the PreEmptive
How To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2
DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...
KB303215 - Microsoft Network Security Hotfix Checker (Hfnetchk.exe) Tool Is Available
Page 1 of 8 Knowledge Base Microsoft Network Security Hotfix Checker (Hfnetchk.exe) Tool Is Available PSS ID Number: 303215 Article Last Modified on 3/2/2004 The information in this article applies to:
Advanced ANDROID & ios Hands-on Exploitation
Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages
Mobile security, forensics & malware analysis with Santoku Linux. * Copyright 2013 viaforensics, LLC. Proprietary Information.
Mobile security, forensics & malware analysis with Santoku Linux PRESENTER - ANDREW HOOG CEO/Co-founder of viaforensics Andrew is a published author, computer scientist, and mobile security & forensics
isupplier PORTAL ACCESS SYSTEM REQUIREMENTS
TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
HP AppPulse Mobile. Adding HP AppPulse Mobile to Your Android App
HP AppPulse Mobile Adding HP AppPulse Mobile to Your Android App Document Release Date: April 2015 How to Add HP AppPulse Mobile to Your Android App How to Add HP AppPulse Mobile to Your Android App For
LANGuardian Integration Guide
LANGuardian Integration Guide October 2014 This document describes how to integrate LANGuardian with 3rd party systems. Author: Morgan Doyle Revision information: 1.0 NetFort Technologies Limited 2014.
Barracuda Networks Web Application Firewall
McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Barracuda Networks Web Application Firewall January 30, 2015 Barracuda Networks Web Application Firewall Page 1 of 10 Important
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
Blackbox Android. Breaking Enterprise Class Applications and Secure Containers. Marc Blanchou Mathew Solnik 10/13/2011. https://www.isecpartners.
Blackbox Android Breaking Enterprise Class Applications and Secure Containers Marc Blanchou Mathew Solnik 10/13/2011 https://www.isecpartners.com Agenda Background Enterprise Class Applications Threats
Installation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
VeriCentre 3.0 Upgrade Pre-Installation and Post Installation Guidelines
VeriCentre 3.0 Upgrade Pre-Installation and Post Installation Guidelines * For actual installation steps, please refer to the VeriCentre 3.0 Installation guide that came with the VeriCentre 3.0 software.
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Developing In Eclipse, with ADT
Developing In Eclipse, with ADT Android Developers file://v:\android-sdk-windows\docs\guide\developing\eclipse-adt.html Page 1 of 12 Developing In Eclipse, with ADT The Android Development Tools (ADT)
Burst Technology bt-loganalyzer SE
Burst Technology bt-loganalyzer SE Burst Technology Inc. 9240 Bonita Beach Rd, Bonita Springs, FL 34135 CONTENTS WELCOME... 3 1 SOFTWARE AND HARDWARE REQUIREMENTS... 3 2 SQL DESIGN... 3 3 INSTALLING BT-LOGANALYZER...
The "Eclipse Classic" version is recommended. Otherwise, a Java or RCP version of Eclipse is recommended.
Installing the SDK This page describes how to install the Android SDK and set up your development environment for the first time. If you encounter any problems during installation, see the Troubleshooting
Datagram. Datagram SyslogAgent manual. Version 3.6
Consulting Östermalmsgatan 21, 114 26 Stockholm, Sweden Tel +46 8 544 952 00 www.datagram.se Datagram Datagram SyslogAgent manual Version 3.6 April 2011 Table of contents: Datagram SyslogAgent manual...
TROUBLESHOOTING GUIDE
TROUBLESHOOTING GUIDE (When using SQL Server 2008 R2) Third edition, (3 Dec 2013) This manual applies to these networked products: Lucid CoPS, Lucid Rapid, LASS 8-11, LASS 11-15 LADS, LADS Plus, Lucid
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies,
MIB Explorer Feature Matrix
MIB Explorer Feature Matrix Lite Pro Android Standards and Protocols Supported SNMPv1 (RFC 1157), SNMPv2c (RFC 1901/1905), and SNMPv3 (RFC 3412-3417). Transport Protocols UDP, TCP, and. All transport protocols
Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.
Vmware ESX 4/5/6 - Provision virtual machines through vsphere, assign available resources and install operating systems. - Configure the various built in alarms for monitoring, configure alarm thresholds
Enterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
MatrixSSL Getting Started
MatrixSSL Getting Started TABLE OF CONTENTS 1 OVERVIEW... 3 1.1 Who is this Document For?... 3 2 COMPILING AND TESTING MATRIXSSL... 4 2.1 POSIX Platforms using Makefiles... 4 2.1.1 Preparation... 4 2.1.2
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Authoring for System Center 2012 Operations Manager
Authoring for System Center 2012 Operations Manager Microsoft Corporation Published: November 1, 2013 Authors Byron Ricks Applies To System Center 2012 Operations Manager System Center 2012 Service Pack
Braindumps.C2150-810.50 questions
Braindumps.C2150-810.50 questions Number: C2150-810 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ -810 IBM Security AppScan Source Edition Implementation This is the
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Analyzing large flow data sets using. visualization tools. modern open-source data search and. FloCon 2014. Max Putas
Analyzing large flow data sets using modern open-source data search and visualization tools FloCon 2014 Max Putas About me Operations Engineer - DevOps BS, MS, and CAS in Telecommunications Work/research
Fahim Uddin http://fahim.cooperativecorner.com [email protected]. 1. Java SDK
PREPARING YOUR MACHINES WITH NECESSARY TOOLS FOR ANDROID DEVELOPMENT SEPTEMBER, 2012 Fahim Uddin http://fahim.cooperativecorner.com [email protected] Android SDK makes use of the Java SE
Tips for getting started! with! Virtual Data Center!
Tips for getting started with Virtual Data Center Last Updated: 1 July 2014 Table of Contents Safe Swiss Cloud Self Service Control Panel 2 Please note the following about for demo accounts: 2 Add an Instance
Edit system files. Delete file. ObserveIT Highlights. Change OS settings. Change password. See exactly what users are doing!
ObserveIT auditing software acts like a security camera on your servers. It provides bulletproof video evidence of user sessions, significantly shortening investigation time. Every action performed by
Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents
Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents Goals... 3 High- Level Steps... 4 Basic FTP to File with Compression... 4 Steps in Detail... 4 MFT Console: Login and
Advanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Penetration Testing Android Applications
Author: Kunjan Shah Security Consultant Foundstone Professional Services Table of Contents Penetration Testing Android Applications... 1 Table of Contents... 2 Abstract... 3 Background... 4 Setting up
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Oracle WebLogic Server
Oracle WebLogic Server Creating Templates and Domains Using the pack and unpack Commands 10g Release 3 (10.3) November 2008 Oracle WebLogic Server Oracle Workshop for WebLogic Oracle WebLogic Portal Oracle
Android (in)security. Having fun with Android. Sarantis Makoudis
Android (in)security Having fun with Android Sarantis Makoudis About Me BSc in Digital Systems, University of Piraeus, 2010 MSc in Information Security, Royal Holloway, University of London,2012 Penetration
LoadRunner and Performance Center v11.52 Technical Awareness Webinar Training
LoadRunner and Performance Center v11.52 Technical Awareness Webinar Training Tony Wong 1 Copyright Copyright 2012 2012 Hewlett-Packard Development Development Company, Company, L.P. The L.P. information
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Tool for Automated Provisioning System (TAPS) Version 1.2 (1027)
Tool for Automated Provisioning System (TAPS) Version 1.2 (1027) 2015 VoIP Integration Rev. July 24, 2015 Table of Contents Product Overview... 3 Application Requirements... 3 Cisco Unified Communications
NovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
ManageEngine Exchange Reporter Plus :: Help Documentation WELCOME TO EXCHANGE REPORTER PLUS... 4 GETTING STARTED... 7 DASHBOARD VIEW...
TABLE OF CONTENTS WELCOME TO EXCHANGE REPORTER PLUS... 4 CONTACT ZOHO CORP.... 5 GETTING STARTED... 7 SYSTEM REQUIREMENTS... 8 INSTALLATION OF EXCHANGE REPORTER PLUS... 9 HOW EXCHANGE REPORTER PLUS WORKS...
DameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
EMC Documentum Composer
EMC Documentum Composer Version 6.5 User Guide P/N 300 007 217 A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 2008 EMC Corporation. All rights
IMF Tune Quarantine & Reporting Running SQL behind a Firewall. WinDeveloper Software Ltd.
IMF Tune Quarantine & Reporting Running SQL behind a Firewall WinDeveloper Software Ltd. 1 Basic Setup Quarantine & Reporting Web Interface must be installed on the same Windows Domain as the SQL Server
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
