Tushar Dalvi Sr. Security Engineer at LinkedIn Penetration Tester. Responsible for securing a large suite mobile apps
|
|
|
- Anissa Nichols
- 10 years ago
- Views:
Transcription
1
2 Tony Trummer Staff Engineer, Information Security at LinkedIn Penetration tester and mobile security enthusiast #3 in Android Security Acknowledgements Tushar Dalvi Sr. Security Engineer at LinkedIn Penetration Tester Responsible for securing a large suite mobile apps
3 QARK QUICK ANDROID REVIEW KIT A new tool to test apps for vulnerabilities and automate exploitation
4 1. Review of reversing APKs 2. Review of Android app structure 3. Review of Android components 4. Review of attack surfaces and vectors 5. Review of current tools 6. QARK introduction and demonstration 7. Lab time for hands-on
5 Long-tail of supported versions Ship-once, own forever Pace of development Numerous inter-app communication methods Plenty of baked-in gotchas Poor documentation
6 The known app attack surface is relatively small and largely transparent The AndroidManifest.xml file reveals many of the potential vulnerabilities Java is a known quantity - plenty of tools to examine the Java code
7 APKs Reversing APKs Code Structure
8 APKs Compressed Compiled Signed
9 Reversing APKs apktool dex2jar JD-GUI
10 Reversing APKs apktool d foo.apk Provides readable AndroidManifest.xml
11 Reversing APKs cp foo.apk foo.zip unzip foo.zip Provides a classes.dex file This is Dalvik ByteCode/Smali
12 Reversing APKs dex2jar.sh classes.dex Gives you classes_dex2jar.jar Compressed Java
13 Reversing APKs Use JD-GUI to open classes_dex2jar.jar Choose Save All Sources from the File menu Creates classes_dex2jar.src.zip unzip classes_dex2jar.src.zip
14 Code Structure AndroidManifest.xml Java
15 AndroidManifest.xml android:name: fooactivity 1-to-1 Mapping Java class fooactivity.java
16 AndroidManifest.xml: Permissions Content Providers Services Activities Receivers Intent Filters Others: Pending Intents WebViews Local Files
17 AndroidManifest.xml Defines most of the attack surface minsdkversion tradeoff <?xml version="1.0" encoding="utf-8"?> <manifest xmlns:android=" android" package="com.foo.android" android:installlocation="auto" android:versioncode="125" android:versionname="3.4.6" >
18 Permissions Protection Levels: normal dangerous signature signatureorsystem Can declare custom permissions Protect custom permissions with signatures Even signature based permissions can be stolen (pre-lollipop) <permission android:name="com.linkedin.android.permission.c2d_message" android:protectionlevel="signature" />
19 IPC Mechanisms Intents Explicit vs. Implicit Broadcast Used to start Activity, Service or deliver Broadcast Bundle/Extras AIDL Binder <intent-filter> <action android:name="android.accounts.accountauthenticator" /> </intent-filter>
20 Pending Intents Similar to callbacks Allow apps to act as one another final PendingIntent contentintent = PendingIntent.getBroadcast (this, notificationid, clickintent, PendingIntent.FLAG_CANCEL_CURRENT);
21 Intent Filters Not a security feature Often causes unintended exporting of features <intent-filter> <action android:name="android.accounts.accountauthenticator" /> </intent-filter>
22 Activities How users interact with the app <activity android:name="com.foobar.android.home.v2.shareactivity" android:configchanges="keyboardhidden orientation" android:screenorientation="portrait" android:windowsoftinputmode="statehidden adjustresize" > </activity>
23 Activity LifeCycle
24 Fragment LifeCycle
25 Services Processes that run in the background without a UI <service android:name="com.foobar.android.foo.authservice" android:exported="true > <intent-filter> <action android:name="com.foo.android.auth.do_stuff" /> </intent-filter> </service>
26 Service LifeCycle
27 Receivers Listen for events <receiver android:name=".authenticator.accountchangereceiver"> <intent-filter > <action android:name="android.accounts.login"/> </intent-filter> </receiver>
28 Content Providers Creates interface to app data Usually SQLite DB <provider android:name=".provider.foobarprovider" android:authorities="com.foobar.android" android:exported= true" > </provider>
29 WebViews A horrible idea Build your own browser Can potentially access files and content providers Can potentially interact with Java classes Can run JavaScript and other plugins Same Origin Policy bypasses On-device HTML templates private WebView foowebview;
30 Malicious Apps Malicious Intents (injection attacks) Pending Intent addition Broadcast Intent interception Intent spoofing Implicit Intent interception Permission squatting
31 Malicious Web Content OWASP top 10 Deeplinking
32 Remote Attackers Insecure communications Improper certificate validation
33 Local Attackers! Per FTC, 50% of users don t set PIN (I m skeptical) Difference of perception (FUD + Media) FDE is available/default (now) Debugging enabled? Then, turn it off World readable files World writeable files injection
34 Java classes Unsafe URI Malicious Sites Exposed methods Insecure Content WebView Javascript Bridge
35 Local Files World readable SDCARDS World readable/writeable files World readable log files
36 Insecure WebView content Improper Certificate Validation Insecure URL handling Insecure Pending Intents Insecure Data Storage SQL Injection
37 Drozer: pretty good, reads manifest to determine attack surface, can be used for advanced exploitation ADB: A debugger, log viewer, provides a shell and can send Intents manually IDE: Can report some vulnerabilities during build and view logs
38 adb shell CLI shell adb push/pull move files adb root restarts daemon as root adb shell pm list packages shows installed apps adb shell pm path com.foo.bar
39 # specifying the action and data uri adb shell am start -a "android.intent.action.view" -d " developer.android.com" # specifying the action, mime type and an extra string adb shell am start -a "android.intent.action.send" --es "android.intent.extra.text" "Hello World" -t "text/plain" # specifying an explicit component name adb shell am start -n "com.example.application/.mainactivity # specifying an explicit component name adb shell am startservice n "com.example.application/.backgroundservice" # specifying the action adb shell am broadcast a "android.intent.action.package_first_launch" -d "com.example.application" Thanks:
40 A lazy tester s friend Attempts to improve on these tools Can be used for attacking or auditing Written in Python Combination of XML parser and Android (Java) SCA
41 Drozer Strengths Ease of (basic) use Exploitation options Weakness Not SDLC friendly Free version limited Unfamiliar to devs Poor Docs Requires Android knowledge COTS tools Thorough in theory Well maintained? Expen$ive Many are geared toward forensics Little/no POC support or exploit options
42 Strengths Automatic PoC exploit app generation Exploitation options SDLC friendly Learning Red & Blue Team Extensible Weakness CLI-only for now SQLMap integration still in the works Work in progress?
43 Python XML Parsing Java Parsing (PLYJ) Grep Regex Time Experience Googling Python-Adb Dex2jar Multiple rounds of decompilation Best effort error handling for decompilation
44 Processes Manifest Determines supported API versions and version specific vulnerabilities Identifies insecure app configurations Identifies all explicitly and implicitly exported interprocess communication processes (aka sources) Evaluates permissions and protections SCA-light for Android-specific weaknesses and vulnerabilities Source Sink tracking from Manifest to Class SDLC-friendly for use on raw source by Security or Devs Can be used by researchers on already published APKs, with the extraction and de-compilation occurring automatically Automatic generation of ADB exploit examples which are available in-app Automatic generation of WebView exploit files Automatic generation of APK to provide POC apps
45 Clear/Concise reporting of issues Reporting includes (or will soon) Severity Issue explanation References Exploit Instructions Customized exploit code / steps whenever possible Automatic POC APK generation Somewhere between Drozer and Metasploit for Android Apps
46 Your prayers are appreciated! All hail the mighty demo gods!!
47 GUI Additional output formats Enhanced SCA, with more source -> sink mapping Automate APK retrieval SQLMap for Content Provider sploiting Hosted version? Dealing with obfuscation?
48 Drozer-MWR Labs JSSEC-Android Application Secure Design/Secure Coding Guidebook Developer.android.com
49 Contact
Pentesting Android Apps. Sneha Rajguru (@Sneharajguru)
Pentesting Android Apps Sneha Rajguru (@Sneharajguru) About Me Penetration Tester Web, Mobile and Infrastructure applications, Secure coding ( part time do secure code analysis), CTF challenge writer (at
Hacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
AppUse - Android Pentest Platform Unified
AppUse - Android Pentest Platform Unified Standalone Environment AppUse is designed to be a weaponized environment for Android application penetration testing. It is a unique, free, and rich platform aimed
Introduction to Android. CSG250 Wireless Networks Fall, 2008
Introduction to Android CSG250 Wireless Networks Fall, 2008 Outline Overview of Android Programming basics Tools & Tricks An example Q&A Android Overview Advanced operating system Complete software stack
WebView addjavascriptinterface Remote Code Execution 23/09/2013
MWR InfoSecurity Advisory WebView addjavascriptinterface Remote Code Execution 23/09/2013 Package Name Date Affected Versions Google Android Webkit WebView 23/09/2013 All Android applications built with
Advanced ANDROID & ios Hands-on Exploitation
Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages
The OWASP Foundation http://www.owasp.org
Android reverse engineering: understanding third-party applications OWASP EU Tour 2013 June 5, 2013. Bucharest (Romania) Vicente Aguilera Díaz OWASP Spain Chapter Leader Co-founder of Internet Security
Android (in)security. Having fun with Android. Sarantis Makoudis
Android (in)security Having fun with Android Sarantis Makoudis About Me BSc in Digital Systems, University of Piraeus, 2010 MSc in Information Security, Royal Holloway, University of London,2012 Penetration
Deep Inside Android. OpenExpo 2008 - Zurich September 25 th, 2008. Gilles Printemps - Senior Architect. Copyright 2007 Esmertec AG.
Deep Inside Android OpenExpo 2008 - Zurich September 25 th, 2008 Copyright 2007 Esmertec AG Jan 2007 Gilles Printemps - Senior Architect Agenda What is Android? The Android platform Anatomy of an Android
OWASP NZ Day 2011 Testing Mobile Applications
OWASP NZ Day 2011 Testing Mobile Applications Presenter: Nick von Dadelszen Date: 7 th July 2011 Company: Lateral Security (IT) Services Limited Company overview Company Lateral Security (IT) Services
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Android Development. Marc Mc Loughlin
Android Development Marc Mc Loughlin Android Development Android Developer Website:h:p://developer.android.com/ Dev Guide Reference Resources Video / Blog SeCng up the SDK h:p://developer.android.com/sdk/
Beginners Guide to Android Reverse Engineering
(W)ORK-SH/OP: Beginners Guide to Android Reverse Engineering (W)ORK-SH/OP: [email protected] Hall[14], Day 3 11:00h Agenda Purpose Recommended or needed tools (De)construction of Android apps Obtaining APKs Decompiling
Android Application Development
Android Application Development Self Study Self Study Guide Content: Course Prerequisite Course Content Android SDK Lab Installation Guide Start Training Be Certified Exam sample Course Prerequisite The
Getting started with Android and App Engine
Getting started with Android and App Engine About us Tim Roes Software Developer (Mobile/Web Solutions) at inovex GmbH www.timroes.de www.timroes.de/+ About us Daniel Bälz Student/Android Developer at
Penetration Testing Android Applications
Author: Kunjan Shah Security Consultant Foundstone Professional Services Table of Contents Penetration Testing Android Applications... 1 Table of Contents... 2 Abstract... 3 Background... 4 Setting up
the cross platform mobile apps dream Click to edit Master title style Click to edit Master text styles Third level Fourth level» Fifth level
Click to edit Master title style Click to edit Master text styles The Second nightmare level behind Third level the cross platform Fourth level» Fifth level mobile apps dream Marco Grassi @marcograss [email protected]
Graduate presentation for CSCI 5448. By Janakiram Vantipalli ( [email protected] )
Graduate presentation for CSCI 5448 By Janakiram Vantipalli ( [email protected] ) Content What is Android?? Versions and statistics Android Architecture Application Components Inter Application
Understanding Android s Security Framework
Understanding Android s Security Framework William Enck and Patrick McDaniel Tutorial October 2008 Systems and Internet Infrastructure Security Laboratory (SIIS) 1 2 Telecommunications Nets. The telecommunications
Popular Android Exploits
20-CS-6053 Network Security Spring, 2016 An Introduction To Popular Android Exploits and what makes them possible April, 2016 Questions Can a benign service call a dangerous service without the user knowing?
Android Environment SDK
Part 2-a Android Environment SDK Victor Matos Cleveland State University Notes are based on: Android Developers http://developer.android.com/index.html 1 2A. Android Environment: Eclipse & ADT The Android
SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules
Must have skills in any penetration tester's arsenal. MASPT at a glance: 10 highly practical modules 4 hours of video material 1200+ interactive slides 20 Applications to practice with Leads to emapt certification
MASTER'S THESIS. Android Application Security with OWASP Mobile Top 10 2014. James King 2014
MASTER'S THESIS Android Application Security with OWASP Mobile Top 10 2014 James King 2014 Master of Arts (60 credits) Master of Science in Information Security Luleå University of Technology Department
Bypassing SSL Pinning on Android via Reverse Engineering
Bypassing SSL Pinning on Android via Reverse Engineering Denis Andzakovic Security-Assessment.com 15 May 2014 Table of Contents Bypassing SSL Pinning on Android via Reverse Engineering... 1 Introduction...
Android For Java Developers. Marko Gargenta Marakana
Android For Java Developers Marko Gargenta Marakana Agenda Android History Android and Java Android SDK Hello World! Main Building Blocks Debugging Summary History 2005 Google buys Android, Inc. Work on
Here to take you beyond Mobile Application development using Android Course details
Here to take you beyond Mobile Application development using Android Course details Mobile Application Development using Android Objectives: To get you started with writing mobile application using Android
Lab 4 In class Hands-on Android Debugging Tutorial
Lab 4 In class Hands-on Android Debugging Tutorial Submit lab 4 as PDF with your feedback and list each major step in this tutorial with screen shots documenting your work, i.e., document each listed step.
Android Geek Night. Application framework
Android Geek Night Application framework Agenda 1. Presentation 1. Trifork 2. JAOO 2010 2. Google Android headlines 3. Introduction to an Android application 4. New project using ADT 5. Main building blocks
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
OpenCV on Android Platforms
OpenCV on Android Platforms Marco Moltisanti Image Processing Lab http://iplab.dmi.unict.it [email protected] http://www.dmi.unict.it/~moltisanti Outline Intro System setup Write and build an Android
Android Application Development. Daniel Switkin Senior Software Engineer, Google Inc.
Android Application Development Daniel Switkin Senior Software Engineer, Google Inc. Goal Get you an idea of how to start developing Android applications Introduce major Android application concepts Walk
App Development for Android. Prabhaker Matet
App Development for Android Prabhaker Matet Development Tools (Android) Java Java is the same. But, not all libs are included. Unused: Swing, AWT, SWT, lcdui Eclipse www.eclipse.org/ ADT Plugin for Eclipse
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
SDK Quick Start Guide
SDK Quick Start Guide Table of Contents Requirements...3 Project Setup...3 Using the Low Level API...9 SCCoreFacade...9 SCEventListenerFacade...10 Examples...10 Call functionality...10 Messaging functionality...10
Smartphone market share
Smartphone market share Gartner predicts that Apple s ios will remain the second biggest platform worldwide through 2014 despite its share deceasing slightly after 2011. Android will become the most popular
Android (Basic + Advance) Application Development
Android (Basic + Advance) Application Development You will learn how to create custom widgets, create animations, work with camera, use sensors, create and use advanced content providers and much more.
Mercury User Guide v1.1
Mercury User Guide v1.1 Tyrone Erasmus 2012-09-03 Index Index 1. Introduction... 3 2. Getting started... 4 2.1. Recommended requirements... 4 2.2. Download locations... 4 2.3. Setting it up... 4 2.3.1.
directory to "d:\myproject\android". Hereafter, I shall denote the android installed directory as
1 of 6 2011-03-01 12:16 AM yet another insignificant programming notes... HOME Android SDK 2.2 How to Install and Get Started Introduction Android is a mobile operating system developed by Google, which
A Large-Scale Study of Mobile Web App Security
A Large-Scale Study of Mobile Web App Security Patrick Mutchler, Adam Doupé, John Mitchell, Chris Kruegel and Giovanni Vigna Stanford University {pcm2d, mitchell}@stanford.edu Arizona State University
Braindumps.C2150-810.50 questions
Braindumps.C2150-810.50 questions Number: C2150-810 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ -810 IBM Security AppScan Source Edition Implementation This is the
An Introduction to Android Application Development. Serdar Akın, Haluk Tüfekçi
An Introduction to Android Application Serdar Akın, Haluk Tüfekçi ARDIC ARGE http://www.ardictech.com April 2011 Environment Programming Languages Java (Officially supported) C (Android NDK Needed) C++
Android Environment SDK
Part 2-a Android Environment SDK Victor Matos Cleveland State University Notes are based on: Android Developers http://developer.android.com/index.html 1 Android Environment: Eclipse & ADT The Android
Login with Amazon Getting Started Guide for Android. Version 2.0
Getting Started Guide for Android Version 2.0 Login with Amazon: Getting Started Guide for Android Copyright 2016 Amazon.com, Inc., or its affiliates. All rights reserved. Amazon and the Amazon logo are
HP AppPulse Mobile. Adding HP AppPulse Mobile to Your Android App
HP AppPulse Mobile Adding HP AppPulse Mobile to Your Android App Document Release Date: April 2015 How to Add HP AppPulse Mobile to Your Android App How to Add HP AppPulse Mobile to Your Android App For
How To Develop Android On Your Computer Or Tablet Or Phone
AN INTRODUCTION TO ANDROID DEVELOPMENT CS231M Alejandro Troccoli Outline Overview of the Android Operating System Development tools Deploying application packages Step-by-step application development The
Getting Started with Android Programming (5 days) with Android 4.3 Jelly Bean
Getting Started with Android Programming (5 days) with Android 4.3 Jelly Bean Course Description Getting Started with Android Programming is designed to give students a strong foundation to develop apps
Web Application Security
Web Application Security Ng Wee Kai Senior Security Consultant PulseSecure Pte Ltd About PulseSecure IT Security Consulting Company Part of Consortium in IDA (T) 606 Term Tender Cover most of the IT Security
Android Programming and Security
Android Programming and Security Dependable and Secure Systems Andrea Saracino [email protected] Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System
Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH
Securing ios Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me President of OPTIMAbit GmbH Responsible for > 200 Pentests per Year Ca 50 ios Pentests and code reviews in the last two years. Overview
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Android Security Basic Background
1 Speaker Bio Yu-Cheng Lin ( 林 禹 成 ) Software Engineer at MediaTek smartphone security team M.S. from Information Security Lab of National Tsing Hua University Taiwan Twitter: @AndroBugs Email: [email protected]
Google Web Toolkit. Introduction to GWT Development. Ilkka Rinne & Sampo Savolainen / Spatineo Oy
Google Web Toolkit Introduction to GWT Development Ilkka Rinne & Sampo Savolainen / Spatineo Oy GeoMashup CodeCamp 2011 University of Helsinki Department of Computer Science Google Web Toolkit Google Web
Cyber Security Challenge Australia 2014
Cyber Security Challenge Australia 2014 www.cyberchallenge.com.au CySCA2014 Web Penetration Testing Writeup Background: Pentest the web server that is hosted in the environment at www.fortcerts.cysca Web
Mobile Application Development
Mobile Application Development (Android & ios) Tutorial Emirates Skills 2015 3/26/2015 1 What is Android? An open source Linux-based operating system intended for mobile computing platforms Includes a
Mobility Introduction Android. Duration 16 Working days Start Date 1 st Oct 2013
Mobility Introduction Android Duration 16 Working days Start Date 1 st Oct 2013 Day 1 1. Introduction to Mobility 1.1. Mobility Paradigm 1.2. Desktop to Mobile 1.3. Evolution of the Mobile 1.4. Smart phone
ANDROID PROGRAMMING - INTRODUCTION. Roberto Beraldi
ANDROID PROGRAMMING - INTRODUCTION Roberto Beraldi Introduction Android is built on top of more than 100 open projects, including linux kernel To increase security, each application runs with a distinct
CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001
CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
Building an Android client. Rohit Nayak Talentica Software
Building an Android client Rohit Nayak Talentica Software Agenda iphone and the Mobile App Explosion How mobile apps differ Android philosophy Development Platform Core Android Concepts App Demo App Dissection
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Overview of CS 282 & Android
Overview of CS 282 & Android Douglas C. Schmidt [email protected] www.dre.vanderbilt.edu/~schmidt Institute for Software Integrated Systems Vanderbilt University Nashville, Tennessee, USA CS 282
Blackbox Android. Breaking Enterprise Class Applications and Secure Containers. Marc Blanchou Mathew Solnik 10/13/2011. https://www.isecpartners.
Blackbox Android Breaking Enterprise Class Applications and Secure Containers Marc Blanchou Mathew Solnik 10/13/2011 https://www.isecpartners.com Agenda Background Enterprise Class Applications Threats
Running a Program on an AVD
Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
Android Security for Enterprise App Developers Jon Preedy
Android Security for Enterprise App Developers Jon Preedy Sr. Sales Engineer Agenda for Lightning Talk Developer View Android Security Model Security and Enterprise-Scale Device Configuration Encryption
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Overview. The Android operating system is like a cake consisting of various layers.
The Android Stack Overview The Android operating system is like a cake consisting of various layers. Each layer has its own characteristics and purpose but the layers are not always cleanly separated and
Android Programming: Installation, Setup, and Getting Started
2012 Marty Hall Android Programming: Installation, Setup, and Getting Started Originals of Slides and Source Code for Examples: http://www.coreservlets.com/android-tutorial/ Customized Java EE Training:
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
UNRESTRICTED EXTERNAL
drozer Users Guide mwrinfosecurity.com MWR InfoSecurity UNRESTRICTED EXTERNAL 1 Contents page Change Synopsis... 3 1. Introduction... 4 1.1 What is drozer?... 4 1.2 Conventions... 4 2. Getting Started...
Android Security. Giovanni Russello [email protected]
Android Security Giovanni Russello [email protected] N-Degree of Separation Applications can be thought as composed by Main Functionality Several Non-functional Concerns Security is a non-functional
Measuring The End-to-End Value Of Your App. Neil Rhodes: Tech Lead, Mobile Analytics Nick Mihailovski: Developer Programs Engineer
Developers Measuring The End-to-End Value Of Your App Neil Rhodes: Tech Lead, Mobile Analytics Nick Mihailovski: Developer Programs Engineer What you re measuring Web site Mobile app Announcing: Google
Oracle FLEXCUBE Direct Banking Android Tab Client Installation Guide Release 12.0.3.0.0
Oracle FLEXCUBE Direct Banking Android Tab Client Installation Guide Release 12.0.3.0.0 Part No. E52543-01 April 2014 Oracle Financial Services Software Limited Oracle Park Off Western Express Highway
Android Developer Fundamental 1
Android Developer Fundamental 1 I. Why Learn Android? Technology for life. Deep interaction with our daily life. Mobile, Simple & Practical. Biggest user base (see statistics) Open Source, Control & Flexibility
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Android Development Exercises Version - 2012.02. Hands On Exercises for. Android Development. v. 2012.02
Hands On Exercises for Android Development v. 2012.02 WARNING: The order of the exercises does not always follow the same order of the explanations in the slides. When carrying out the exercises, carefully
Forensics II. Android reverse engineering Logs [repetition]
Forensics II Android reverse engineering Logs [repetition] Android reverse enginering tools dex2jar A group of tools to work with android.dex and java.class files in combination with for example Java Decompiler
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Android 4.4 App Development Essentials
Android 4.4 App Development Essentials i Android 4.4 App Development Essentials First Edition ISBN-13: 978-1-4953580-6-7 2014 Neil Smyth. All Rights Reserved. This book is provided for personal use only.
Developing Android Apps: Part 1
: Part 1 [email protected] www.dre.vanderbilt.edu/~schmidt Institute for Software Integrated Systems Vanderbilt University Nashville, Tennessee, USA CS 282 Principles of Operating Systems II Systems
HackMiami Web Application Scanner 2013 PwnOff
HackMiami Web Application Scanner 2013 PwnOff An Analysis of Automated Web Application Scanning Suites James Ball, Alexander Heid, Rod Soto http://www.hackmiami.org Overview Web application scanning suites
ANDROID APPS DEVELOPMENT FOR MOBILE AND TABLET DEVICE (LEVEL I)
ANDROID APPS DEVELOPMENT FOR MOBILE AND TABLET DEVICE (LEVEL I) Who am I? Lo Chi Wing, Peter Lecture 1: Introduction to Android Development Email: [email protected] Facebook: http://www.facebook.com/peterlo111
Android Development Tutorial. Nikhil Yadav CSE40816/60816 - Pervasive Health Fall 2011
Android Development Tutorial Nikhil Yadav CSE40816/60816 - Pervasive Health Fall 2011 Database connections Local SQLite and remote access Outline Setting up the Android Development Environment (Windows)
Securing your Mobile Applications. Karson Chan Security Consultant
Securing your Mobile Applications Karson Chan Security Consultant NTT Com Security Threat can come from anywhere that s why we are everywhere 1,000+ Staff Our knowledge is your security 8,000+ Customers
Mocean Android SDK Developer Guide
Mocean Android SDK Developer Guide For Android SDK Version 3.2 136 Baxter St, New York, NY 10013 Page 1 Table of Contents Table of Contents... 2 Overview... 3 Section 1 Setup... 3 What changed in 3.2:...
Fahim Uddin http://fahim.cooperativecorner.com [email protected]. 1. Java SDK
PREPARING YOUR MACHINES WITH NECESSARY TOOLS FOR ANDROID DEVELOPMENT SEPTEMBER, 2012 Fahim Uddin http://fahim.cooperativecorner.com [email protected] Android SDK makes use of the Java SE
Android Security Lab WS 2014/15 Lab 1: Android Application Programming
Saarland University Information Security & Cryptography Group Prof. Dr. Michael Backes saarland university computer science Android Security Lab WS 2014/15 M.Sc. Sven Bugiel Version 1.0 (October 6, 2014)
ANDROID PROGRAMMING - INTRODUCTION. Roberto Beraldi
ANDROID PROGRAMMING - INTRODUCTION Roberto Beraldi Introduction Android is built on top of more than 100 open projects, including linux kernel To increase security, each application runs with a distinct
App Development for Smart Devices. Lec #2: Android Tools, Building Applications, and Activities
App Development for Smart Devices CS 495/595 - Fall 2011 Lec #2: Android Tools, Building Applications, and Activities Tamer Nadeem Dept. of Computer Science Objective Understand Android Tools Setup Android
INTERMEDIATE ANDROID DEVELOPMENT Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 INTERMEDIATE ANDROID DEVELOPMENT Course Syllabus Course Number: APD-0248 OHLAP Credit: No OCAS Code: None Course Length: 120 Hours Career Cluster:
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing
