OWASP NZ Day 2011 Testing Mobile Applications



Similar documents
Mobile NFC 101. Presenter: Nick von Dadelszen Date: 31st August 2012 Company: Lateral Security (IT) Services Limited

Android (in)security. Having fun with Android. Sarantis Makoudis

Mobile Application Security and Penetration Testing Syllabus

Mobile Application Threat Analysis

Penetration Testing for iphone Applications Part 1

SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules

AppUse - Android Pentest Platform Unified

Pentesting Android Apps. Sneha Rajguru

Security Testing Guidelines for mobile Apps

Mike Zusman 3/7/2011. OWASP Goes Mobile SANS AppSec Summit 2011

ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications

Pentesting Android Mobile Application

Enterprise Application Security Workshop Series

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

The OWASP Foundation

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Penetration Testing Android Applications

Mobile Application Security Sharing Session May 2013

Magento Security and Vulnerabilities. Roman Stepanov

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Web Application Penetration Testing

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

How To Protect A Web Application From Attack From A Trusted Environment

2013 MONITORAPP Co., Ltd.

Application Security Testing

Pentesting Mobile Applications

Network Test Labs (NTL) Software Testing Services for igaming

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Mobile Applications: The True Potential Risks Where to look for information when performing a Pentest on a Mobile Application

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Penetration Testing for iphone / ipad Applications

05.0 Application Development

Smartphone Pentest Framework v0.1. User Guide

elearning for Secure Application Development

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Hacking your Droid ADITYA GUPTA

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

Pentesting iphone Applications. Satishb3

MASTER'S THESIS. Android Application Security with OWASP Mobile Top James King 2014

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Mobile Application Security: Who, How and Why

Web application testing

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Workday Mobile Security FAQ

Security and Privacy issues in ios and Android Apps. OWASP July 12, The OWASP Foundation

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

What is Web Security? Motivation

Tushar Dalvi Sr. Security Engineer at LinkedIn Penetration Tester. Responsible for securing a large suite mobile apps

Blackbox Android. Breaking Enterprise Class Applications and Secure Containers. Marc Blanchou Mathew Solnik 10/13/

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

How To Manage Web Content Management System (Wcm)

Implementation of Web Application Firewall

Pentesting iphone & ipad Apps Hack In Paris 2011 June 17

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Security Products Development. Leon Juranic

(WAPT) Web Application Penetration Testing

Web attacks and security: SQL injection and cross-site scripting (XSS)

Improve your mobile application security with IBM Worklight

Web Application Security

Ethical Hacking as a Professional Penetration Testing Technique

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

Information Security. Training

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

STABLE & SECURE BANK lab writeup. Page 1 of 21

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Cloud Security:Threats & Mitgations

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

Guidelines for Web applications protection with dedicated Web Application Firewall

Web Application Vulnerability Testing with Nessus

Bypassing CAPTCHAs by Impersonating CAPTCHA Providers

PCI Security Standards Council

Using Foundstone CookieDigger to Analyze Web Session Management

Chapter 1 Web Application (In)security 1

Kaspersky Lab Mobile Device Management Deployment Guide

Mobile Device Mismanagement Vulnerabili*es in MDM Solu*ons and their impact

Securing your Mobile Applications. Karson Chan Security Consultant

NWEN405: Security Engineering

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005

Project X Mass interception of encrypted connections

VeilMail Penetration Test Executive Summary PRESENTED TO: GREG ROAKE, CEO.TURNER TECHNOLOGIES LTD - VEILMAIL STEVE BYRNE, DIRECTOR.

Adobe Systems Incorporated

Overview of the Penetration Test Implementation and Service. Peter Kanters

IJMIE Volume 2, Issue 9 ISSN:

Common Criteria Web Application Security Scoring CCWAPSS

Thomas Röthlisberger IT Security Analyst

Bypassing SSL Pinning on Android via Reverse Engineering

Citrix Receiver for Mobile Devices Troubleshooting Guide

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

Security Evaluation CLX.Sentinel

Agenda. How to configure

Bomgar Corporation. Bomgar Application Security Assessment Summary January 26, This document is the property of Bomgar Corporation.

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

Web Application Security Assessment and Vulnerability Mitigation Tests

Web Application Security Payloads. Andrés Riancho Director of Web Security OWASP AppSec USA Minneapolis

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Transcription:

OWASP NZ Day 2011 Testing Mobile Applications Presenter: Nick von Dadelszen Date: 7 th July 2011 Company: Lateral Security (IT) Services Limited

Company overview Company Lateral Security (IT) Services Limited Founded in April 2008, offices in Wellington and Auckland Directors Ratu Mason and Nick von Dadelszen Services Information security testing (design, architecture, penetration testing, security controls, policy and compliance) Lifecycle auditing (design, pre prod, post prod) Regular ongoing testing programmes Differentiators True vendor independence Security testing is our unique specialty Very highly skilled staff

Agenda Why mobile apps How to test Attacking the communication Attacking the server Attacking the client iphone Android What to test for Roundup What we talked about What we didn t talk about

Why Mobile Apps Everyone is developing Mobile apps these days Banks Travel industry Trademe Subway Not Web Apps Similar to my Kiwicon 2007 Fat Client talk BUT Mobile apps generally customer facing

How To Test Two different approaches to testing: Whitebox testing Full information and source code provided Blackbox testing No code or information provided Working only with downloadable app Three areas to focus on: Attack the network communication Attack the server component Attack the client component

Attacking The Communication Need to check how information is passed between the client and server Is it encrypted? Can it be MITMed? What authentication is performed for network traffic? If HTTP protocol is used several methods to intercept traffic Configure HTTP proxy on phone/emulator Use tool such as Burp in reverse proxy mode

Attacking the Communication If URL is hard coded and app doesn t use system proxy: If FQDN use hosts file on devices (need root) If fixed IP use wifi gateway to redirect to fake server Or use Mallory Works as a gateway Pipes all traffic through the tool Able to analyse non-standard traffic Able to identify apps that send personal data

Attacking the Server In most cases this is: Standard HTML over HTTP XML/SOAP over HTTP Follow standard web application or web service attack methodology Sometimes proprietary Have not had to review one of these in mobile space Have to reverse protocol etc

Attacking the Client - iphone Whitebox approach: Load source into Xcode Can run in simulator for ease of testing Can review source directly Blackbox approach: Cannot load app into simulator Can get app from phone and reverse

iphone Simulator

Sharing iphone Simulator App Trick: You can share a iphone simulator app without having to share the source code: Run code in simulator on local machine Copy the following folder to other testers: Library/Application Support/iPhone Simulator/<version>/Applications/<unique id>

Reversing An iphone App Obtain app from phone or download From phone Use a tool called iphone Explorer Doesn t need to be jailbroken Get.app file.app is simply archive file so can view package contents Trick: iphone only checks signatures during install so you can modify files and reload them onto the phone. iphone applications can be reversed using otool provided with Xcode

Demo Modifying An iphone App

Attacking the Client - Android Whitebox approach: Load source into Eclipse Can run in emulator for ease of testing Can review source directly Blackbox approach: Can get.apk file from phone and reverse Can load.apk file directly into emulator

Android Emulator

Obtaining.APK Files TRICK: If you need to get an.apk file off an Android phone but don t want to root it: Get the AppSender app Use the app to get the full path to.apk file Use ADB to get file Adb pull /data/app/<.apk filename>

Installing.APK Files In Simulator List devices with ADB # adb devices Devices will be emulator or physical device Install.apk file into specific device # adb s <device serial> install <path_to_apk> ABD can also be used to run shell commends on the device # adb s <device serial> shell

Decompiling Android Apps.apk files are just.zips Pull out the.dex files Use baksmali to decompile to smali assembly

Decompiling Android Apps Use dex2jar to get Java classes Use Java decompiler such as JD to get Java source

Modifying And Recompiling Apps Android-APKtool can decompile and recompile.apk files Provides AndroidManifest.xml in readable format Can modify and rebuild the app Must manually sign app after rebuild

Demo Recompiling An Android App

What To Test For Number 1 rule: NEVER TRUST DATA FROM THE CLIENT!

OWASP Mobile Top Ten * 1. Insecure or unnecessary client-side data storage 2. Lack of data protection in transit 3. Personal data leakage 4. Failure to protect resources with strong authentication 5. Failure to implement least privilege authorization policy 6. Client-side injection 7. Client-side DOS 8. Malicious third-party code 9. Client-side buffer overflow 10. Failure to apply server-side controls * Still draft

Client-Side Storage iphone: Citi mobile app issue SQLite databases Snapshots Copy and Paste Keyboard cache Cached files Logs Android SQLite databases Logs

Demo iphone Storage

Application Permissions Android AndroidManifest.xml permissions SMS trojans in the wild Wallpaper apps File permissions Android Skype for Android vuln

Examples Of Issues Found Use of UUID for authentication Logging of sensitive information CSRF in mobile app Lots of issues with server trusting client Hardcoded credentials

Roundup What we talked about How to test What to test for What we didn t talk about Blackberries Platform security Mobile access to corporate data

Resources - Information OWASP Mobile Security Project https://www.owasp.org/index.php/owasp_mobile_securi ty_project Foundstone papers http://www.mcafee.com/us/resources/whitepapers/foundstone/wp-pen-testing-iphone-ipad-apps.pdf http://www.mcafee.com/us/resources/whitepapers/foundstone/wp-pen-testing-android-apps.pdf

Resources - Tools Mallory http://intrepidusgroup.com/insight/mallory/ Baksmali http://code.google.com/p/smali/ Android-apktool http://code.google.com/p/android-apktool/ iphone Explorer http://www.macroplant.com/iphoneexplorer/

Questions Anything else you want to know?

Contact Details Wellington 38-42 Waring Taylor Street Petherick Tower, level 7 PO Box 8093 The Terrace, Wellington 6143 Phone: +64 4 4999 756 Auckland 187 Queen Street Landmark House, level 8 PO Box 7706 Wellesley Street, Auckland Phone: +64 9 377 0700 Presenter Web nick@lateralsecurity.com www.lateralsecurity.com