Advanced ANDROID & ios Hands-on Exploitation



Similar documents
SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules

Mobile Application Security and Penetration Testing Syllabus

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH

Hacking Classes 75% 75% Hands-on Learning in Our Modern Hack Lab. Written by BlackHat Trainers: Available Globally

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

Pentesting Mobile Applications

Pentesting Android Apps. Sneha Rajguru

Mobile Application Security Testing ASSESSMENT & CODE REVIEW

Enterprise Application Security Workshop Series

Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications

CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001

Blackbox Android. Breaking Enterprise Class Applications and Secure Containers. Marc Blanchou Mathew Solnik 10/13/

The OWASP Foundation

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001

ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications

AppUse - Android Pentest Platform Unified

Pentesting iphone Applications. Satishb3

Application Security Testing

Tushar Dalvi Sr. Security Engineer at LinkedIn Penetration Tester. Responsible for securing a large suite mobile apps

Secure your ios applications and uncover hidden vulnerabilities by conducting penetration tests

Beginners Guide to Android Reverse Engineering

Hacking your Droid ADITYA GUPTA

Mobile Security Framework

Please Complete Speaker Feedback Surveys. SecurityTube.net

Mobile Applications: The True Potential Risks Where to look for information when performing a Pentest on a Mobile Application

Mobile Application Security: Who, How and Why

Android (in)security. Having fun with Android. Sarantis Makoudis

Security Testing Guidelines for mobile Apps

Defending Behind The Device Mobile Application Risks

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

ios Testing Tools David Lindner Director of Mobile and IoT Security

Adobe Systems Incorporated

Web application testing

Security Intelligence Services. Cybersecurity training.

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Practical Attacks against Mobile Device Management Solutions

Mobile Device Penetration Testing Framework and Platform for the Mobile Device Security Course

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

End User Devices Security Guidance: Apple OS X 10.10

2016 TÜBİTAK BİLGEM Cyber Security Institute

BlackBerry 10.3 Work and Personal Corporate

Android Packer. facing the challenges, building solutions. Rowland YU. Senior Threat Researcher Virus Bulletin 2014

Mobile security, forensics & malware analysis with Santoku Linux. * Copyright 2013 viaforensics, LLC. Proprietary Information.

Professional Penetration Testing Techniques and Vulnerability Assessment ...


Pentesting iphone & ipad Apps Hack In Paris 2011 June 17

OWASP Mobile Top Ten 2014 Meet the New Addition

Reversing Android Malware

Sandy. The Malicious Exploit Analysis. Static Analysis and Dynamic exploit analysis. Garage4Hackers

Designing and Coding Secure Systems

Reminders. Lab opens from today. Many students want to use the extra I/O pins on

Passing PCI Compliance How to Address the Application Security Mandates

Guidance End User Devices Security Guidance: Apple OS X 10.9

An approach to Web Application Penetration Testing. By: Whiskah

Pentesting ios Apps Runtime Analysis and Manipulation. Andreas Kurtz

Penetration Testing for iphone Applications Part 1

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

Securing your Mobile Applications. Karson Chan Security Consultant

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Addressing NIST and DOD Requirements for Mobile Device Management

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led

Newsletter - September T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Threat Model for Mobile Applications Security & Privacy

What is Web Security? Motivation

BYOD AND NEXT- GENERATION MOBILE SECURITY

Deep Dive: PenTesting the Android and iphone

Red Hat Linux Internals

"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION

WebView addjavascriptinterface Remote Code Execution 23/09/2013

AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

EC-Council Ethical Hacking and Countermeasures

Post Exploitation. n00bpentesting.com

Android Programming and Security

Information Security. Training

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

BYOD: End-to-End Security

Thick Client Application Security

Top 8 Steps for Effective Mobile Security

Legal notices. Legal notices. For legal notices, see

Enterprise Apps: Bypassing the Gatekeeper

Mobile First Government

Messing with the Android Runtime

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Transcription:

Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages (Java and C, and Python for scripting) will be an added advantage to grasp things quickly. Hardware Requirements Minimum 2GB RAM and 20 GB free Hard Disk space Android (optional, preferably Rooted) >= 2.3 iphone/ipad/ipod (compulsory, jailbroken and should be 6.1.x-7.x) Software Requirements Windows XP SP2/3, Windows 7/8 or *Nix Mac OSX 10.5+ (compulsory for ios Exploitation or a OSX VM) Administrative privileges on your laptop Virtualization Software Custom VM labs will be provided for exploitation SSH Client

COURSE STRUCTURE Day I (Android and ARM Exploitation): Module 1: Android Basics Introduction to Android Android Architecture Digging into Android kernel Android Security Model Android Security Architecture Android Permission model Application Sandboxing Bypassing Android Permissions Module 2: HelloWorld : Android Android Application Components Android Debug Bridge Creating a Simple Android Application Setting up the Environment Setting up Android Emulator Setting up a Mobile Pentest Environment App Kung-fu Application Analysis Reverse Engineering Traffic Interception (Active and Passive) of Android Applications OWASP Top 10 for Android Sniffing Application and phone's network data Unsecure file storage Having fun with databases

Exploiting Logic and Code flaws in applications Exploiting Content Providers SQL Injection in Android Application Local File Inclusion/Directory Traversal Automating Application Auditing (Static and Dynamic) Source Code Review of Android Applications Module 3: Exploitation with Drozer Introduction to Drozer Using Drozer to find and exploit vulnerabilities Writing custom drozer modules Vulnerabilities in Application Licenses Creating and Exploiting custom ROMs Exploiting USB connections with Android Dex Labs Introduction to Dalvik File Format In-depth to Smali Manipulating smali files and cracking Applications Cracking Application Licenses Dex file manipulation Obfuscating applications with dex obfuscator Module 4: Android Forensics & Malware Analysis Extracting text messages, voice mails, call logs, contacts and messages Recovering information stored in SD Card Reversing and Analyzing Android malwares using Apktool, dex2jar and JD-GUI Introduction to IDA Pro Analyzing malwares and exploits using IDA

Further Exploitation: Creating custom Bootloaders Android Root Exploits Recreating the exploit Fuzzing Android components Webkit Exploitation Use After Free vulnerability and exploitation Side Channel Data Leaks in Android Being secure Android in the Enterprise MDM and BYOD Solutions for Enterprises Security Issues in MDM/BYOD Products Application Whitelisting/Blacklisting Secure Coding for Android Day 2 (ios Exploitation) Module 5: ios Background Understanding ios Architecture ios Security Features ios Application Overview ios Security Model Code Signing Sandboxing Exploit Mitigation Encryption Setting up the Environment Setting up XCode Setting up iphone/simulator

Module 6: ios Hello-World ios Application components Introduction to Objective C Writing a simple Hello World application in your own idevice/simulator ios App Analysis Reverse Engineering ios Apps Decrypting Appstore Binaries Locating PIE (Position Independent Executable) Inspecting Binary Vulnerabilities in local storages Manipulating Runtime Tools : inalyzer, IDB, Scoop-it Module 7: Auditing Insecure API Evaluating the Transport Security Abusing Protocol Handlers Insecure Data Storage Attacking ios keychain App Assessments Setting up pentesting environment for assessment Passive app assessment Active app assessment Application analysis

App Kungfu Exploiting XSS in Apps (UIWebViews) Attacking XML processor SQL Injection NSUserDefaults Filesystem Interaction Geolocation Logging Background-ing Source Code Auditing Memory Corruption Issues: Format strings Object use-after free ROP for ios Exploit Mitigations in ios Module 8: ios Forensics Analysis of Backed up data in itunes Extracting SMS, Call Logs, etc., from an ios backup Imaging the device and extracting data Being Secure ios App compliance checklist Writing Secure Codes Pentest your App before you publish In case of any queries/customized version of the course, you could mail us at secure@attify.com.