3. Agenda…
Android Basics
Android Security Model
Hello World in Android
Reverse Engineering
Setting up Burp Proxy
Traffic Analysis with tcpdump & Wireshark
Insecure Data Storage
Attacking Authentication
Exploiting Application Components
Side Channel Data Leakage
Client Side Injection
Directory Traversal Attacks
Infecting Legitimate Apps
Securing Android Apps
4. Disclaimer!
> This doesn’t show any automated tools to find and exploit vulnerabilities in Android
Applications.
Example: Appscan for web apps
> But we take help from some semi automated tools.
Example: Burp suite for web apps.
> We can have another Humla with automated tools.
7. Android is an operating system based on the Linux kernel, and
designed primarily for touch screen mobile devices such as
smart phones and tablet computers.
11. Android Security Model
> Security at the OS level through the Linux kernel
> Application sand boxing.
> Secure inter-process communication.
> Application signing.
> Application-defined and user-granted permissions
> Google Bouncer
19. Pentesting Android Apps
Profiling Your Application
Finding out a vulnerability
Exploiting
Securing
Methodology
We Follow
it in this
workshop
20. MITM Using Burp suite
1. Run Burp Suite on the machine
2. Set the system’s IP in your device as proxy
3. Start tampering the requests
Mobile based Web Apps
21. MITM Using Burp suite
Almost similar to regular web application pentesting.
So lets get into native applications.
22. Native Application Traffic Analysis
1. Get Cross Compiled tcpdump dump binary for your Android Device
2. Push it on to the device
3. Change it’s permissions to 777
4. Start tcpdump and save the packets in a .pcap file
5. Analyze the packets using Wireshark
32. Unintended Data Leakage
> Formerly known as Side Channel Data Leakage
> Occurs when Information processed by the code places
sensitive information some where on the device which can
be accessible to other apps.
33. Unintended Data Leakage
Leaking Content Providers
Copy/Paste Buffer
Information Disclosure in Logs
URL Caching
and many more….