SlideShare ist ein Scribd-Unternehmen logo
1 von 35
© 2014 IBM Corporation
IBM Security Systems
1
© 2014 IBM Corporation
Pinpointing Vulnerabilities in Android
Applications: Like Finding a Needle
in a Haystack
Roee Hay, roeeh@il.ibm.com
IBM Application Security Research
Group Lead
© 2014 IBM Corporation
IBM Security Systems
2
Please note
IBM’s statements regarding its plans, directions, and intent are subject to change
or withdrawal without notice at IBM’s sole discretion.
Information regarding potential future products is intended to outline our general
product direction and it should not be relied on in making a purchasing decision.
The information mentioned regarding potential future products is not a
commitment, promise, or legal obligation to deliver any material, code or
functionality. Information about potential future products may not be incorporated
into any contract. The development, release, and timing of any future features or
functionality described for our products remains at our sole discretion.
Performance is based on measurements and projections using standard IBM
benchmarks in a controlled environment. The actual throughput or performance
that any user will experience will vary depending upon many factors, including
considerations such as the amount of multiprogramming in the user’s job stream,
the I/O configuration, the storage configuration, and the workload processed.
Therefore, no assurance can be given that an individual user will achieve results
similar to those stated here.
© 2014 IBM Corporation
IBM Security Systems
3
Agenda
 Mobile Vulnerabilities Primer
 Malicious Apps and the Android Security Model
 Mobile DAST Research Project: The Mobile Analyzer
 Case Study. The NY Times Cross-Application Scripting (XAS)
© 2014 IBM Corporation
IBM Security Systems
4
© 2014 IBM Corporation
Mobile Vulnerabilities Primer
© 2014 IBM Corporation
IBM Security Systems
5
A Typical Mobile App
Client Back-end
App
© 2014 IBM Corporation
IBM Security Systems
6
The Mobile Vulnerabilities Space
New
Client-side
vulnerabilities:
?
Classic
Back-end
vulnerabilities:
SQL Injection
Code Execution
etc
© 2014 IBM Corporation
IBM Security Systems
7
Attack Vectors for Client-Side Vulnerabilities
Client Back-end
App
© 2014 IBM Corporation
IBM Security Systems
8
(1) Taking Over the Backend
Client Back-end
App
Attacker
© 2014 IBM Corporation
IBM Security Systems
9
(2) Man-in-the Middle (MiTM)
Client Back-end
App Attacker
© 2014 IBM Corporation
IBM Security Systems
10
(3) Malicious Apps
Client Back-end
Attacker
App
© 2014 IBM Corporation
IBM Security Systems
11
© 2014 IBM Corporation
Malicious Apps
© 2014 IBM Corporation
IBM Security Systems
12
The Android Threat Model
 Apps in Android are sandboxed from each other:
 Each app package runs with a different Linux user-id so
by default resources created by one app cannot be
accessed by another app
 Apps are constrained:
 A-Very-Cool-Game cannot just send SMSs.
 Some constraints can be relaxed at deployment time by
using permissions.
 These features protect the integrity and confidentiality of:
 The Installed Apps.
 The Android system.
Browser Mail
SMSPhone
Contacts Search
© 2014 IBM Corporation
IBM Security Systems
13
Two Types of Malicious Apps
 (1) Attack the System
 Abuse system services for its own profit e.g.
 Premium SMSs and MMS
 GPS access
 System log access
 No vulnerability is required.
 Suspicious use of permissions!
Source: http://www.threattracksecurity.com/it-
blog/russian-language-facebook-android-app-
premium-sms-is-out-daily-service-fees-are-in/
© 2014 IBM Corporation
IBM Security Systems
14
Two Types of Malicious Apps
 (2) Attack other Apps
 Try to subvert the integrity and/or confidentiality of other applications
 Target applications must be vulnerable.
 No suspicious use of permissions!
© 2014 IBM Corporation
IBM Security Systems
15
Inter-Process-Communication in Android
 Apps want to be able to talk to each other:
 For feature reuse.
 This is achieved by Inter-Process Mechanisms, controlled
by special objects called Intents.
 Intents carry both the destination information and the
payload data.
 When an application component is willing to receive Intents
from external apps, it becomes exported and opens a hole
in the Android Sandbox!
Browser
Google
Play
Store
Phone
© 2014 IBM Corporation
IBM Security Systems
16
A Typical Attack by a Malicious App
 For a vulnerable app to be exploited, it must accept
external Intents, i.e. open the IPC channel in its manifest
file.
 The Malicious App initiates a malicious intent targeting the
vulnerable app.
 The Intent’s payload is specific to the vulnerability found in
the App
 e.g. an SQL Injection payload.
Vulnerable
App
Malicious
App
Malicious
Intent
© 2014 IBM Corporation
IBM Security Systems
17
© 2014 IBM Corporation
The Mobile Analyzer
© 2014 IBM Corporation
IBM Security Systems
18
The Mobile Analyzer: Modus Operandi
 (1) Explore. Discover of the elements of the application that should be tested
 In Classic Web: This is done by crawling.
 Mobile Analyzer: We analyze the Android manifest file and dynamically learn of Intent
parameters.
 (2) Attack. Trigger the vulnerabilities
 In Classic Web : Done by sending HTTP requests with malicious data.
 Mobile Analyzer : We send Intents with malicious payloads using our security
knowledge.
 (3) Validate.
 In Classic Web: Done by looking at the HTTP responses (Black-box / DAST) or by
placing hooks on the target app (Glass-box / IAST).
 Mobile Analyzer: We mainly do it by placing hooks on the target mobile app (IAST).
© 2014 IBM Corporation
IBM Security Systems
19
The Mobile Analyzer: In Front of the Scenes
Uploads an APK
Our
Client
© 2014 IBM Corporation
IBM Security Systems
20
The Mobile Analyzer: In Front of the Scenes
Receives a Security Report
Our
Client
© 2014 IBM Corporation
IBM Security Systems
21
Debug Flag
enablement
Insecure
Pending
Intent
Memory
Corruptions
Client-side
SQL
Injection
UI Spoofing
Client-side
Denial-of-
Service
It Detects Many Issue Types!
Cross-
Application
Scripting
(XAS)
Android
Fragment
Injection
Insecure
File
Rights
Insecure
Class
Loading
Activity &
Service
Hijacking
Cross-Site
Scripting
via
Man-in-the-
Middle
Weak
Random
Number
Generators
© 2014 IBM Corporation
IBM Security Systems
22
© 2014 IBM Corporation
Demo
© 2014 IBM Corporation
IBM Security Systems
23
Structure of the DoNothing App
Intent(data)
Log
(Native
code)
SQLite
DB
data
data
Exported activity Exported activity
© 2014 IBM Corporation
IBM Security Systems
24
The Developer’s Mistake
Intent(data)
data
data
Exported activity Exported activity
Log
(Native
code)
SQLite
DB
© 2014 IBM Corporation
IBM Security Systems
25
© 2014 IBM Corporation
Case Study:
NYTimes
Cross-Application Scripting
© 2014 IBM Corporation
IBM Security Systems
26
Cross-Application Scripting (XAS)
 The Vulnerable app contains an embedded browser
(WebView)
 Due to bad input validation, The URL of the embedded
browser can be controlled by a malicious app with
problematic URI schemes, such as ‘javascript://’ or ‘file://’:
 WebView.loadURL(url)
 Injecting these schemes enables the attacker to execute JS
code in the context of the vulnerable app
 Subverts the Android’s sandboxing as it allows the attacker
to steal information pertaining to the vulnerable app
Vulnerable App
Malicious
App
Intent:
javascript://…
© 2014 IBM Corporation
IBM Security Systems
27
The NYTimes Vulnerability
protected void onCreate(Bundle bundle)
{
…
g.getSettings().setJavaScriptEnabled(true);
g.getSettings().setCacheMode(2);
g.getSettings().setSavePassword(false);
…
cookiemanager.removeAllCookie();
…
s = getIntent().getStringExtra("url");
if(TextUtils.isEmpty(s))
s = h.l().f();
if(getIntent().getBooleanExtra("hideTitle", false))
setTitle("");
g.loadUrl(s);
}
* Issue was fixed in August 2013 as per our responsible disclosure
© 2014 IBM Corporation
IBM Security Systems
28
Stealing the Session-ID
Client Back-end
NYT
NYTimes Session-ID
© 2014 IBM Corporation
IBM Security Systems
29
Stealing the Session-ID
Client Back-end
NYT
NYTimes Session-ID
Attacker
Steals
Client
Session-ID
© 2014 IBM Corporation
IBM Security Systems
30
Stealing the Session-ID
Client Back-end
NYT
Attacker
NYTimes Session-ID
Stolen
Client Session-ID
© 2014 IBM Corporation
IBM Security Systems
31
Goal & Impact
 The Attacker would like to leak some sensitive NYTimes files:
 The session identifier is found under NYTIMES_PREFS.xml.
 Impact: User impersonation.
root@android:/data/data/com.nytimes.android/shared_prefs # ls
NYTIMES_BLOGCATS.xml
NYTIMES_ENT.xml
NYTIMES_PREFS.xml
cSPrefs.xml
com.nytimes.android_preferences.xml
ny_times_widget.xml
uptAdsQueue.xml
uptEventsQueue.xml
root@android:/data/data/com.nytimes.android/shared_prefs # cat NYTIMES_PREFS.xml
...
<string name="NYT-S">
18CBbkG2ru6usGm4bmrmZvSlDZeHDEfrlQxsnMdUmY896gFXg1szP13uvJJp.6isWKzDs7ugEhp41N4bsEDh836YV.Ynx4rkFI
</string>
...
© 2014 IBM Corporation
IBM Security Systems
32
Exploitation: Abusing file:// URI schemes
 The javascript:// URI scheme cannot access files.
 We cause the embedded browser of NYTimes to load a globally readable file via the
file:// URI scheme.
 This file contains JS code that leaks NYTIMES_PREFS.xml
NYTimesMalicious app
AJAX
file://data/…/nyt/
NYTIMES_PREFS.xml
Malicious.html
<string name="NYT-S">
18CBbkG2ru6usGm4bmrmZvSlD
ZeHDEfrlQxsnMdUmY896gFXg1
szP13uvJJp.6isWKzDs7ugEhp
41N4bsEDh836YV.Ynx4rkFI
</string>
NYTIMES_PREFS.xml
Intent:
file://data/malicious/Malicious.html
© 2014 IBM Corporation
IBM Security Systems
33
© 2014 IBM Corporation
Demo
© 2014 IBM Corporation
IBM Security Systems
34
© 2014 IBM Corporation
Questions
© 2014 IBM Corporation
IBM Security Systems
35 © 2014 IBM Corporation
IBM Security Systems
35
www.ibm.com/security
© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

Weitere ähnliche Inhalte

Was ist angesagt?

Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 
Risk oriented testing of web-based applications
Risk oriented testing of web-based applicationsRisk oriented testing of web-based applications
Risk oriented testing of web-based applications
sarikagrov
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
GTestClub
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
AP DealFlow
 
Routine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence FlawsRoutine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence Flaws
IJTET Journal
 
Unisys_AppDefender_Symantec_CFD_0_1_final
Unisys_AppDefender_Symantec_CFD_0_1_finalUnisys_AppDefender_Symantec_CFD_0_1_final
Unisys_AppDefender_Symantec_CFD_0_1_final
Koko Fontana
 

Was ist angesagt? (20)

Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Risk oriented testing of web-based applications
Risk oriented testing of web-based applicationsRisk oriented testing of web-based applications
Risk oriented testing of web-based applications
 
Op2423922398
Op2423922398Op2423922398
Op2423922398
 
IBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solutionIBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solution
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Mobile Apps Security Testing -3
Mobile Apps Security Testing -3Mobile Apps Security Testing -3
Mobile Apps Security Testing -3
 
IBM AppScan Standard - The Web Application Security Solution
IBM AppScan Standard - The Web Application Security SolutionIBM AppScan Standard - The Web Application Security Solution
IBM AppScan Standard - The Web Application Security Solution
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
 
Security testing in mobile applications
Security testing in mobile applicationsSecurity testing in mobile applications
Security testing in mobile applications
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
 
Android open-source operating System for mobile devices
Android open-source operating System for mobile devicesAndroid open-source operating System for mobile devices
Android open-source operating System for mobile devices
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
Web Application Security Guide by Qualys 2011
Web Application Security Guide by Qualys 2011 Web Application Security Guide by Qualys 2011
Web Application Security Guide by Qualys 2011
 
Mobile Threats and Trends Changing Mobile App Security
Mobile Threats and Trends Changing Mobile App SecurityMobile Threats and Trends Changing Mobile App Security
Mobile Threats and Trends Changing Mobile App Security
 
A26001006
A26001006A26001006
A26001006
 
Routine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence FlawsRoutine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence Flaws
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phones
 
Unisys_AppDefender_Symantec_CFD_0_1_final
Unisys_AppDefender_Symantec_CFD_0_1_finalUnisys_AppDefender_Symantec_CFD_0_1_final
Unisys_AppDefender_Symantec_CFD_0_1_final
 

Ähnlich wie Pinpointing Vulnerabilities in Android Applications like Finding a Needle in a Haystack

Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013
Stephan Chenette
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
UISGCON
 

Ähnlich wie Pinpointing Vulnerabilities in Android Applications like Finding a Needle in a Haystack (20)

5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android App
 
Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
ToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android InfectionsToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android Infections
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium Security
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection Methods
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
Enterprise Mobile Security and OWASP Compliance
Enterprise Mobile Security and OWASP ComplianceEnterprise Mobile Security and OWASP Compliance
Enterprise Mobile Security and OWASP Compliance
 
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaJavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for Java
 

Mehr von IBM Security

Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 

Mehr von IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Pinpointing Vulnerabilities in Android Applications like Finding a Needle in a Haystack

  • 1. © 2014 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation Pinpointing Vulnerabilities in Android Applications: Like Finding a Needle in a Haystack Roee Hay, roeeh@il.ibm.com IBM Application Security Research Group Lead
  • 2. © 2014 IBM Corporation IBM Security Systems 2 Please note IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
  • 3. © 2014 IBM Corporation IBM Security Systems 3 Agenda  Mobile Vulnerabilities Primer  Malicious Apps and the Android Security Model  Mobile DAST Research Project: The Mobile Analyzer  Case Study. The NY Times Cross-Application Scripting (XAS)
  • 4. © 2014 IBM Corporation IBM Security Systems 4 © 2014 IBM Corporation Mobile Vulnerabilities Primer
  • 5. © 2014 IBM Corporation IBM Security Systems 5 A Typical Mobile App Client Back-end App
  • 6. © 2014 IBM Corporation IBM Security Systems 6 The Mobile Vulnerabilities Space New Client-side vulnerabilities: ? Classic Back-end vulnerabilities: SQL Injection Code Execution etc
  • 7. © 2014 IBM Corporation IBM Security Systems 7 Attack Vectors for Client-Side Vulnerabilities Client Back-end App
  • 8. © 2014 IBM Corporation IBM Security Systems 8 (1) Taking Over the Backend Client Back-end App Attacker
  • 9. © 2014 IBM Corporation IBM Security Systems 9 (2) Man-in-the Middle (MiTM) Client Back-end App Attacker
  • 10. © 2014 IBM Corporation IBM Security Systems 10 (3) Malicious Apps Client Back-end Attacker App
  • 11. © 2014 IBM Corporation IBM Security Systems 11 © 2014 IBM Corporation Malicious Apps
  • 12. © 2014 IBM Corporation IBM Security Systems 12 The Android Threat Model  Apps in Android are sandboxed from each other:  Each app package runs with a different Linux user-id so by default resources created by one app cannot be accessed by another app  Apps are constrained:  A-Very-Cool-Game cannot just send SMSs.  Some constraints can be relaxed at deployment time by using permissions.  These features protect the integrity and confidentiality of:  The Installed Apps.  The Android system. Browser Mail SMSPhone Contacts Search
  • 13. © 2014 IBM Corporation IBM Security Systems 13 Two Types of Malicious Apps  (1) Attack the System  Abuse system services for its own profit e.g.  Premium SMSs and MMS  GPS access  System log access  No vulnerability is required.  Suspicious use of permissions! Source: http://www.threattracksecurity.com/it- blog/russian-language-facebook-android-app- premium-sms-is-out-daily-service-fees-are-in/
  • 14. © 2014 IBM Corporation IBM Security Systems 14 Two Types of Malicious Apps  (2) Attack other Apps  Try to subvert the integrity and/or confidentiality of other applications  Target applications must be vulnerable.  No suspicious use of permissions!
  • 15. © 2014 IBM Corporation IBM Security Systems 15 Inter-Process-Communication in Android  Apps want to be able to talk to each other:  For feature reuse.  This is achieved by Inter-Process Mechanisms, controlled by special objects called Intents.  Intents carry both the destination information and the payload data.  When an application component is willing to receive Intents from external apps, it becomes exported and opens a hole in the Android Sandbox! Browser Google Play Store Phone
  • 16. © 2014 IBM Corporation IBM Security Systems 16 A Typical Attack by a Malicious App  For a vulnerable app to be exploited, it must accept external Intents, i.e. open the IPC channel in its manifest file.  The Malicious App initiates a malicious intent targeting the vulnerable app.  The Intent’s payload is specific to the vulnerability found in the App  e.g. an SQL Injection payload. Vulnerable App Malicious App Malicious Intent
  • 17. © 2014 IBM Corporation IBM Security Systems 17 © 2014 IBM Corporation The Mobile Analyzer
  • 18. © 2014 IBM Corporation IBM Security Systems 18 The Mobile Analyzer: Modus Operandi  (1) Explore. Discover of the elements of the application that should be tested  In Classic Web: This is done by crawling.  Mobile Analyzer: We analyze the Android manifest file and dynamically learn of Intent parameters.  (2) Attack. Trigger the vulnerabilities  In Classic Web : Done by sending HTTP requests with malicious data.  Mobile Analyzer : We send Intents with malicious payloads using our security knowledge.  (3) Validate.  In Classic Web: Done by looking at the HTTP responses (Black-box / DAST) or by placing hooks on the target app (Glass-box / IAST).  Mobile Analyzer: We mainly do it by placing hooks on the target mobile app (IAST).
  • 19. © 2014 IBM Corporation IBM Security Systems 19 The Mobile Analyzer: In Front of the Scenes Uploads an APK Our Client
  • 20. © 2014 IBM Corporation IBM Security Systems 20 The Mobile Analyzer: In Front of the Scenes Receives a Security Report Our Client
  • 21. © 2014 IBM Corporation IBM Security Systems 21 Debug Flag enablement Insecure Pending Intent Memory Corruptions Client-side SQL Injection UI Spoofing Client-side Denial-of- Service It Detects Many Issue Types! Cross- Application Scripting (XAS) Android Fragment Injection Insecure File Rights Insecure Class Loading Activity & Service Hijacking Cross-Site Scripting via Man-in-the- Middle Weak Random Number Generators
  • 22. © 2014 IBM Corporation IBM Security Systems 22 © 2014 IBM Corporation Demo
  • 23. © 2014 IBM Corporation IBM Security Systems 23 Structure of the DoNothing App Intent(data) Log (Native code) SQLite DB data data Exported activity Exported activity
  • 24. © 2014 IBM Corporation IBM Security Systems 24 The Developer’s Mistake Intent(data) data data Exported activity Exported activity Log (Native code) SQLite DB
  • 25. © 2014 IBM Corporation IBM Security Systems 25 © 2014 IBM Corporation Case Study: NYTimes Cross-Application Scripting
  • 26. © 2014 IBM Corporation IBM Security Systems 26 Cross-Application Scripting (XAS)  The Vulnerable app contains an embedded browser (WebView)  Due to bad input validation, The URL of the embedded browser can be controlled by a malicious app with problematic URI schemes, such as ‘javascript://’ or ‘file://’:  WebView.loadURL(url)  Injecting these schemes enables the attacker to execute JS code in the context of the vulnerable app  Subverts the Android’s sandboxing as it allows the attacker to steal information pertaining to the vulnerable app Vulnerable App Malicious App Intent: javascript://…
  • 27. © 2014 IBM Corporation IBM Security Systems 27 The NYTimes Vulnerability protected void onCreate(Bundle bundle) { … g.getSettings().setJavaScriptEnabled(true); g.getSettings().setCacheMode(2); g.getSettings().setSavePassword(false); … cookiemanager.removeAllCookie(); … s = getIntent().getStringExtra("url"); if(TextUtils.isEmpty(s)) s = h.l().f(); if(getIntent().getBooleanExtra("hideTitle", false)) setTitle(""); g.loadUrl(s); } * Issue was fixed in August 2013 as per our responsible disclosure
  • 28. © 2014 IBM Corporation IBM Security Systems 28 Stealing the Session-ID Client Back-end NYT NYTimes Session-ID
  • 29. © 2014 IBM Corporation IBM Security Systems 29 Stealing the Session-ID Client Back-end NYT NYTimes Session-ID Attacker Steals Client Session-ID
  • 30. © 2014 IBM Corporation IBM Security Systems 30 Stealing the Session-ID Client Back-end NYT Attacker NYTimes Session-ID Stolen Client Session-ID
  • 31. © 2014 IBM Corporation IBM Security Systems 31 Goal & Impact  The Attacker would like to leak some sensitive NYTimes files:  The session identifier is found under NYTIMES_PREFS.xml.  Impact: User impersonation. root@android:/data/data/com.nytimes.android/shared_prefs # ls NYTIMES_BLOGCATS.xml NYTIMES_ENT.xml NYTIMES_PREFS.xml cSPrefs.xml com.nytimes.android_preferences.xml ny_times_widget.xml uptAdsQueue.xml uptEventsQueue.xml root@android:/data/data/com.nytimes.android/shared_prefs # cat NYTIMES_PREFS.xml ... <string name="NYT-S"> 18CBbkG2ru6usGm4bmrmZvSlDZeHDEfrlQxsnMdUmY896gFXg1szP13uvJJp.6isWKzDs7ugEhp41N4bsEDh836YV.Ynx4rkFI </string> ...
  • 32. © 2014 IBM Corporation IBM Security Systems 32 Exploitation: Abusing file:// URI schemes  The javascript:// URI scheme cannot access files.  We cause the embedded browser of NYTimes to load a globally readable file via the file:// URI scheme.  This file contains JS code that leaks NYTIMES_PREFS.xml NYTimesMalicious app AJAX file://data/…/nyt/ NYTIMES_PREFS.xml Malicious.html <string name="NYT-S"> 18CBbkG2ru6usGm4bmrmZvSlD ZeHDEfrlQxsnMdUmY896gFXg1 szP13uvJJp.6isWKzDs7ugEhp 41N4bsEDh836YV.Ynx4rkFI </string> NYTIMES_PREFS.xml Intent: file://data/malicious/Malicious.html
  • 33. © 2014 IBM Corporation IBM Security Systems 33 © 2014 IBM Corporation Demo
  • 34. © 2014 IBM Corporation IBM Security Systems 34 © 2014 IBM Corporation Questions
  • 35. © 2014 IBM Corporation IBM Security Systems 35 © 2014 IBM Corporation IBM Security Systems 35 www.ibm.com/security © Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

Hinweis der Redaktion

  1. 6/11/2014
  2. Add the latests issue types here