SlideShare a Scribd company logo
1 of 19
Download to read offline
Android "Fight Club"
In pursuit of “Appiness”
“The things you own end up owning you.”
Ice breaking session
● Your Name
● Experience with android | android hacking
● Something cool about yourself.
● Have you seen “Fight Club (1999)” ?
● C:Usersabhinav>whoami
○ Abhinav Mishra | 0ctac0der | Freelancer | Bug Hunter | Penetration Tester
● Why is the session named “Fight Club”?
● What are you expecting & what I am going to tell here…..
Disclaimer: Some images and quotes have been used which are movie material taken from google.
Rules of the fight club
1. You do talk about the “Fight Club”
2. If it’s your first day @fightclub, you have to ask questions…. A lot of questions
3. If someone asks something, you either listen to the answer or answer it
4. Only one question at a time
5. The discussion will go on as long as needed
6. You can ask a question at any time
7. No iOS, no apple
8. If you haven’t seen fight club, you will watch it today
Where should we start?
● Let’s talk a bit about android
○ Architecture: Who remembers what ?
○ Privilege and permissions
○ Applications and issues you know about
● Whats tools to use?
○ ADB & SDK
○ Dex2jar
○ JDGUI
○ AVD
○ Drozer
○ QARK
○ Any more ????
Building a “coliseum”
What we need?
1. Android studio with updated SDK and AVD
2. Dex2Jar, Java decompiler, apktool, burp suite, java debugger
3. Drozer
4. Automated analyzers
5. QARK , Run time analyzer
6. May be a lot more…..
So, I decided to help you all. This is what I did:
Ubuntu → install apps → update sdk → create AVD → setup everything → Droider
What are we going to do next
● Create your lab:
○ Minimum: Android SDK, emulator, ADB, drozer, dex2jar, jdgui, apktool | Or AppUse
● Choose your target app
○ Suggestions: Herd Financials or Four goats. Link
○ Need more adventure? Choose bug bounty apps: Coinbase, Ola Cabs, Dropbox, LastPass
● Let’s hack it
○ Static analysis
○ Dynamic analysis
○ Looking for some common vulnerabilities
● Earning money the Gangsta style
Take your time and collect your breath (Break Time)
If you are failing, remember:
Are you ready? “It's only after we've lost everything that we're free to do anything.”
Need help?
Ask your Self
If the problem got solved
Problem persists
Ask the guy next to you (and if its a girl. Your life rocks dude)
Still Stuck?
Because “Why” is also more important than “How”
● Android holds the biggest market share in mobile operating system.
● Google play has more than 48 billion app installs.
● Your android device has:
○ Personal Info, Credit card details, all social accounts, chats, financial details, PIN, OTP …
● One malicious application in your phone … and you are gone.
● A android application vulnerability may leak critical information
● Security of android app is vital for the business
● Android apps are less secure than web, hence apps are the prime target
● Free apps can lead to huge monetary loss.
● Bug Bounty earnings, secure app development
Now we will talk about “How”
● Static analysis of android application
○ Looking into the apk file for info leakage, hidden accounts, confidential data
○ Local storage of user/application data
○ Reverse engineering the application
○ Binary Protections, backup info leakage, application signature, crypto issues, data leakage
● Dynamic analysis of the android application
○ Run time analysis
○ Application components: Activities, Broadcast receivers, services, content providers
○ Application data capture and analysis
○ Web based vulnerabilities
Static Analysis - Part 1
● APK → apktool → read AndroidManifest.xml → permissions, components
○ Command used: $apktool d application_file_name
● APK → Un-archive → classes.dex to classes.dex.jar → read java code
○ Command used: $dex2jar classes.dex
● SMALI files → read the code for confidential data
● Tool? Mobilizer.py
● Application signatures and decompilation
● Binary protection
● Debuggable and Backup enabled applications
Static Analysis - Part 2
● Installing app in the emulator
○ $adb install apk_full_name
● Inspecting the application local storage.
○ $adb shell
○ $ ls -la
○ $ cd data/data/package_name/
● Insecure storage of confidential data
● Logcat and android monitor
● Memory dumps
● Unintended Data leakage
● Crypto issues
Tea Break Time
In the meantime,
for iOS lovers
Dynamic Analysis - Part 1
Drozer Analysis:
● Drozer console connect: $drozer console connect
● Drozer attack surface: $run app.package.attacksurface
● Exploiting application components
○ Exported activities
○ Exported Broadcast receivers
○ Exported services
○ Exported content providers
Dynamic Analysis - Part 2
● SSL pinning in applications and bypass
● Setting up proxy on an emulator/device
● Capturing the application traffic
● Web related attacks and testing
○ Authorization and authentication
○ Improper session management
○ Client side injection
Dynamic Analysis - Part 3
● Fuzzing android applications
● Run time code executions
● Insufficient Transport layer protection
● Logical vulnerabilities
● Insufficient server side controls
Common vulnerabilities and finding them
● Insecure storage
○ Who will answer this?
● Insufficient transport layer protection
○ How to find this in any applications. Coolest answer will get a prize.
● Insecure application components
○ Give me three examples.
● Binary protection
○ Anyone got this? What did you do?
Some common solutions
● Installing Google play on emulator: Link
● Setting up burp proxy on emulator/device: Link
● Installing Burp certificate on android device: Link
● Bypassing SSL pinning on android: Link
Scanner and tool tutorials to watch
● QARK: Android App Exploit and SCA Tool - AppSecUSA 2015 : Link
● MobSF: Security Framework for Mobile Application Testing: Link
● Androbugs : An Android Application Security Vulnerability Scanner: Link
Questions | Grudges | Suggestions | Compliments
Thanks Guys.

More Related Content

What's hot (6)

Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
 
Mc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handoutsMc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handouts
 
Wordpress Plugins Scanner
Wordpress Plugins ScannerWordpress Plugins Scanner
Wordpress Plugins Scanner
 
Owasp for testing_mobile_apps_opd
Owasp for testing_mobile_apps_opdOwasp for testing_mobile_apps_opd
Owasp for testing_mobile_apps_opd
 
[OWASP Poland Day] Application security - daily questions & answers
[OWASP Poland Day] Application security - daily questions & answers[OWASP Poland Day] Application security - daily questions & answers
[OWASP Poland Day] Application security - daily questions & answers
 

Similar to Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter

Create Your First "Native" Mobile App with JavaScript + PhoneGap
Create Your First "Native" Mobile App with JavaScript + PhoneGapCreate Your First "Native" Mobile App with JavaScript + PhoneGap
Create Your First "Native" Mobile App with JavaScript + PhoneGap
Steve Phillips
 
Embedded Android Workshop at AnDevCon VI
Embedded Android Workshop at AnDevCon VIEmbedded Android Workshop at AnDevCon VI
Embedded Android Workshop at AnDevCon VI
Opersys inc.
 

Similar to Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter (20)

The art of android hacking by Abhinav Mishra (0ctac0der)
The art of  android hacking by Abhinav Mishra (0ctac0der)The art of  android hacking by Abhinav Mishra (0ctac0der)
The art of android hacking by Abhinav Mishra (0ctac0der)
 
Xamarin.android memory management gotchas
Xamarin.android memory management gotchasXamarin.android memory management gotchas
Xamarin.android memory management gotchas
 
Android Tamer (Anant Shrivastava)
Android Tamer (Anant Shrivastava)Android Tamer (Anant Shrivastava)
Android Tamer (Anant Shrivastava)
 
MobSecCon 2015 - Burning Marshmallows
MobSecCon 2015 - Burning Marshmallows MobSecCon 2015 - Burning Marshmallows
MobSecCon 2015 - Burning Marshmallows
 
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
 
Getting started with hacking android & i os apps tools, techniques and re...
Getting started with hacking android & i os apps tools, techniques and re...Getting started with hacking android & i os apps tools, techniques and re...
Getting started with hacking android & i os apps tools, techniques and re...
 
Guard your Android
Guard your AndroidGuard your Android
Guard your Android
 
Embedded Android Workshop with Nougat
Embedded Android Workshop with NougatEmbedded Android Workshop with Nougat
Embedded Android Workshop with Nougat
 
Embedded Android Workshop with Marshmallow
Embedded Android Workshop with MarshmallowEmbedded Android Workshop with Marshmallow
Embedded Android Workshop with Marshmallow
 
Create Your First "Native" Mobile App with JavaScript + PhoneGap
Create Your First "Native" Mobile App with JavaScript + PhoneGapCreate Your First "Native" Mobile App with JavaScript + PhoneGap
Create Your First "Native" Mobile App with JavaScript + PhoneGap
 
CodeMotion tel aviv 2015 - burning marshmallows
CodeMotion tel aviv 2015 - burning marshmallowsCodeMotion tel aviv 2015 - burning marshmallows
CodeMotion tel aviv 2015 - burning marshmallows
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop
 
10 ways to improve your Android app performance
10 ways to improve your Android app performance10 ways to improve your Android app performance
10 ways to improve your Android app performance
 
Pwning mobile apps without root or jailbreak
Pwning mobile apps without root or jailbreakPwning mobile apps without root or jailbreak
Pwning mobile apps without root or jailbreak
 
Embedded Android Workshop with Marshmallow
Embedded Android Workshop with MarshmallowEmbedded Android Workshop with Marshmallow
Embedded Android Workshop with Marshmallow
 
Embedded Android Workshop with Marshmallow
Embedded Android Workshop with MarshmallowEmbedded Android Workshop with Marshmallow
Embedded Android Workshop with Marshmallow
 
Tools and libraries for common problems (Early Draft)
Tools and libraries for common problems (Early Draft)Tools and libraries for common problems (Early Draft)
Tools and libraries for common problems (Early Draft)
 
Embedded Android Workshop at AnDevCon VI
Embedded Android Workshop at AnDevCon VIEmbedded Android Workshop at AnDevCon VI
Embedded Android Workshop at AnDevCon VI
 
WordCamp Milwaukee 2012 - Aaron Saray - Secure Wordpress Coding
WordCamp Milwaukee 2012 - Aaron Saray - Secure Wordpress CodingWordCamp Milwaukee 2012 - Aaron Saray - Secure Wordpress Coding
WordCamp Milwaukee 2012 - Aaron Saray - Secure Wordpress Coding
 
Pen Testing Development
Pen Testing DevelopmentPen Testing Development
Pen Testing Development
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter

  • 1. Android "Fight Club" In pursuit of “Appiness” “The things you own end up owning you.”
  • 2. Ice breaking session ● Your Name ● Experience with android | android hacking ● Something cool about yourself. ● Have you seen “Fight Club (1999)” ? ● C:Usersabhinav>whoami ○ Abhinav Mishra | 0ctac0der | Freelancer | Bug Hunter | Penetration Tester ● Why is the session named “Fight Club”? ● What are you expecting & what I am going to tell here….. Disclaimer: Some images and quotes have been used which are movie material taken from google.
  • 3. Rules of the fight club 1. You do talk about the “Fight Club” 2. If it’s your first day @fightclub, you have to ask questions…. A lot of questions 3. If someone asks something, you either listen to the answer or answer it 4. Only one question at a time 5. The discussion will go on as long as needed 6. You can ask a question at any time 7. No iOS, no apple 8. If you haven’t seen fight club, you will watch it today
  • 4. Where should we start? ● Let’s talk a bit about android ○ Architecture: Who remembers what ? ○ Privilege and permissions ○ Applications and issues you know about ● Whats tools to use? ○ ADB & SDK ○ Dex2jar ○ JDGUI ○ AVD ○ Drozer ○ QARK ○ Any more ????
  • 5. Building a “coliseum” What we need? 1. Android studio with updated SDK and AVD 2. Dex2Jar, Java decompiler, apktool, burp suite, java debugger 3. Drozer 4. Automated analyzers 5. QARK , Run time analyzer 6. May be a lot more….. So, I decided to help you all. This is what I did: Ubuntu → install apps → update sdk → create AVD → setup everything → Droider
  • 6. What are we going to do next ● Create your lab: ○ Minimum: Android SDK, emulator, ADB, drozer, dex2jar, jdgui, apktool | Or AppUse ● Choose your target app ○ Suggestions: Herd Financials or Four goats. Link ○ Need more adventure? Choose bug bounty apps: Coinbase, Ola Cabs, Dropbox, LastPass ● Let’s hack it ○ Static analysis ○ Dynamic analysis ○ Looking for some common vulnerabilities ● Earning money the Gangsta style
  • 7. Take your time and collect your breath (Break Time) If you are failing, remember:
  • 8. Are you ready? “It's only after we've lost everything that we're free to do anything.” Need help? Ask your Self If the problem got solved Problem persists Ask the guy next to you (and if its a girl. Your life rocks dude) Still Stuck?
  • 9. Because “Why” is also more important than “How” ● Android holds the biggest market share in mobile operating system. ● Google play has more than 48 billion app installs. ● Your android device has: ○ Personal Info, Credit card details, all social accounts, chats, financial details, PIN, OTP … ● One malicious application in your phone … and you are gone. ● A android application vulnerability may leak critical information ● Security of android app is vital for the business ● Android apps are less secure than web, hence apps are the prime target ● Free apps can lead to huge monetary loss. ● Bug Bounty earnings, secure app development
  • 10. Now we will talk about “How” ● Static analysis of android application ○ Looking into the apk file for info leakage, hidden accounts, confidential data ○ Local storage of user/application data ○ Reverse engineering the application ○ Binary Protections, backup info leakage, application signature, crypto issues, data leakage ● Dynamic analysis of the android application ○ Run time analysis ○ Application components: Activities, Broadcast receivers, services, content providers ○ Application data capture and analysis ○ Web based vulnerabilities
  • 11. Static Analysis - Part 1 ● APK → apktool → read AndroidManifest.xml → permissions, components ○ Command used: $apktool d application_file_name ● APK → Un-archive → classes.dex to classes.dex.jar → read java code ○ Command used: $dex2jar classes.dex ● SMALI files → read the code for confidential data ● Tool? Mobilizer.py ● Application signatures and decompilation ● Binary protection ● Debuggable and Backup enabled applications
  • 12. Static Analysis - Part 2 ● Installing app in the emulator ○ $adb install apk_full_name ● Inspecting the application local storage. ○ $adb shell ○ $ ls -la ○ $ cd data/data/package_name/ ● Insecure storage of confidential data ● Logcat and android monitor ● Memory dumps ● Unintended Data leakage ● Crypto issues
  • 13. Tea Break Time In the meantime, for iOS lovers
  • 14. Dynamic Analysis - Part 1 Drozer Analysis: ● Drozer console connect: $drozer console connect ● Drozer attack surface: $run app.package.attacksurface ● Exploiting application components ○ Exported activities ○ Exported Broadcast receivers ○ Exported services ○ Exported content providers
  • 15. Dynamic Analysis - Part 2 ● SSL pinning in applications and bypass ● Setting up proxy on an emulator/device ● Capturing the application traffic ● Web related attacks and testing ○ Authorization and authentication ○ Improper session management ○ Client side injection
  • 16. Dynamic Analysis - Part 3 ● Fuzzing android applications ● Run time code executions ● Insufficient Transport layer protection ● Logical vulnerabilities ● Insufficient server side controls
  • 17. Common vulnerabilities and finding them ● Insecure storage ○ Who will answer this? ● Insufficient transport layer protection ○ How to find this in any applications. Coolest answer will get a prize. ● Insecure application components ○ Give me three examples. ● Binary protection ○ Anyone got this? What did you do?
  • 18. Some common solutions ● Installing Google play on emulator: Link ● Setting up burp proxy on emulator/device: Link ● Installing Burp certificate on android device: Link ● Bypassing SSL pinning on android: Link Scanner and tool tutorials to watch ● QARK: Android App Exploit and SCA Tool - AppSecUSA 2015 : Link ● MobSF: Security Framework for Mobile Application Testing: Link ● Androbugs : An Android Application Security Vulnerability Scanner: Link
  • 19. Questions | Grudges | Suggestions | Compliments Thanks Guys.