A quick look at what you should be considering when assessing the security of a mobile application, looking at an established framework and some of the common tools to get started
{elysiumsecurity}
cyber protection & response
5
ADVANCEDTOOLSFRAMEWORKCONTEXT
MOBILE SECURITY CONTEXT
Public Diagram Source: McAfee Mobile Threat Report Q1, 2018
SECURITY
{elysiumsecurity}
cyber protection & response
6
ADVANCEDTOOLSFRAMEWORKCONTEXT
ASSESSMENT SCOPE
Public
INFRASTRUCTUREWEB API APPLICATION
Icons from the noun project unless specified otherwise
{elysiumsecurity}
cyber protection & response
7
ADVANCEDTOOLSFRAMEWORKCONTEXT
MOBILE ASSESSMENT FRAMEWORK
Public SOURCE: ELYSIUMSECURITY LTD – Please refer to us when re-using this diagram
{elysiumsecurity}
cyber protection & response
8
ADVANCEDTOOLSFRAMEWORKCONTEXT
MOBILE ASSESSMENT FRAMEWORK
Public
FILESYSTEM
ANALYSIS
ANDROID: /DATA/DATA/APP_NAME
IOS: /PRIVATE/VAR
{elysiumsecurity}
cyber protection & response
14
ADVANCEDTOOLSFRAMEWORKCONTEXT
IOS TOOLS
Public
FILESYSTEM
ANALYSIS
USAGE
ANALYSIS
YOUR THUMB!
NETWORK
ANALYSIS
PROXY SETTINGS
ROGUE ACCESS POINTS
WIRESHARK
PSEUDO
CODE
ANALYSIS
UNZIP FOR RESOURCES
STRINGS
IDA, CLASS-DUMP
SSH TO JAILBROKEN PHONE
{elysiumsecurity}
cyber protection & response
15
ADVANCEDTOOLSFRAMEWORKCONTEXT
ADVANCED TECHNICS
Public
ANTI JAILBREAK DETECTION
SOFTWARE
NETWORK TRAFFIC THROUGH AN
IDS
CHANGE CODE AND RECOMPILE
(ANDROID)