SlideShare a Scribd company logo
1 of 35
Ravindo Tower 17th floor
Kebon Sirih No. 75 Central Jakarta 10340 - Indonesia
P: +62 21 3192 5551 / info@idsirtii.or.id
Android Malware Operating System
Indonesian Coder and Exploit-Id
#whoami
Malware Analyst , IT Security Research , Pentester
 
OVERVIEW
Ravindo Tower 17th floor
Kebon Sirih No. 75 Central Jakarta 10340 - Indonesia
P: +62 21 3192 5551 / info@idsirtii.or.id
THE EVOLUTION OF MOBILE MALWARE
2004
Percobaan Pertama
2005
MMS sebagai Media Penyebaran
2006
Malware sebagai Mesin Penghasil Uang
2007 – 2008
Periode Transisi
2009
Perkenalan Botnet Mobile
2010
Mobile Malware Era Industri
2011
Android, Android, dan Android!
2013-2015
Permainan Dimulai - Berbagai Metode Serangan Baru
Ravindo Tower 17th floor
Kebon Sirih No. 75 Central Jakarta 10340 - Indonesia
P: +62 21 3192 5551 / info@idsirtii.or.id / www.idsirtii.or.id
Malware
Bukan rahasia bahwa ponsel Android sangat rentan terjangkit malware.
Salah satu sebabnya adalah kebijakan Google yang diterapkan pada Play Store dalam menyeleksi aplikasi yang masuk.
M lware
TROJAN
tif
P
Peralatan Tempur
INSTALL APACHE
apt-get install apache2 apache2-doc apache2-utils
INSTALL PHP
apt-get install libapache2-mod-php5 php5 php-pear
php5-xcache php5-mysql
INSTALL MySQL
apt-get install mysql-server mysql-client
CREATE APK MALWARE
ANDROID.APK
Sample Malware
SMALI / BAKSMALI
Aplikasi Dissasembler Format File Dex
APKTOOL
Decompile dan Recompile Apk
INSTALL
RAT
MALWA
RE
FITUR RAT MALWARE
ANDROID
RAT Malware Android With
Raspberry Pi Server
IDSECCONF 2015
yang
ANDROID MALWARE OPERATING SYSTEM
Analis Apk Android Malware
Berdoalah Semoga
Smartphone Anda
Aman
Rat malware android

More Related Content

Viewers also liked

Prefix ip address (farisan perkasa)
Prefix ip address (farisan perkasa)Prefix ip address (farisan perkasa)
Prefix ip address (farisan perkasa)
Maniak Bandoenx
 
Kkpteknikkomputerbsiprint 150723132944-lva1-app6891
Kkpteknikkomputerbsiprint 150723132944-lva1-app6891Kkpteknikkomputerbsiprint 150723132944-lva1-app6891
Kkpteknikkomputerbsiprint 150723132944-lva1-app6891
advan1111
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 

Viewers also liked (14)

Policy In A New Economic Order
Policy In A New Economic OrderPolicy In A New Economic Order
Policy In A New Economic Order
 
Prefix ip address (farisan perkasa)
Prefix ip address (farisan perkasa)Prefix ip address (farisan perkasa)
Prefix ip address (farisan perkasa)
 
Tentang TCP/IP
Tentang TCP/IPTentang TCP/IP
Tentang TCP/IP
 
Diptico radio edu
Diptico radio eduDiptico radio edu
Diptico radio edu
 
Kkpteknikkomputerbsiprint 150723132944-lva1-app6891
Kkpteknikkomputerbsiprint 150723132944-lva1-app6891Kkpteknikkomputerbsiprint 150723132944-lva1-app6891
Kkpteknikkomputerbsiprint 150723132944-lva1-app6891
 
IP Address
IP AddressIP Address
IP Address
 
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbgPractical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Ip address
Ip addressIp address
Ip address
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Ayuda para realizar la evaluación entre pares (P2P) en MOOC/NOOC INTEF
Ayuda para realizar la evaluación entre pares (P2P) en MOOC/NOOC INTEFAyuda para realizar la evaluación entre pares (P2P) en MOOC/NOOC INTEF
Ayuda para realizar la evaluación entre pares (P2P) en MOOC/NOOC INTEF
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 

More from idsecconf

More from idsecconf (20)

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullah
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
 

Rat malware android