Mobile Hacking - Fundamentals

Slides:



Advertisements
Similar presentations
Mobile Security Guide Matt Scofield, Eric Samson, Cong Le.
Advertisements

Get android development environment running. Install – Get and install JDK 5 or 6 (see link in the.
2. Setting Up Your Android Development Environment.
ANDROID PROGRAMMING MODULE 1 – GETTING STARTED
UFCFX5-15-3Mobile Device Development Android Development Environments and Windows.
Hacking Exposed 7 Network Security Secrets & Solutions
Android Programming. Outline Preparation Create new project Build and Run a project Debug a project Deploy on devices.
Presentation By Deepak Katta
Android Introduction Platform Overview.
Introduction Our Topic: Mobile Security Why is mobile security important?
Introduction to Android Swapnil Pathak Advanced Malware Analysis Training Series.
Android Introduction Based on slides made by
Google Maps Android API v2 吳俊興 國立高雄大學 資訊工程學系 CSF645 – Mobile Computing 行動計算
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Presented by: Kushal Mehta University of Central Florida Michael Spreitzenbarth, Felix Freiling Friedrich-Alexander- University Erlangen, Germany michael.spreitzenbart,
APKInspector -Static Analysis of Android Applications Student: Yuan Tian Mentor: Cong Zheng Backup Mentor: Anthony Kara Jianwei 08/22/2012.
Is Your Mobile App Secure. DEF CON 23 Wall of Sheep Sat
Introduction to Mobile Programming. Slide 2 Overview Fundamentally, it all works the same way You get the SDK for the device (Droid, Windows, Apple) You.
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
Android for Java Developers Denver Java Users Group Jan 11, Mike
Overview of Android Application Development
Android Security Auditing Slides and projects at samsclass.info.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
Good MDM IOS Overview Presented by: Jerry Wen 02/09/2012.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
Slides and projects at samsclass.info. Adding Trojans to Apps Slides and projects at samsclass.info.
Wireless and Mobile Security
Speaker: Xiaojiang Du Authors: Xiali Hei, Xiaojiang Du and Shan Lin Temple University.
Rhapsody Adendum. Remote Access Start VPN through connect.spsu.edu Select ‘Client Apps’ on the toolbar on the right top of page Then click ‘Start’ on.
© 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Android Boot Camp.
Root Access By: Derek Grove. What Do I Mean By Root?  An account that by default has access to all commands and files on a linux or other Unix-like operating.
By Collin Donaldson.   In conventional OS architectures, the user accesses the OS via an account that has certain privileges (admin, guest). They can.
Android and IOS Permissions Why are they here and what do they want from me?
2014 When Android Apps Go Evil Jing Xie Lookout Inc #GHC
LOGO iPhone to Galaxy Note Transfer Transfer iPhone Data to Galaxy Note 3/Note 4/Note 5/Note Edge.
Introduction to Android Chapter 1 1. Objectives Understand what Android is Learn the differences between Java and Android Java Examine the Android project.
Computer safety Filip Hruby.
Module 51 (Mobile Device Fundamentals - Android)
Voice Controlled Robot by Cell Phone with Android App
Mobile Device Development
Android Mobile Application Development
iPhones and iPads and iTunes, Oh My!
WELCOME Mobile Applications Testing
Obtaining the Required Tools
Android System Security
Android Runtime – Dalvik VM
Android.
Chapter 2: System Structures
Lecture 9: ADB Topics: Basic ADB Commands.
Common Operating System Exploits
NEED OF JAILBREAKING IN IOS PENETRATION TESTING
CA16R405 - Mobile Application Development (Theory)
CMPE419 Mobile Application Development
CompTIA IT Fundamentals Study Guide (FC0-U51)
ProfileDroid: Multi-layer Profiling of Android Applications
Android training in Chandigarh. What is ADB ADB stands for Android Debug Bridge. It is a command line tool that is used to communicate with the emulator.
Trial Guide August 2018 Global Mobile B2B Team Samsung Electronics
Hacking Android for fun & profit
Mobile Pen Testing w/ drozer
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Hacking mobile devices
Lesson 8 Operating Systems
CHAPTER 1 Introduction Chapter objectives: Understand what Android is
Android Platform, Android App Basic Components
Getting Started with Android…
Lecture 11: ADB Topics: Basic ADB Commands.
CMPE419 Mobile Application Development
Presentation transcript:

Mobile Hacking - Fundamentals Presenter: Christopher Clayden | christopher.clayden@gmail.com 1

Mobile Hacking – Fundamentals AGENDA Brief overview on the mobile threat landscape Discussion on possible attack vectors Examples of exploitation Learn how to protect ourselves Demonstration Questions 2

Mobile Hacking - The Mobile threat landscape Who are the top contenders in the global mobile OS market? Android – 84.1% IOS – 14.8% Microsoft – 0.7% RIM – 0.2% http://www.statista.com/statistics/266136/global-market-share-held-by-smartphone-operating-systems/ 3

Mobile Hacking - The Mobile threat landscape Over 1.4 billion people across the world are using Android devices, according to Google. Unlike Apple’s iOS, Android is not tied to a specific manufacturer, making it's OS the top dog of the global OS market (Statistica). However, since Android dominates the smartphone market, it presents an ideal opportunity for hackers to tap into a large base of user information. It’s essential for Android users, as well as iOS users, to learn how to protect themselves. https://www.blackhat.com/latestintel/05122016-mobile-hacking.html 4

Mobile Hacking - Attack Vectors Possible vectors for exploitation include: Manual Installation Direct Access to the device Use of client-server programs – ex: ADB Social Engineering Text Messages – ex: stagefright RCE vulnerabilities – ex: ADB exploit/android/adb/adb_server_exec Etc. 5

Mobile Hacking - Hacking Android – Example 1 Manual Installation Raw payload saved in apk format generated with msfvenom Standard reverse meterpreter 6

Mobile Hacking - Hacking Android – Example 1 7

Mobile Hacking - Hacking Android – Example 1 8

Mobile Hacking - Hacking Android – Example 1 9

Mobile Hacking - Hacking Android – Example 1 10

Mobile Hacking - Hacking Android – Example 1 11

Mobile Hacking - Hacking Android – Example 1 12

Mobile Hacking - Hacking Android – Example 1 13

Mobile Hacking - Hacking Android – Example 1 14

Mobile Hacking - Hacking Android – Example 2 Android Debug Bridge - ADB Android Debug Bridge (ADB) is a versatile command line tool that lets you communicate with an emulator instance or connected Android-powered device. It is a client-server program. In order to use ADB; developer options must be unlocked and USB debugging enabled. On Android 4.2 and higher, the Developer options screen is hidden by default. When running Android 4.2.2 or higher, there is a security mechanism (refereed to as secure USB debugging) where the android system shows a dialog asking the user to accept an RSA key that allows debugging through the computer. 15

Mobile Hacking - Hacking Android – Example 2 Vulnerabilities have been found in Android that allow attackers to bypass Android’s secure USB debugging which allows them to: Install Applications Bypass Android's lock screen - Pattern/PIN locks Obtain Shells Etc.. https://developer.android.com/studio/command-line/adb.html 16

Mobile Hacking - Hacking Android – Example 2 17

Mobile Hacking - Hacking Android – Example 3 Embed a payload into any android application The Injection process high level: Disassemble the apk files – apktool Both payload and our original application Copy our payload in smali format to the original application Modify the Android Manifest file – AndroidManifest.xml from the original application to include any additional permission required for the payload in addition to services. Modify the smali code in original application to inject new smali code to invoke our payload when the original application is launched. Assemble the new apk file – apktool Generate new keys & sign the apk file Deploy 18

Mobile Hacking - Hacking Android – Example 3 Embed payload Preamble: Apktool - https://ibotpeaches.github.io/Apktool/ A tool for reverse engineering Android apk files Manifest Every application must have an AndroidManifest.xml file (with precisely that name) in its root directory. The manifest file provides essential information about your app to the Android system, which the system must have before it can run any of the app's code. https://developer.android.com/guide/topics/manifest/manifest-intro.html Smali Smali/Baksmali is an assembler/disassembler for the dex format used by dalvik, Android's Java VM implementation. The names "Smali" and "Baksmali" are the Icelandic equivalents of "assembler" and "disassembler" respectively. https://www.youtube.com/watch?v=h98KtUgUOsg 19

Mobile Hacking - Hacking Android – Example 3 20

Mobile Hacking - Hacking Android – Example 3 21

Mobile Hacking - Hacking Android – Example 3 22

Mobile Hacking - Hacking Android – Example 3 23

Mobile Hacking - Hacking Android – Example 3 24

Mobile Hacking - Hacking Android – Example 3 25

Mobile Hacking - Hacking Android – Example 3 26

Mobile Hacking - Hacking Android – Example 3 27

Mobile Hacking - Hacking Android – Example 3 28

Mobile Hacking - Hacking Android – Example 3 29

Mobile Hacking - Hacking Android – Example 3 30

Mobile Hacking - Hacking Android – Example 3 31

Mobile Hacking - Hacking Android – Example 3 32

Mobile Hacking - Hacking Android – Example 3 33

Mobile Hacking - Hacking Android – Example 3 34

Mobile Hacking - HELP What can we do to protect ourselves? Start with the basics... Keep your OS up to date Keep your applications up to date Never install anything untrusted Don't leave your phone laying around Don't root your phone Turn off external communication when not in use/needed; ex: Bluetooth Be mindful of the wireless network that you are connecting to Use Anti-virus software 35

Mobile Hacking - DEMO DEMO 36

Mobile Hacking – Questions? 37