|
1 | 1 | *Mobile security*narrative
|
2 | 2 |
|
| 3 | +Threats |
| 4 | + Apps perform network communication, which can occur through unsecure networks such as cafe wifi. |
| 5 | + The phone can be lost or stolen, no app data should be available in the filesystem |
| 6 | + Unofficial markets provide malware threats |
| 7 | + Big attack surface (NFC, bluetooth, camera, SMS, USB, QR, ...) |
| 8 | + |
| 9 | +Common vulnerabilities |
| 10 | + Insecure data storage: data in cleartext, hardcoded keys, or other means that can be reversed engineered. |
| 11 | + Insecure transmission of data: not using TLS or implemented incorrectly |
| 12 | + Lack of binary protections: No having protections against debugging, tampering, reverse engineering. |
| 13 | + Client-side injection: untrusted data in handled in an unsafe manner |
| 14 | + Hard-coded passwords: in the app code or data. |
| 15 | + Leakage of sensitive data: leaking data through OS or frameworks. |
| 16 | + |
| 17 | +Mobile OWASP top 10 |
| 18 | + M1 - Improper platform usage |
| 19 | + M3 - Insufficient Transport Layer (on server side) |
| 20 | + M2 - Insecure Data storage |
| 21 | + M4 - Insecure Authentication |
| 22 | + M5 - Insufficient Cryptography |
| 23 | + M6 - Insecure Authorization |
| 24 | + M8 - Code Tampering |
| 25 | + M9 -Reverse Engineering |
| 26 | + M10 - Extraneous Functionality |
| 27 | + |
| 28 | + |
| 29 | +Mobile pentest |
| 30 | + |
| 31 | +Static analysis |
| 32 | + Use **http://jd.benow.ca/** to decompile to APK classes. Read the code to understand what libraries it uses, how communication is handled and obvious flaws. |
| 33 | + |
| 34 | +Network traffic |
| 35 | + Intercept requests using Burp |
| 36 | + |
| 37 | +Data storage |
| 38 | + Encrypted? |
| 39 | + |
| 40 | + |
| 41 | + |
3 | 42 | IOS Security
|
4 | 43 |
|
5 | 44 | Secure Boot Chain
|
@@ -137,7 +176,7 @@ Decompile classes
|
137 | 176 | First get the jar:
|
138 | 177 | *$ sh dex2jar.sh diva-beta.apk
|
139 | 178 | dex2jar diva-beta.apk -> diva-beta_dex2jar.jar*
|
140 |
| - You can use *JD-GUI* to decompile the classes |
| 179 | + You can use **JD-GUI** to decompile the classes |
141 | 180 |
|
142 | 181 | Getting AndroidManifest.xml and smali code
|
143 | 182 | *$ java -jar apktool_2.0.3.jar d diva-beta.apk -o output8*
|
|
0 commit comments