SlideShare a Scribd company logo
Rapid Android Application
Security Testing
Agenda
• Introduction to Android Testing
– Static Analysis
– Dynamic Analysis
– Local Storage Inspection
• Challenge.txt
Android Security Testing
• Can install apps on device and go hack the
network.
• Can install the application in the
emulator and test it.
What’s inside?
• Android is a Linux kernel based OS.
• Dalvik VM (Dalvik Virtual Machine) makes the
dex file (Dalvik Executables) reach execution.
• APK (Android Application Package) contains all
the resources, i.e. manifest file, signatures,
dex file, and other resources in a zipped
manner.
So what happens.
• Java source code is compiled to Java byte
Code using Java Compiler
• Byte code is converted into Dalvik Code using
Dex compiler
• Dalvik Executable (Dex file) goes to “Dalvik
VM” and executes within it.
…..Continued.
Dalvik VM
Dalvik
Executable
(Dex File)
Java Source
Code
Java Byte
CodeJava Compiler
Dalvik Code
Dex Compiler
Pentest. How to do?
• Break the testing into
three parts:
– Static Testing
– Dynamic Testing
– Local Storage
• Try to uncover issues in
every phase.
Static Analysis
• Get the .apk file.
• Reverse Engineer it.
• Decompile / Dis-assemble it.
• Dis-assemble it using
– Dedexer gives assembly like output) or
– Baksmali (based on dedexer and gives code more easy to understand.
• Decompile it using
– Dex2jar (dalvik code turns to Java byte code (jar file).
– Use jd-gui to view the java source codes.h
What to look for?
• Look for api information, database connection strings, internal
/ external IP disclosures and ports, etc.
• If you are lucky, you might get a password too, Believe me
developers are crazy.
• If you can go for social engineering stuff, lot of emails can be
found.
• Tip: A pair of /* and */ holds a lot of information.
m0bLiz3r Demo
https://github.com/nkpanda/Android-Testing
Dynamic Analysis
• Load emulator.
• Set up an Interception Proxy
• Figure out SSL issues.
• And follow the generic logic test cases you
follow in web applications.
Proxy Setup
Continued…
Local Storage Inspection
• Check for sensitive data getting stored on client side.
• XML files, database files are most commonly found
culprits.
• Inspect memory for information sensitive
information > memdump
• Inspect generated logs for sensitive information >
logcat.
• Uninstall and check if things remain in application
folder.
Where to look?
How it look?
Tools Of Trade
• Android SDK
• ADB
• BurpSuite
• APKtools
• Smali/baksmali
• Dex2jar
• Genymotion
• Appuse/Android Tamer.
Challenges
• AppUse is quite slow:
– Save time in loading your Emulator.
– Save time in installing app.
• ADB always run behind device. If you are idle, adb don’t work, or restart your
emulator.
– Keep your ADB attached to device constantly.
• Commands for every push, apk installation, etc.
– Get Drag and Drop feature.
• Organization might ask you to get application from play store.
– Get Play Store.
• Genymotion
– give you all the above sweet cake.
– Supports Webcam, mike, GPS, etc. as well --------- Haven’t tested them however
– Not stable. --------- One bad out of six is never a bad.
Time UP : What next?
• OWASP mobile TOP 10
• Drozer (for Inter
Process
Communication)
• Explore new tools all
the time.
• Keep sharing.
Questions?

More Related Content

What's hot (20)

PPTX
Web Hacking Intro
Aditya Kamat
 
PPTX
Hack and Slash: Secure Coding
Prathan Phongthiproek
 
PPTX
Vulnerabilities in modern web applications
Niyas Nazar
 
PPTX
Presentation on Web Attacks
Vivek Sinha Anurag
 
PPTX
[OWASP Poland Day] Application frameworks' vulnerabilities
OWASP
 
PPT
Web Hacking
Information Technology
 
PDF
Introduction to Web Application Security - Blackhoodie US 2018
Niranjanaa Ragupathy
 
PDF
Javacro 2014 Spring Security 3 Speech
Fernando Redondo Ramírez
 
PPTX
ASP.NET security vulnerabilities
Aleksandar Bozinovski
 
PPTX
Web Security Attacks
Sajid Hasan
 
PDF
Persistant Cookies and LDAP Injection
MaulikLakhani
 
PPTX
3. backup file artifacts - mazin ahmed
Rashid Khatmey
 
PPTX
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
Quek Lilian
 
PDF
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Madhu Akula
 
PPTX
Injection flaw teaser
NotSoSecure Global Services
 
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Brian Huff
 
PDF
Shellcoding in linux
Ajin Abraham
 
PPTX
Microsoft Fakes, Unit Testing the (almost) Untestable Code
Aleksandar Bozinovski
 
PPTX
SANS @Night Talk: SQL Injection Exploited
Micah Hoffman
 
PDF
Secuirty News Bytes-Bangalore may 2014
n|u - The Open Security Community
 
Web Hacking Intro
Aditya Kamat
 
Hack and Slash: Secure Coding
Prathan Phongthiproek
 
Vulnerabilities in modern web applications
Niyas Nazar
 
Presentation on Web Attacks
Vivek Sinha Anurag
 
[OWASP Poland Day] Application frameworks' vulnerabilities
OWASP
 
Introduction to Web Application Security - Blackhoodie US 2018
Niranjanaa Ragupathy
 
Javacro 2014 Spring Security 3 Speech
Fernando Redondo Ramírez
 
ASP.NET security vulnerabilities
Aleksandar Bozinovski
 
Web Security Attacks
Sajid Hasan
 
Persistant Cookies and LDAP Injection
MaulikLakhani
 
3. backup file artifacts - mazin ahmed
Rashid Khatmey
 
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
Quek Lilian
 
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Madhu Akula
 
Injection flaw teaser
NotSoSecure Global Services
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Brian Huff
 
Shellcoding in linux
Ajin Abraham
 
Microsoft Fakes, Unit Testing the (almost) Untestable Code
Aleksandar Bozinovski
 
SANS @Night Talk: SQL Injection Exploited
Micah Hoffman
 
Secuirty News Bytes-Bangalore may 2014
n|u - The Open Security Community
 

Viewers also liked (20)

PDF
Browser Exploit Framework
n|u - The Open Security Community
 
PPTX
The Shellshocker
Sharath Unni
 
PDF
Demystifying captcha Bangalore Meet April 18
n|u - The Open Security Community
 
PPTX
IE Memory Protector
3S Labs
 
PDF
Owasp Mobile Top 10 – 2014
n|u - The Open Security Community
 
PPTX
Recon ng null meet April 2015
n|u - The Open Security Community
 
PDF
Owasp m7-m8-shivang nullmeetblr 21june2015
n|u - The Open Security Community
 
PPTX
Venom vulnerability Overview and a basic demo
Akash Mahajan
 
PDF
Metasploit Humla for Beginner
n|u - The Open Security Community
 
PPTX
Security Monitoring using SIEM null bangalore meet april 2015
n|u - The Open Security Community
 
PPTX
Android Performance Tips & Tricks
Sergii Zhuk
 
PPTX
Testing for Android: When, Where, and How to Successfully Use Test Automation
Trent Peterson
 
PPTX
Unit Testing Android Applications
Rody Middelkoop
 
PDF
Introduction to android testing - oscon 2012
OSCON Byrum
 
PDF
Android Testing: An Overview
SmartLogic
 
PPTX
Testing Android Application, Droidcon Torino
Pietro Alberto Rossi
 
PDF
Inside Android Testing
Fernando Cejas
 
PDF
Android Building, Testing and reversing
Enrique López Mañas
 
Browser Exploit Framework
n|u - The Open Security Community
 
The Shellshocker
Sharath Unni
 
Demystifying captcha Bangalore Meet April 18
n|u - The Open Security Community
 
IE Memory Protector
3S Labs
 
Owasp Mobile Top 10 – 2014
n|u - The Open Security Community
 
Recon ng null meet April 2015
n|u - The Open Security Community
 
Owasp m7-m8-shivang nullmeetblr 21june2015
n|u - The Open Security Community
 
Venom vulnerability Overview and a basic demo
Akash Mahajan
 
Metasploit Humla for Beginner
n|u - The Open Security Community
 
Security Monitoring using SIEM null bangalore meet april 2015
n|u - The Open Security Community
 
Android Performance Tips & Tricks
Sergii Zhuk
 
Testing for Android: When, Where, and How to Successfully Use Test Automation
Trent Peterson
 
Unit Testing Android Applications
Rody Middelkoop
 
Introduction to android testing - oscon 2012
OSCON Byrum
 
Android Testing: An Overview
SmartLogic
 
Testing Android Application, Droidcon Torino
Pietro Alberto Rossi
 
Inside Android Testing
Fernando Cejas
 
Android Building, Testing and reversing
Enrique López Mañas
 
Ad

Similar to Rapid Android Application Security Testing (20)

PDF
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
Abhinav Mishra
 
PDF
Android pentesting
Mykhailo Antonishyn
 
PDF
Getting started with Android pentesting
Minali Arora
 
PPTX
Mobile application security
Shubhneet Goel
 
PPTX
Mobile Application Security
Ishan Girdhar
 
PPTX
Android Penetration testing - Day 2
Mohammed Adam
 
PPTX
Getting started with android
Vandana Verma
 
PDF
MobSecCon 2015 - Dynamic Analysis of Android Apps
Ron Munitz
 
PPTX
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Romansh Yadav
 
PPTX
Dynamic Security Analysis & Static Security Analysis for Android Apps.
VodqaBLR
 
PPTX
Droidcon mobile security
Judy Ngure
 
PDF
us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...
AliAlwesabi
 
PDF
Introduction to Android Development and Security
Kelwin Yang
 
PDF
Android security and penetration testing | DIVA | Yogesh Ojha
Yogesh Ojha
 
PDF
Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
Romansh Yadav
 
PPTX
[Wroclaw #1] Android Security Workshop
OWASP
 
PPTX
Pentesting Android Apps
Abdelhamid Limami
 
PPTX
Android pentesting
Mykhailo Antonishyn
 
PPTX
Android security by ravi-rai
Ravi Rai
 
PDF
Reading Group Presentation: Why Eve and Mallory Love Android
Michael Rushanan
 
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
Abhinav Mishra
 
Android pentesting
Mykhailo Antonishyn
 
Getting started with Android pentesting
Minali Arora
 
Mobile application security
Shubhneet Goel
 
Mobile Application Security
Ishan Girdhar
 
Android Penetration testing - Day 2
Mohammed Adam
 
Getting started with android
Vandana Verma
 
MobSecCon 2015 - Dynamic Analysis of Android Apps
Ron Munitz
 
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Romansh Yadav
 
Dynamic Security Analysis & Static Security Analysis for Android Apps.
VodqaBLR
 
Droidcon mobile security
Judy Ngure
 
us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...
AliAlwesabi
 
Introduction to Android Development and Security
Kelwin Yang
 
Android security and penetration testing | DIVA | Yogesh Ojha
Yogesh Ojha
 
Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
Romansh Yadav
 
[Wroclaw #1] Android Security Workshop
OWASP
 
Pentesting Android Apps
Abdelhamid Limami
 
Android pentesting
Mykhailo Antonishyn
 
Android security by ravi-rai
Ravi Rai
 
Reading Group Presentation: Why Eve and Mallory Love Android
Michael Rushanan
 
Ad

More from Nutan Kumar Panda (15)

PPTX
Pentesting ReST API
Nutan Kumar Panda
 
PPTX
Dark Arts Of Social Engineering
Nutan Kumar Panda
 
PPTX
OSINT Black Magic: Listen who whispers your name in the dark!!!
Nutan Kumar Panda
 
PDF
Win 8 password cracking
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part10
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part9
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part8
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part7
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part6
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part5
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part4
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part3
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part2
Nutan Kumar Panda
 
DOCX
Backtrack manual Part1
Nutan Kumar Panda
 
DOCX
Google Hack
Nutan Kumar Panda
 
Pentesting ReST API
Nutan Kumar Panda
 
Dark Arts Of Social Engineering
Nutan Kumar Panda
 
OSINT Black Magic: Listen who whispers your name in the dark!!!
Nutan Kumar Panda
 
Win 8 password cracking
Nutan Kumar Panda
 
Backtrack Manual Part10
Nutan Kumar Panda
 
Backtrack Manual Part9
Nutan Kumar Panda
 
Backtrack Manual Part8
Nutan Kumar Panda
 
Backtrack Manual Part7
Nutan Kumar Panda
 
Backtrack Manual Part6
Nutan Kumar Panda
 
Backtrack Manual Part5
Nutan Kumar Panda
 
Backtrack Manual Part4
Nutan Kumar Panda
 
Backtrack Manual Part3
Nutan Kumar Panda
 
Backtrack Manual Part2
Nutan Kumar Panda
 
Backtrack manual Part1
Nutan Kumar Panda
 
Google Hack
Nutan Kumar Panda
 

Rapid Android Application Security Testing

  • 2. Agenda • Introduction to Android Testing – Static Analysis – Dynamic Analysis – Local Storage Inspection • Challenge.txt
  • 3. Android Security Testing • Can install apps on device and go hack the network. • Can install the application in the emulator and test it.
  • 4. What’s inside? • Android is a Linux kernel based OS. • Dalvik VM (Dalvik Virtual Machine) makes the dex file (Dalvik Executables) reach execution. • APK (Android Application Package) contains all the resources, i.e. manifest file, signatures, dex file, and other resources in a zipped manner.
  • 5. So what happens. • Java source code is compiled to Java byte Code using Java Compiler • Byte code is converted into Dalvik Code using Dex compiler • Dalvik Executable (Dex file) goes to “Dalvik VM” and executes within it.
  • 6. …..Continued. Dalvik VM Dalvik Executable (Dex File) Java Source Code Java Byte CodeJava Compiler Dalvik Code Dex Compiler
  • 7. Pentest. How to do? • Break the testing into three parts: – Static Testing – Dynamic Testing – Local Storage • Try to uncover issues in every phase.
  • 8. Static Analysis • Get the .apk file. • Reverse Engineer it. • Decompile / Dis-assemble it. • Dis-assemble it using – Dedexer gives assembly like output) or – Baksmali (based on dedexer and gives code more easy to understand. • Decompile it using – Dex2jar (dalvik code turns to Java byte code (jar file). – Use jd-gui to view the java source codes.h
  • 9. What to look for? • Look for api information, database connection strings, internal / external IP disclosures and ports, etc. • If you are lucky, you might get a password too, Believe me developers are crazy. • If you can go for social engineering stuff, lot of emails can be found. • Tip: A pair of /* and */ holds a lot of information.
  • 11. Dynamic Analysis • Load emulator. • Set up an Interception Proxy • Figure out SSL issues. • And follow the generic logic test cases you follow in web applications.
  • 14. Local Storage Inspection • Check for sensitive data getting stored on client side. • XML files, database files are most commonly found culprits. • Inspect memory for information sensitive information > memdump • Inspect generated logs for sensitive information > logcat. • Uninstall and check if things remain in application folder.
  • 17. Tools Of Trade • Android SDK • ADB • BurpSuite • APKtools • Smali/baksmali • Dex2jar • Genymotion • Appuse/Android Tamer.
  • 18. Challenges • AppUse is quite slow: – Save time in loading your Emulator. – Save time in installing app. • ADB always run behind device. If you are idle, adb don’t work, or restart your emulator. – Keep your ADB attached to device constantly. • Commands for every push, apk installation, etc. – Get Drag and Drop feature. • Organization might ask you to get application from play store. – Get Play Store. • Genymotion – give you all the above sweet cake. – Supports Webcam, mike, GPS, etc. as well --------- Haven’t tested them however – Not stable. --------- One bad out of six is never a bad.
  • 19. Time UP : What next? • OWASP mobile TOP 10 • Drozer (for Inter Process Communication) • Explore new tools all the time. • Keep sharing.