Stealing Sensitive Data from Android Phones - The Hacker Way
-SRINIVAS
cnuhackz@gmail.com
Who Am I ???
• An Independent Security Researcher
• Security Consultant at Tata Consultancy Services
• Introduction to Android
• Android Architecture
• Android Internals
• Android Security Model
• Reverse Engineering
• Writing Android Malwares
• Demos
• Discussion
Agenda
Why Android???
Android Market Share 2013
http://www.onbile.com/info/us-android-market-share/
ANDROID PLATFORM BASICS
Android is a software stack for mobile devices that includes an operating system,
middleware and key applications.
Developed by Google and Open Handset Alliance
What is Android?
Android was engineered from the beginning to be online.
Ability for users to extend the functionality of the device.
Ability for users to store their data on the devices.
Core Features
Android Internals
Android platform is based on Linux technology.
Uses java Programming language
No monopoly status - Allows anyone to develop own applications.
Good news for Hackers 
Android Architecture
Dalvik Virtual Machine
Register based
Interpreter only virtual machine.
The Dalvik VM executes files in the Dalvik Executable
(.dex) format which is optimized for minimal memory.
The VM is register-based, and runs classes compiled
by a Java language compiler that have been
transformed into the .dex format by the included “dx”
tool.
java
Byte code
Dalvik Code
Dalvik
VM
.java
.class
.dex
javac
dx
ANDROID APP BASICS
Android App will have an extension .apk
It’s nothing but a zip file.
Can be extracted using winrar, winzip etc.
Android App Basics
META-INF
res
AndroidManifest.xml
Classes.dex
Resources.arsc
App illustrated – User Perspective
Activity
Intents
Content Providers
Service
Broadcast Receivers
App illustrated – Developer Perspective
DEMO
ANDROID PLATFORM SECURITY
 Mandatory application sandbox for all applications
 Application-defined and user-granted permissions
 Robust security at the OS level through the Linux kernel
 Secure inter process communication
 Application signing
Android Platform Security
Dalvik Virtual Machine
Every Android application runs in its own process.
The UID will typically be something like app_XX
Runs with its own instance of the Dalvik virtual machine.
UID
1000
Dalvik VM
App 1
UID
1001
Dalvik VM
App 2
UID
1002
Dalvik VM
App 3
UID
1003
Dalvik VM
App 4
 Declared in AndroidManifest.xml
 XML file contains all the components and permissions
 Binary XML formatted text. We cant read directly.
 An App can only use the declared permissions (Theory  )
Android Permission Model
Attacking Android Devices
-The known ways
Exploitation1
 Find your target Device
 Check for exploits
 Exploit it
Malwares2
 DroidDream.
 Geinimi - Android malware with botnet-like capabilities.
 Trojan-SMS for Android FakePlayer.
 iCalendar acbcad45094de7e877b656db1c28ada2.
 SMS_Replicator_Secret.apk.
http://contagiodump.blogspot.in/
Some Popular Android Malwares
1. Reverse Engineering
2. Build from Scratch
Building Android Malwares
Legitimate developer
1 2
34
5
Hacker
Android Market
Third party market
User
1. Reverse Engineering
6
java
Byte code
Dalvik Code
.apk
.java
.class
.dex
javac
dx
Reverse Engineering
Tools
APK Tool – Smali files
Dex2jar, jdGUI – java files
DEMO
Hacker Market place
2. Develop from Scratch
Can Spy on SMS, CallLogs, Contacts, IMEI, Current Location, Browser History etc.
Implemented with Broadcast Receivers.
Doesn’t make noise – because, it’s a service.
Uploads everything to a remote server if internet is available on the device.
Will store them as text file onto SDcard if Internet is not available.
My Own Android Malware
DEMO
DISCUSSION
[1] www.thenounproject.com
[2] http://mekeel.org
[3] http://www.gfi.com
[4] http://www.theverge.com
[5] http://www.google.com
Image Credits
Greetzz!
Imran Mohammed
Sai Satish
Null HyderabadTeam
Sri. Sagi ManiRaju

More Related Content

PDF
Building Custom Android Malware BruCON 2013
PPTX
Android forensics an Custom Recovery Image
PPTX
Android Mobile forensics with custom recoveries
PDF
Android Security Overview and Safe Practices for Web-Based Android Applications
PPTX
Android security
PPT
WhatsApp Forensic
PPT
Analysis and research of system security based on android
PDF
Android Security
Building Custom Android Malware BruCON 2013
Android forensics an Custom Recovery Image
Android Mobile forensics with custom recoveries
Android Security Overview and Safe Practices for Web-Based Android Applications
Android security
WhatsApp Forensic
Analysis and research of system security based on android
Android Security

What's hot (20)

PDF
Android Forensics: Exploring Android Internals and Android Apps
PDF
Android Security - Common Security Pitfalls in Android Applications
PDF
Android Hacking
PDF
Brief Tour about Android Security
PPTX
Android sandbox
PDF
Смирнов Александр, Security in Android Application
PDF
Sperasoft talks: Android Security Threats
PDF
Android Security
PPTX
Android– forensics and security testing
PDF
Deep Dive Into Android Security
PPTX
[Wroclaw #1] Android Security Workshop
ODP
Android security in depth
PDF
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
PPTX
Understanding android security model
PDF
Android forensics (Manish Chasta)
PPTX
Android Security
PPTX
Permission in Android Security: Threats and solution
PPT
Bypassing the Android Permission Model
PPTX
Mobile security
PDF
Android Security Development
Android Forensics: Exploring Android Internals and Android Apps
Android Security - Common Security Pitfalls in Android Applications
Android Hacking
Brief Tour about Android Security
Android sandbox
Смирнов Александр, Security in Android Application
Sperasoft talks: Android Security Threats
Android Security
Android– forensics and security testing
Deep Dive Into Android Security
[Wroclaw #1] Android Security Workshop
Android security in depth
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Understanding android security model
Android forensics (Manish Chasta)
Android Security
Permission in Android Security: Threats and solution
Bypassing the Android Permission Model
Mobile security
Android Security Development

Viewers also liked (20)

PDF
Booting Android: bootloaders, fastboot and boot images
PDF
Hacking Android OS
PDF
Mobile Hacking
PPTX
Hacking ppt
PPTX
Hacking & its types
PDF
Computer Forensics
PDF
Active Https Cookie Stealing
PDF
Discovering Google Secrets
PDF
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
PDF
The art of android hacking
PPTX
password cracking and Key logger
PDF
Android OTA updates
PDF
Growth Hacking For Mobile - Hack 2 Validate & Hack 2 Grow
PDF
HTTP cookie hijacking in the wild: security and privacy implications
PDF
Cookies and browser exploits
PPTX
IRNSS by Sree Bhargava
PPT
Android booting sequece and setup and debugging
PPT
Learning AOSP - Android Booting Process
PPTX
PPT
Mobile phone Data Hacking
Booting Android: bootloaders, fastboot and boot images
Hacking Android OS
Mobile Hacking
Hacking ppt
Hacking & its types
Computer Forensics
Active Https Cookie Stealing
Discovering Google Secrets
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
The art of android hacking
password cracking and Key logger
Android OTA updates
Growth Hacking For Mobile - Hack 2 Validate & Hack 2 Grow
HTTP cookie hijacking in the wild: security and privacy implications
Cookies and browser exploits
IRNSS by Sree Bhargava
Android booting sequece and setup and debugging
Learning AOSP - Android Booting Process
Mobile phone Data Hacking

Similar to Stealing sensitive data from android phones the hacker way (20)

PPT
PDF
Getting started with Android pentesting
PPTX
Getting started with android
PDF
An brief introduction to android operating system
PPTX
Android technology
PPTX
Mobile Android and Network
PPTX
Top 10 Mobile Hacking Tools – 2025 Edition
PDF
Cc4201519521
PPT
Android 130923124440-phpapp01
PDF
Andriod Pentesting and Malware Analysis
PPTX
Android (Types, Feature,Application etc..)
PPTX
PDF
I haz you and pwn your maal whitepaper
PPTX
Outstanding Improvement Award Outstanding Improvement Award
PPT
Android
PPTX
MAD unit 1.pptxi 8hv8yv8cy8c8ycy8c8yv8uvyv
PPT
First Steps in Android
PDF
Android security
DOCX
Unit 1-android-and-its-tools-ass
PDF
Android Seminar BY Suleman Khan.pdf
Getting started with Android pentesting
Getting started with android
An brief introduction to android operating system
Android technology
Mobile Android and Network
Top 10 Mobile Hacking Tools – 2025 Edition
Cc4201519521
Android 130923124440-phpapp01
Andriod Pentesting and Malware Analysis
Android (Types, Feature,Application etc..)
I haz you and pwn your maal whitepaper
Outstanding Improvement Award Outstanding Improvement Award
Android
MAD unit 1.pptxi 8hv8yv8cy8c8ycy8c8yv8uvyv
First Steps in Android
Android security
Unit 1-android-and-its-tools-ass
Android Seminar BY Suleman Khan.pdf

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks

Recently uploaded (20)

PPTX
CHROMIUM & Glucose Tolerance Factor.pptx
PPTX
MMW-CHAPTER-1-final.pptx major Elementary Education
PDF
Health aspects of bilberry: A review on its general benefits
PDF
African Communication Research: A review
PDF
FAMILY PLANNING (preventative and social medicine pdf)
PDF
anganwadi services for the b.sc nursing and GNM
PPTX
4. Diagnosis and treatment planning in RPD.pptx
PDF
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
DOCX
THEORY AND PRACTICE ASSIGNMENT SEMESTER MAY 2025.docx
PPT
hemostasis and its significance, physiology
PDF
POM_Unit1_Notes.pdf Introduction to Management #mba #bba #bcom #bballb #class...
PPTX
Theoretical for class.pptxgshdhddhdhdhgd
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PDF
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
PPTX
IT infrastructure and emerging technologies
PDF
Physical pharmaceutics two in b pharmacy
PPTX
ACFE CERTIFICATION TRAINING ON LAW.pptx
PDF
Unleashing the Potential of the Cultural and creative industries
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PPTX
Diploma pharmaceutics notes..helps diploma students
CHROMIUM & Glucose Tolerance Factor.pptx
MMW-CHAPTER-1-final.pptx major Elementary Education
Health aspects of bilberry: A review on its general benefits
African Communication Research: A review
FAMILY PLANNING (preventative and social medicine pdf)
anganwadi services for the b.sc nursing and GNM
4. Diagnosis and treatment planning in RPD.pptx
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
THEORY AND PRACTICE ASSIGNMENT SEMESTER MAY 2025.docx
hemostasis and its significance, physiology
POM_Unit1_Notes.pdf Introduction to Management #mba #bba #bcom #bballb #class...
Theoretical for class.pptxgshdhddhdhdhgd
2025 High Blood Pressure Guideline Slide Set.pptx
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
IT infrastructure and emerging technologies
Physical pharmaceutics two in b pharmacy
ACFE CERTIFICATION TRAINING ON LAW.pptx
Unleashing the Potential of the Cultural and creative industries
faiz-khans about Radiotherapy Physics-02.pdf
Diploma pharmaceutics notes..helps diploma students

Stealing sensitive data from android phones the hacker way