SlideShare a Scribd company logo
Testing Android Security
José Manuel Ortega
@jmortegac
AMSTERDAM 11-12 MAY 2016
https://speakerdeck.com/jmortega
http://jmortega.github.io
AGENDA
▪ Development Cycle
▪ Static and Dynamic Analysis
▪ Components Security
▪ Hybrid Automatic tools
▪ Best Practices & OWASP
DEVELOPMENT CYCLE
WHITE BOX /BLACK BOX
✓
✓
✓
✓
✓
✓
TESTING ANDROID SECURITY
FORENSICS
FORENSICS
▪
▪
▪
▪
▪
▪
STATIC ANALYSIS
✓
✓
✓
✓
✓
✓
✓
CODE REVIEW / SOURCE CODE ANALYSIS
ANDROID LINT
ANDROID STUDIO INSPECT CODE
ANDROID SONAR PLUGIN
ANDROID SONAR PLUGIN >RULES
SONAR SECURITY
ANDROWARN
QARK
▪ Quick Android Review Kit
▪ https://github.com/linkedin/qark
▪ Static code analysis tool
▪ Look for potential vulnerabilities
QARK
▪ Identifies permissions and exported components
(activities,services..) on Manifest
▪ Looks for WORLD_READABLE and
WORLD_WRITABLE files
▪ Looks for X.509 certificates validation issues
QARK
QARK REPORT
REVERSE ENGINEERING
▪ Decompile dalvik to smali
▪ classes.dex in APK
▪ APKTOOL
▪ DEX2JAR
▪ Java Decompiler
APK STRUCTURE
DISASSEMBLY AND DECOMPILATION
JADX-GUI
APKTOOL
DYNAMIC ANALYSIS TOOLS
WIRESHARK
BURP SUITE
▪ Intercepting network traffic
▪ HTTP proxy tool
▪ Able to intercept layer traffic and allows users to
manipulate the HTTP request and response
DROZER
▪ https://labs.mwrinfosecurity.com/tools/drozer/
▪ Find vulnerabilities automatically
▪ Automate security testing
▪ Interact with your Apps with debugging
disabled
INSIDE DROZER
DROZER
DROZER PACKAGE INFO
▪ app.package.info
DROZER COMMANDS
DROZER CONTENT PROVIDERS
FINDING SQL INJECTION IN CONTENT PROVIDERS
EXPLOITING SQL INJECTION VULNERABILITY
ANDROID MANIFEST
android:debuggable=true
android:exported=true
ANDROID MANIFEST EXPORTED ATTRIBUTE
…
…
…
COMPONENTS SECURITY
▪ AndroidManifest.xml
▪ Activities
▪ Content Providers
▪ Services
▪ Shared Preferences
▪ Webview
LOG INFORMATION
public static final boolean SHOW_LOG =
BuildConfig.DEBUG;
public static void d(final String tag, final String
msg) {
if (SHOW_LOG)
Log.d(tag, msg);
}
THRID PARTY LIBRARIES
VULNERABILITIES IN CORDOVA 3.5
SECURITY IN CONTENT PROVIDERS
▪ Components provide a standardized interface
for sharing data between applications
▪ URI addressing scheme
▪ Can perform queries equivalent to SELECT,
UPDATE,INSERT, DELETE
SQLCIPHER
▪ SQLCipher is a SQL extension that provides
transparent AES encryption of database files
▪ 256-bit AES Encrypt SQLite database
▪ http://sqlcipher.net/sqlcipher-for-android
SECURED PREFERENCES
▪ https://github.com/scottyab/secure-preferences
▪ Encrypt your app’s shared preferences
▪ Android Share Preferences wrapper that
provides encryption for keys and values
SECURED PREFERENCES
DATA STORAGE
PROTECTING DATA FILES
SECURE COMMUNICATIONS
▪ Ensure that all sensitive data is encrypted
▪ Certificate pinning for avoid MITM attacks
CERTIFICATES
SSLSocketFactory.ALLOW_ALLHOSTNAME_VERIFIER
TrustManager where checkServerTrusted() always
returns true
CERTIFICATE PINNING
X.509 CERTIFICATES
HTTPS Connection
HTTPS Connection
ENCRYPT NETWORK REQUESTS
▪ Best practice is to always encrypt network
communications
▪ HTTPS and SSL can protect against MitM attacks
and prevent casual sniffing traffic.
▪ Server certificate validity is checked by default
VALIDATE SERVER CERTIFICATE
▪ https://www.ssllabs.com/ssltest
CHECK CERTIFICATES TOOLS
▪ OpenSSL
▪ Keytool
▪ Jarsigner
Runtime Permissions
▪ All permissions granted at install time
▪ Dangerous permissions require user
confirmation
▪ Prompt for dangerous permissions at
runtime
▪ Granted/revoked by permission group
▪ Managed per app, per user
▪ /data/system/users/0/runtime-permissions.xml
Group permissions on Android M
Permissions FLOW on Android M
Permissions on Android M
Permissions on Android M
OBFUSCATION
▪ The obfuscator can use several techniques to protect
a Java/Android application:
▪ change names of classes, methods, fields
▪ modify the control flow
▪ code optimization
▪ dynamic code loading
▪ change instructions with metamorphic technique
PROGUARD
▪ File shrinker: detects and removes unused
classes, fields, methods,and attributes
▪ Optimizer: optimizes bytecode and removes
unused instructions
▪ Obfuscator: renames classes, fields, and
methods using short meaningless names
OBFUSCATION WITH PROGUARD
OBFUSCATION WITH PROGUARD
HYBRID AUTOMATIC ONLINE TOOLS
▪ SandDroid
▪ ApkScan
▪ Visual Threat
▪ TraceDroid
▪ CopperDroid
▪ APK Analyzer
▪ ForeSafe
▪ AndroTotal
▪ NowSecure Lab
VULNERABILTIY ANALYSIS
HYBRID AUTOMATIC ONLINE TOOLS
▪ http://sanddroid.xjtu.edu.cn/#home
SANDROID
SANDROID
TRACEDROID
NOWSECURE LAB
NOWSECURE LAB
NOWSECURE LAB
BEST PRACTICES
▪ Don’t hardcode sensitive information
▪ Don’t store sensitive information
▪ Don’t store at easily readable location like
memory card
▪ Encrypt the stored data
▪ Implement SSL
BEST PRACTICES
▪ Protect the webserver against application layer
attacks
▪ Prefer encryption over encoding or obfuscation
▪ Sanitize inputs, use prepared statements
(protection against sql injection)
BEST PRACTICES
Android Secure Coding Checklist
▪ Use least privilege in request permissions
▪ Don’t unnecessarily export components
▪ Handle intents carefully
▪ Justify any custom permissions
▪ Mutually authenticate services
▪ Use APIs to construct ContentProvider URIs
▪ Use HTTPS
▪ Follow best practices from OWASP project http://owasp.
org/index.php/OWASP_Mobile_Security_Project
OWASP MOBILE TOP 10 RISKS
OWASP MOBILE TOP 10 RISKS
Open Android Security Assesment Methodology
PENTESTING TOOLS / SANTOKU LINUX
o
o
o
PENTESTING TOOLS / NOWSECURE
▪ https://www.nowsecure.com/resources/freetools/
REFERENCES
▪ http://proguard.sourceforge.net
▪ http://code.google.com/p/dex2jar
▪ http://code.google.com/p/android-apktool
▪ https://labs.mwrinfosecurity.com/tools/drozer
▪ http://sqlcipher.net/sqlcipher-for-android
▪ https://www.owasp.org/index.
php/OWASP_Mobile_Security_Project
▪ https://developer.android.
com/training/articles/security-tips.html
BOOKS
BOOKS
Thanks!
@jmortegac
AMSTERDAM 9-12 MAY 2016

More Related Content

What's hot (20)

PDF
The Hookshot: Runtime Exploitation
Prathan Phongthiproek
 
PDF
David Thiel - Secure Development On iOS
Source Conference
 
PPTX
[OWASP Poland Day] Saving private token
OWASP
 
PDF
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP
 
PDF
Subgraph vega countermeasure2012
David Mirza
 
PDF
HackFest 2015 - Rasp vs waf
IMMUNIO
 
PDF
Neoito — Secure coding practices
Neoito
 
PDF
[OPD 2019] Top 10 Security Facts of 2020
OWASP
 
PDF
Javacro 2014 Spring Security 3 Speech
Fernando Redondo Ramírez
 
PDF
[OWASP Poland Day] A study of Electron security
OWASP
 
PDF
Android application security testing
Mykhailo Antonishyn
 
PPTX
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
OWASP
 
PDF
Abusing & Securing XPC in macOS apps
SecuRing
 
PDF
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
SecuRing
 
PDF
Hunting for security bugs in AEM webapps
Mikhail Egorov
 
PDF
Applications secure by default
SecuRing
 
PDF
[Wroclaw #7] Why So Serial?
OWASP
 
PDF
Spring Framework - Spring Security
Dzmitry Naskou
 
PDF
[OWASP Poland Day] Web App Security Architectures
OWASP
 
PDF
Android pentesting
Mykhailo Antonishyn
 
The Hookshot: Runtime Exploitation
Prathan Phongthiproek
 
David Thiel - Secure Development On iOS
Source Conference
 
[OWASP Poland Day] Saving private token
OWASP
 
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP
 
Subgraph vega countermeasure2012
David Mirza
 
HackFest 2015 - Rasp vs waf
IMMUNIO
 
Neoito — Secure coding practices
Neoito
 
[OPD 2019] Top 10 Security Facts of 2020
OWASP
 
Javacro 2014 Spring Security 3 Speech
Fernando Redondo Ramírez
 
[OWASP Poland Day] A study of Electron security
OWASP
 
Android application security testing
Mykhailo Antonishyn
 
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
OWASP
 
Abusing & Securing XPC in macOS apps
SecuRing
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
SecuRing
 
Hunting for security bugs in AEM webapps
Mikhail Egorov
 
Applications secure by default
SecuRing
 
[Wroclaw #7] Why So Serial?
OWASP
 
Spring Framework - Spring Security
Dzmitry Naskou
 
[OWASP Poland Day] Web App Security Architectures
OWASP
 
Android pentesting
Mykhailo Antonishyn
 

Viewers also liked (20)

PDF
Deep Dive Into Android Security
Marakana Inc.
 
PPTX
Understanding android security model
Pragati Rai
 
PDF
Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...
Cheng-Yi Yu
 
PPTX
Permission in Android Security: Threats and solution
Tandhy Simanjuntak
 
PDF
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthinkspa
 
PDF
2015.04.24 Updated > Android Security Development - Part 1: App Development
Cheng-Yi Yu
 
PPTX
Android sandbox
Anusha Chavan
 
PDF
Brief Tour about Android Security
National Cheng Kung University
 
PDF
Android Security Development
hackstuff
 
PDF
Android Security
Lars Jacobs
 
PPTX
Android security
Midhun P Gopi
 
PDF
Testing Android Security
Jose Manuel Ortega Candel
 
PDF
How To Improve Your Product Testing Program
The DRG (The Dieringer Research Group)
 
PPTX
Product Testing and Refinement
Chris Cera
 
PDF
How to Analyze an Android Bot
Priyanka Aash
 
PPTX
Presentation
sangeethaprofessor
 
PDF
Product testing methodology & how to conduct a product test
VINAMR - Vietnam Marketing Research & Consultants
 
PPTX
Using Git/Gerrit and Jenkins to Manage the Code Review Processord
Marc Karasek
 
PDF
Google android security_2015_report_final
Andrey Apuhtin
 
PDF
A guide to Android automated testing
jotaemepereira
 
Deep Dive Into Android Security
Marakana Inc.
 
Understanding android security model
Pragati Rai
 
Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...
Cheng-Yi Yu
 
Permission in Android Security: Threats and solution
Tandhy Simanjuntak
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthinkspa
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
Cheng-Yi Yu
 
Android sandbox
Anusha Chavan
 
Brief Tour about Android Security
National Cheng Kung University
 
Android Security Development
hackstuff
 
Android Security
Lars Jacobs
 
Android security
Midhun P Gopi
 
Testing Android Security
Jose Manuel Ortega Candel
 
How To Improve Your Product Testing Program
The DRG (The Dieringer Research Group)
 
Product Testing and Refinement
Chris Cera
 
How to Analyze an Android Bot
Priyanka Aash
 
Presentation
sangeethaprofessor
 
Product testing methodology & how to conduct a product test
VINAMR - Vietnam Marketing Research & Consultants
 
Using Git/Gerrit and Jenkins to Manage the Code Review Processord
Marc Karasek
 
Google android security_2015_report_final
Andrey Apuhtin
 
A guide to Android automated testing
jotaemepereira
 
Ad

Similar to Testing Android Security Codemotion Amsterdam edition (20)

PPTX
Security testing of mobile applications
GTestClub
 
PPTX
Untitled 1
Sergey Kochergan
 
PPTX
[Wroclaw #1] Android Security Workshop
OWASP
 
PDF
Attacking and Defending Mobile Applications
Jerod Brennen
 
PDF
Security testing in mobile applications
Jose Manuel Ortega Candel
 
PDF
Reading Group Presentation: Why Eve and Mallory Love Android
Michael Rushanan
 
PPTX
Android security
Mobile Rtpl
 
PDF
Getting started with Android pentesting
Minali Arora
 
PPTX
Getting started with android
Vandana Verma
 
PDF
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
Abhinav Mishra
 
PPTX
Mobile security
priyanka pandey
 
PDF
Introduction to Android Development and Security
Kelwin Yang
 
PPTX
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Romansh Yadav
 
PDF
Denis Zhuchinski Ways of enhancing application security
Аліна Шепшелей
 
PDF
SE2016 Android Denis Zhuchinski "Ways of enhancing application security"
Inhacking
 
PPTX
Android Security
Arqum Ahmad
 
PDF
Android security and penetration testing | DIVA | Yogesh Ojha
Yogesh Ojha
 
PDF
How to make Android apps secure: dos and don’ts
NowSecure
 
PPTX
Android Application Penetration Testing - Mohammed Adam
Mohammed Adam
 
PDF
Android Pentesting
n|u - The Open Security Community
 
Security testing of mobile applications
GTestClub
 
Untitled 1
Sergey Kochergan
 
[Wroclaw #1] Android Security Workshop
OWASP
 
Attacking and Defending Mobile Applications
Jerod Brennen
 
Security testing in mobile applications
Jose Manuel Ortega Candel
 
Reading Group Presentation: Why Eve and Mallory Love Android
Michael Rushanan
 
Android security
Mobile Rtpl
 
Getting started with Android pentesting
Minali Arora
 
Getting started with android
Vandana Verma
 
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
Abhinav Mishra
 
Mobile security
priyanka pandey
 
Introduction to Android Development and Security
Kelwin Yang
 
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Romansh Yadav
 
Denis Zhuchinski Ways of enhancing application security
Аліна Шепшелей
 
SE2016 Android Denis Zhuchinski "Ways of enhancing application security"
Inhacking
 
Android Security
Arqum Ahmad
 
Android security and penetration testing | DIVA | Yogesh Ojha
Yogesh Ojha
 
How to make Android apps secure: dos and don’ts
NowSecure
 
Android Application Penetration Testing - Mohammed Adam
Mohammed Adam
 
Ad

More from Jose Manuel Ortega Candel (20)

PDF
Seguridad y auditorías en Modelos grandes del lenguaje (LLM).pdf
Jose Manuel Ortega Candel
 
PDF
Beyond the hype: The reality of AI security.pdf
Jose Manuel Ortega Candel
 
PDF
Seguridad de APIs en Drupal_ herramientas, mejores prácticas y estrategias pa...
Jose Manuel Ortega Candel
 
PDF
Security and auditing tools in Large Language Models (LLM).pdf
Jose Manuel Ortega Candel
 
PDF
Herramientas de benchmarks para evaluar el rendimiento en máquinas y aplicaci...
Jose Manuel Ortega Candel
 
PDF
Asegurando tus APIs Explorando el OWASP Top 10 de Seguridad en APIs.pdf
Jose Manuel Ortega Candel
 
PDF
PyGoat Analizando la seguridad en aplicaciones Django.pdf
Jose Manuel Ortega Candel
 
PDF
Ciberseguridad en Blockchain y Smart Contracts: Explorando los Desafíos y Sol...
Jose Manuel Ortega Candel
 
PDF
Evolution of security strategies in K8s environments- All day devops
Jose Manuel Ortega Candel
 
PDF
Evolution of security strategies in K8s environments.pdf
Jose Manuel Ortega Candel
 
PDF
Implementing Observability for Kubernetes.pdf
Jose Manuel Ortega Candel
 
PDF
Computación distribuida usando Python
Jose Manuel Ortega Candel
 
PDF
Seguridad en arquitecturas serverless y entornos cloud
Jose Manuel Ortega Candel
 
PDF
Construyendo arquitecturas zero trust sobre entornos cloud
Jose Manuel Ortega Candel
 
PDF
Tips and tricks for data science projects with Python
Jose Manuel Ortega Candel
 
PDF
Sharing secret keys in Docker containers and K8s
Jose Manuel Ortega Candel
 
PDF
Implementing cert-manager in K8s
Jose Manuel Ortega Candel
 
PDF
Python para equipos de ciberseguridad(pycones)
Jose Manuel Ortega Candel
 
PDF
Python para equipos de ciberseguridad
Jose Manuel Ortega Candel
 
PDF
Shodan Tips and tricks. Automatiza y maximiza las búsquedas shodan
Jose Manuel Ortega Candel
 
Seguridad y auditorías en Modelos grandes del lenguaje (LLM).pdf
Jose Manuel Ortega Candel
 
Beyond the hype: The reality of AI security.pdf
Jose Manuel Ortega Candel
 
Seguridad de APIs en Drupal_ herramientas, mejores prácticas y estrategias pa...
Jose Manuel Ortega Candel
 
Security and auditing tools in Large Language Models (LLM).pdf
Jose Manuel Ortega Candel
 
Herramientas de benchmarks para evaluar el rendimiento en máquinas y aplicaci...
Jose Manuel Ortega Candel
 
Asegurando tus APIs Explorando el OWASP Top 10 de Seguridad en APIs.pdf
Jose Manuel Ortega Candel
 
PyGoat Analizando la seguridad en aplicaciones Django.pdf
Jose Manuel Ortega Candel
 
Ciberseguridad en Blockchain y Smart Contracts: Explorando los Desafíos y Sol...
Jose Manuel Ortega Candel
 
Evolution of security strategies in K8s environments- All day devops
Jose Manuel Ortega Candel
 
Evolution of security strategies in K8s environments.pdf
Jose Manuel Ortega Candel
 
Implementing Observability for Kubernetes.pdf
Jose Manuel Ortega Candel
 
Computación distribuida usando Python
Jose Manuel Ortega Candel
 
Seguridad en arquitecturas serverless y entornos cloud
Jose Manuel Ortega Candel
 
Construyendo arquitecturas zero trust sobre entornos cloud
Jose Manuel Ortega Candel
 
Tips and tricks for data science projects with Python
Jose Manuel Ortega Candel
 
Sharing secret keys in Docker containers and K8s
Jose Manuel Ortega Candel
 
Implementing cert-manager in K8s
Jose Manuel Ortega Candel
 
Python para equipos de ciberseguridad(pycones)
Jose Manuel Ortega Candel
 
Python para equipos de ciberseguridad
Jose Manuel Ortega Candel
 
Shodan Tips and tricks. Automatiza y maximiza las búsquedas shodan
Jose Manuel Ortega Candel
 

Recently uploaded (20)

PPTX
Mastering ODC + Okta Configuration - Chennai OSUG
HathiMaryA
 
PPTX
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
PPTX
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
PPT
Ericsson LTE presentation SEMINAR 2010.ppt
npat3
 
PDF
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
PDF
SIZING YOUR AIR CONDITIONER---A PRACTICAL GUIDE.pdf
Muhammad Rizwan Akram
 
PDF
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
PDF
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
DOCX
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
Staying Human in a Machine- Accelerated World
Catalin Jora
 
PDF
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
PDF
Kit-Works Team Study_20250627_한달만에만든사내서비스키링(양다윗).pdf
Wonjun Hwang
 
PDF
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Mastering ODC + Okta Configuration - Chennai OSUG
HathiMaryA
 
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
Ericsson LTE presentation SEMINAR 2010.ppt
npat3
 
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
SIZING YOUR AIR CONDITIONER---A PRACTICAL GUIDE.pdf
Muhammad Rizwan Akram
 
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Staying Human in a Machine- Accelerated World
Catalin Jora
 
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
Kit-Works Team Study_20250627_한달만에만든사내서비스키링(양다윗).pdf
Wonjun Hwang
 
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 

Testing Android Security Codemotion Amsterdam edition