The Art Of
Android Hacking
by, Abhinav Mishra (0ctac0der)
Who is this weird tall guy??
Abhinav Mishra | @0ctac0der
Senior Security Consultant @ TOTHENEW Digital
Top 5 Mobile Security Researcher | Synack Red Team (@SynackRedTeam)
Web and Mobile Application Security Researcher
Bug Bounty Hunter, Speaker, Trainer, Traveler, Movie buff
Have you seen “Mr. Robot” ? Any comments? Link
What is he talking about??
● Android application security
○ Android architecture
○ Application structure
○ Cool tools and distributions
○ Emulators, Devices, Attacks, Vulnerabilities …..
● What (& How) to look for in an android application
● Some interesting findings
● (Random talks)
● Cool demonstrations
● Next steps to learn android appsec
Que le jeu commence…..
Quick Questions
● What all you know about android…
● Application structure
● Vulnerability ?
Okay, my turn now
● What you want to know/learn?
● What you want me to demo?
● Any tool you love? We can talk….
Quick Android Walkthrough
● Linux Kernel
● Privilege separation Model
(UID & GID)
● Android Permission model
(android manifest)
● APK components:
○ AndroidManifest.xml
○ Classes.dex
○ META-INF
○ Resources.arsc
○ Assets
○ Res
○ Lib
Reversing a cute APK
Things I am going to do in next 10-15 minutes:
● Choose any apk
● Decompile with apktool | $apktool d package_name.apk
● Read and understand the AndroidManifest.xml
● Showing components in the code:
○ Activities, Broadcast receivers, Content providers ….
● Extract the apk with any extractor
● Change the classes.dex to jar | $dex2jar classes.dex
● Show multiple java classes
● Possible issues to be discovered
● SMALI files and converting to JAR
Tools & Demos
● Emulators???
○ Genymotion
○ Android Studio | AVD
● ADB (Android Debug Bridge)
○ $adb install
○ $ adb pull / push
● AppUse Virtual Machine
● Android Monitor / Logcat
● Application Local files
Drozer Basics
● Drozer client and server
● Setting up the console
● Basic commands:
○ $ run app.packer.list
○ $run app.package.info
○ $run app.package.attacksurface
○ $ run app.activity.start
15 min checks
1. Debuggable | Backup : True ???
2. AndroidManifest: Permissions
3. Hardcoded stuff
4. SSL Pinning ??
5. Drozer: attack surface | exported components
6. Local storage encryption
7. Sdcard storage | public folder usage
8. TLS protection check
Because Money matters
Vulnerability 1
Date: Mar-2014
Issue: Debuggable = True
Bounty: $500
How to check:
APK AndroidManifest.xml “debuggable=true”
Because Money matters
Vulnerability 2
Date: May-2015
Issue: App fragment injection
Bounty: $250
How to check:
Anyone?
Because Money matters
Vulnerability 3
Date: May-2015
Issue: Hardcoded Account Credentials
Bounty: $200
How to check:
Anyone?
Because Money matters
Vulnerability 4
Date: June-2015
Issue: Exported component malicious usage
Bounty: $1000
How to check:
Anyone?
Because Money matters
Vulnerability 5
Date: Oct-2015
Issue: Parameter manipulation
Bounty: $1000
How to check:
Let me explain this one to you.
My virtual machine (Droider)
Prerequisites
● 16 GB RAM
● Intel COREi7 processor
● 500 GB free hard disk space
● Minimum internet speed required 50 MBPS
● Google Nexus 7 device, rooted
What Next ….
● Learn more
● Read online
● Use tools: Drozer, QARK etc.
● Start practising

More Related Content

PDF
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
PDF
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
PDF
The art of android hacking
PPTX
Peerlyst Delhi NCR Chapter Meet
PDF
Web Security 101
PPTX
Case Study of Django: Web Frameworks that are Secure by Default
PDF
Neoito — Secure coding practices
PDF
Web Application Security with PHP
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
The art of android hacking
Peerlyst Delhi NCR Chapter Meet
Web Security 101
Case Study of Django: Web Frameworks that are Secure by Default
Neoito — Secure coding practices
Web Application Security with PHP

What's hot (20)

PPTX
Practical Cyber Attacking Tutorial
PPTX
[OWASP Poland Day] Application security - daily questions & answers
PDF
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
PDF
Hacking sites for fun and profit
PDF
Owasp for dummies handouts
 
ODP
Csrf not-all-defenses-are-created-equal
ODP
Introduction to OWASP & Web Application Security
PDF
Brute Force Attack
PPTX
Owasp for testing_mobile_apps_opd
PPS
Security In .Net Framework
PDF
My tryst with sourcecode review
PDF
Smart Sheriff, Dumb Idea, the wild west of government assisted parenting
PDF
Android Application Security from consumer and developer perspectives
PDF
When the internet bleeded : RootConf 2014
PPTX
.NET Security Topics
PPTX
Secure coding practices
PPTX
Recent Trends in Cyber Security
PDF
Developer's Guide to JavaScript and Web Cryptography
PDF
Empire Work shop
ODP
BSides Cleveland: Active Defense - Helping threat actors hack themselves!
Practical Cyber Attacking Tutorial
[OWASP Poland Day] Application security - daily questions & answers
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
Hacking sites for fun and profit
Owasp for dummies handouts
 
Csrf not-all-defenses-are-created-equal
Introduction to OWASP & Web Application Security
Brute Force Attack
Owasp for testing_mobile_apps_opd
Security In .Net Framework
My tryst with sourcecode review
Smart Sheriff, Dumb Idea, the wild west of government assisted parenting
Android Application Security from consumer and developer perspectives
When the internet bleeded : RootConf 2014
.NET Security Topics
Secure coding practices
Recent Trends in Cyber Security
Developer's Guide to JavaScript and Web Cryptography
Empire Work shop
BSides Cleveland: Active Defense - Helping threat actors hack themselves!

Viewers also liked (15)

PPTX
The Time Machine 2 Quiz (13/09/2014)
PPT
Change Management 13 things to consider
PDF
More about health
PPT
νεο λυκειο
DOCX
Curiculum vitae aciq
PDF
(2014 관측회) 점상촬영법
DOC
досвід людської особи
PPTX
ORIMARY DATA AND SECANDARY DATA
PPTX
Contoh Kajian Kes
PPT
νεο λυκειο
PDF
Better football
PPTX
Brigade panorama
PDF
Public-Private Roundtables at the Fourth Clean Energy Ministerial
PDF
Ormiston education
PPT
Vado bathroom acessories
The Time Machine 2 Quiz (13/09/2014)
Change Management 13 things to consider
More about health
νεο λυκειο
Curiculum vitae aciq
(2014 관측회) 점상촬영법
досвід людської особи
ORIMARY DATA AND SECANDARY DATA
Contoh Kajian Kes
νεο λυκειο
Better football
Brigade panorama
Public-Private Roundtables at the Fourth Clean Energy Ministerial
Ormiston education
Vado bathroom acessories

Similar to The art of android hacking by Abhinav Mishra (0ctac0der) (20)

PDF
Getting started with Android pentesting
PPTX
Getting started with android
PDF
Hacking your Android (slides)
PPTX
[Wroclaw #1] Android Security Workshop
PDF
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
PDF
Stealing sensitive data from android phones the hacker way
PDF
Android security and penetration testing | DIVA | Yogesh Ojha
PDF
CNIT 128 6. Analyzing Android Applications (Part 1)
PDF
Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
PPTX
Advanced Malware Analysis Training Session 8 - Introduction to Android
PPTX
Rapid Android Application Security Testing
PDF
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
PPTX
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
PPTX
Hacker Halted 2014 - Reverse Engineering the Android OS
PDF
Hacking your Droid (Aditya Gupta)
PDF
Android Security & Penetration Testing
PDF
Reading Group Presentation: Why Eve and Mallory Love Android
PDF
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
PPTX
Android village @nullcon 2012
PPTX
How to Test Security and Vulnerability of Your Android and iOS Apps
Getting started with Android pentesting
Getting started with android
Hacking your Android (slides)
[Wroclaw #1] Android Security Workshop
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
Stealing sensitive data from android phones the hacker way
Android security and penetration testing | DIVA | Yogesh Ojha
CNIT 128 6. Analyzing Android Applications (Part 1)
Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
Advanced Malware Analysis Training Session 8 - Introduction to Android
Rapid Android Application Security Testing
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Hacker Halted 2014 - Reverse Engineering the Android OS
Hacking your Droid (Aditya Gupta)
Android Security & Penetration Testing
Reading Group Presentation: Why Eve and Mallory Love Android
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
Android village @nullcon 2012
How to Test Security and Vulnerability of Your Android and iOS Apps

More from OWASP Delhi (20)

PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
PDF
Securing dns records from subdomain takeover
PDF
Effective Cyber Security Report Writing
PPTX
Data sniffing over Air Gap
PPTX
UDP Hunter
PDF
Demystifying Container Escapes
PPTX
Automating WAF using Terraform
PPTX
Actionable Threat Intelligence
PDF
Threat hunting 101 by Sandeep Singh
PPTX
Owasp top 10 vulnerabilities
PPTX
Recon with Nmap
PPTX
Securing AWS environments by Ankit Giri
PDF
DMARC Overview
PDF
Cloud assessments by :- Aakash Goel
PDF
Pentesting Rest API's by :- Gaurang Bhatnagar
ODP
Wireless security beyond password cracking by Mohit Ranjan
PDF
IETF's Role and Mandate in Internet Governance by Mohit Batra
PDF
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
PPTX
ICS Security 101 by Sandeep Singh
PDF
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Securing dns records from subdomain takeover
Effective Cyber Security Report Writing
Data sniffing over Air Gap
UDP Hunter
Demystifying Container Escapes
Automating WAF using Terraform
Actionable Threat Intelligence
Threat hunting 101 by Sandeep Singh
Owasp top 10 vulnerabilities
Recon with Nmap
Securing AWS environments by Ankit Giri
DMARC Overview
Cloud assessments by :- Aakash Goel
Pentesting Rest API's by :- Gaurang Bhatnagar
Wireless security beyond password cracking by Mohit Ranjan
IETF's Role and Mandate in Internet Governance by Mohit Batra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
ICS Security 101 by Sandeep Singh
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra

Recently uploaded (20)

PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
The AI Revolution in Customer Service - 2025
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Advancing precision in air quality forecasting through machine learning integ...
The AI Revolution in Customer Service - 2025
Training Program for knowledge in solar cell and solar industry
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Build automations faster and more reliably with UiPath ScreenPlay
SGT Report The Beast Plan and Cyberphysical Systems of Control
Ensemble model-based arrhythmia classification with local interpretable model...
Electrocardiogram sequences data analytics and classification using unsupervi...
MuleSoft-Compete-Deck for midddleware integrations
Data Virtualization in Action: Scaling APIs and Apps with FME
giants, standing on the shoulders of - by Daniel Stenberg
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Build Real-Time ML Apps with Python, Feast & NoSQL
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Connector Corner: Transform Unstructured Documents with Agentic Automation
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf

The art of android hacking by Abhinav Mishra (0ctac0der)

  • 1. The Art Of Android Hacking by, Abhinav Mishra (0ctac0der)
  • 2. Who is this weird tall guy?? Abhinav Mishra | @0ctac0der Senior Security Consultant @ TOTHENEW Digital Top 5 Mobile Security Researcher | Synack Red Team (@SynackRedTeam) Web and Mobile Application Security Researcher Bug Bounty Hunter, Speaker, Trainer, Traveler, Movie buff Have you seen “Mr. Robot” ? Any comments? Link
  • 3. What is he talking about?? ● Android application security ○ Android architecture ○ Application structure ○ Cool tools and distributions ○ Emulators, Devices, Attacks, Vulnerabilities ….. ● What (& How) to look for in an android application ● Some interesting findings ● (Random talks) ● Cool demonstrations ● Next steps to learn android appsec
  • 4. Que le jeu commence….. Quick Questions ● What all you know about android… ● Application structure ● Vulnerability ? Okay, my turn now ● What you want to know/learn? ● What you want me to demo? ● Any tool you love? We can talk….
  • 5. Quick Android Walkthrough ● Linux Kernel ● Privilege separation Model (UID & GID) ● Android Permission model (android manifest) ● APK components: ○ AndroidManifest.xml ○ Classes.dex ○ META-INF ○ Resources.arsc ○ Assets ○ Res ○ Lib
  • 6. Reversing a cute APK Things I am going to do in next 10-15 minutes: ● Choose any apk ● Decompile with apktool | $apktool d package_name.apk ● Read and understand the AndroidManifest.xml ● Showing components in the code: ○ Activities, Broadcast receivers, Content providers …. ● Extract the apk with any extractor ● Change the classes.dex to jar | $dex2jar classes.dex ● Show multiple java classes ● Possible issues to be discovered ● SMALI files and converting to JAR
  • 7. Tools & Demos ● Emulators??? ○ Genymotion ○ Android Studio | AVD ● ADB (Android Debug Bridge) ○ $adb install ○ $ adb pull / push ● AppUse Virtual Machine ● Android Monitor / Logcat ● Application Local files
  • 8. Drozer Basics ● Drozer client and server ● Setting up the console ● Basic commands: ○ $ run app.packer.list ○ $run app.package.info ○ $run app.package.attacksurface ○ $ run app.activity.start
  • 9. 15 min checks 1. Debuggable | Backup : True ??? 2. AndroidManifest: Permissions 3. Hardcoded stuff 4. SSL Pinning ?? 5. Drozer: attack surface | exported components 6. Local storage encryption 7. Sdcard storage | public folder usage 8. TLS protection check
  • 10. Because Money matters Vulnerability 1 Date: Mar-2014 Issue: Debuggable = True Bounty: $500 How to check: APK AndroidManifest.xml “debuggable=true”
  • 11. Because Money matters Vulnerability 2 Date: May-2015 Issue: App fragment injection Bounty: $250 How to check: Anyone?
  • 12. Because Money matters Vulnerability 3 Date: May-2015 Issue: Hardcoded Account Credentials Bounty: $200 How to check: Anyone?
  • 13. Because Money matters Vulnerability 4 Date: June-2015 Issue: Exported component malicious usage Bounty: $1000 How to check: Anyone?
  • 14. Because Money matters Vulnerability 5 Date: Oct-2015 Issue: Parameter manipulation Bounty: $1000 How to check: Let me explain this one to you.
  • 15. My virtual machine (Droider) Prerequisites ● 16 GB RAM ● Intel COREi7 processor ● 500 GB free hard disk space ● Minimum internet speed required 50 MBPS ● Google Nexus 7 device, rooted
  • 16. What Next …. ● Learn more ● Read online ● Use tools: Drozer, QARK etc. ● Start practising