Deep Dive Android Cocon

c0c0n 2013 Goa, India
1 / 83
Slide 1 of Deep Dive Android Cocon
Slide 2 of Deep Dive Android Cocon
Slide 3 of Deep Dive Android Cocon
Slide 4 of Deep Dive Android Cocon
Slide 5 of Deep Dive Android Cocon
Slide 6 of Deep Dive Android Cocon
Slide 7 of Deep Dive Android Cocon
Slide 8 of Deep Dive Android Cocon
Slide 9 of Deep Dive Android Cocon
Slide 10 of Deep Dive Android Cocon
Slide 11 of Deep Dive Android Cocon
Slide 12 of Deep Dive Android Cocon
Slide 13 of Deep Dive Android Cocon
Slide 14 of Deep Dive Android Cocon
Slide 15 of Deep Dive Android Cocon
Slide 16 of Deep Dive Android Cocon
Slide 17 of Deep Dive Android Cocon
Slide 18 of Deep Dive Android Cocon
Slide 19 of Deep Dive Android Cocon
Slide 20 of Deep Dive Android Cocon
Slide 21 of Deep Dive Android Cocon
Slide 22 of Deep Dive Android Cocon
Slide 23 of Deep Dive Android Cocon
Slide 24 of Deep Dive Android Cocon
Slide 25 of Deep Dive Android Cocon
Slide 26 of Deep Dive Android Cocon
Slide 27 of Deep Dive Android Cocon
Slide 28 of Deep Dive Android Cocon
Slide 29 of Deep Dive Android Cocon
Slide 30 of Deep Dive Android Cocon
Slide 31 of Deep Dive Android Cocon
Slide 32 of Deep Dive Android Cocon
Slide 33 of Deep Dive Android Cocon
Slide 34 of Deep Dive Android Cocon
Slide 35 of Deep Dive Android Cocon
Slide 36 of Deep Dive Android Cocon
Slide 37 of Deep Dive Android Cocon
Slide 38 of Deep Dive Android Cocon
Slide 39 of Deep Dive Android Cocon
Slide 40 of Deep Dive Android Cocon
Slide 41 of Deep Dive Android Cocon
Slide 42 of Deep Dive Android Cocon
Slide 43 of Deep Dive Android Cocon
Slide 44 of Deep Dive Android Cocon
Slide 45 of Deep Dive Android Cocon
Slide 46 of Deep Dive Android Cocon
Slide 47 of Deep Dive Android Cocon
Slide 48 of Deep Dive Android Cocon
Slide 49 of Deep Dive Android Cocon
Slide 50 of Deep Dive Android Cocon
Slide 51 of Deep Dive Android Cocon
Slide 52 of Deep Dive Android Cocon
Slide 53 of Deep Dive Android Cocon
Slide 54 of Deep Dive Android Cocon
Slide 55 of Deep Dive Android Cocon
Slide 56 of Deep Dive Android Cocon
Slide 57 of Deep Dive Android Cocon
Slide 58 of Deep Dive Android Cocon
Slide 59 of Deep Dive Android Cocon
Slide 60 of Deep Dive Android Cocon
Slide 61 of Deep Dive Android Cocon
Slide 62 of Deep Dive Android Cocon
Slide 63 of Deep Dive Android Cocon
Slide 64 of Deep Dive Android Cocon
Slide 65 of Deep Dive Android Cocon
Slide 66 of Deep Dive Android Cocon
Slide 67 of Deep Dive Android Cocon
Slide 68 of Deep Dive Android Cocon
Slide 69 of Deep Dive Android Cocon
Slide 70 of Deep Dive Android Cocon
Slide 71 of Deep Dive Android Cocon
Slide 72 of Deep Dive Android Cocon
Slide 73 of Deep Dive Android Cocon
Slide 74 of Deep Dive Android Cocon
Slide 75 of Deep Dive Android Cocon
Slide 76 of Deep Dive Android Cocon
Slide 77 of Deep Dive Android Cocon
Slide 78 of Deep Dive Android Cocon
Slide 79 of Deep Dive Android Cocon
Slide 80 of Deep Dive Android Cocon
Slide 81 of Deep Dive Android Cocon
Slide 82 of Deep Dive Android Cocon
Slide 83 of Deep Dive Android Cocon

Abstract

A deep dive training into Android security covering platform architecture, application development, the Android Tamer toolkit, mobile security vulnerabilities, and hands-on penetration testing.

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This comprehensive training workshop at c0c0n 2013 provides a deep dive into Android security, covering the platform architecture, application development, Android Tamer toolkit, mobile security issues, penetration testing methodology, and using Android devices as pentesting platforms.

Key Topics Covered

Android Platform Overview:

  • 56% smartphone market share (Gartner May 2012), open source, minimal developer license cost ($25)
  • Architecture: Linux kernel (merged back to mainstream in 3.4), C middleware, Java framework, Dalvik VM
  • Key partitions: /system (OS, yaffs2/ext3/4), /data (user data), /sdcard (vfat for PC compatibility)

Security Model:

  • Unix permission-based restrictions with SELinux (4.3 onwards, permissive; enforced in 4.4)
  • Application sandboxing with unique UIDs per app
  • Permission model requiring first-time approval
  • AppOps (hidden feature) for fine-tuning permission control

Application Architecture:

  • Dalvik Virtual Machine: register-based (vs. Java’s stack-based), optimized for memory and performance constraints
  • DEX format: multiple classes per file, shared type-specific constant pools for minimal memory footprint
  • Zygote process: boots at startup, initializes core libraries, forks new VM instances for each app
  • Components: Activities (UI), Services (background), Intents (IPC), Content Providers (data sharing)
  • AndroidManifest.xml: permissions, intents, SDK versions, features, receivers

Android Tamer Toolkit (v2):

  • VM/Live ISO/Installable environment focused on Android security (first launched ClubHack 2011)
  • Based on Ubuntu 12.04 / Linux Mint 13 (supported till 2017)
  • Tools: ROM kitchen, flashing utilities, rooting kits, Eclipse + ADT + SDK + NDK, OWASP ZAP, Burp, Firefox pentest plugins, w3af, Drozer/Mercury, Androguard, Dex2Jar, JD-GUI, APKtool, Baksmali/Smali, Wireshark, AF Logical OSE, Sleuthkit, Security Compass Lab, Paladian Lab

Mobile Security Issues:

  • Data/activity sniffing (SMS, audio, video, location, contacts, browsing history)
  • Unauthorized telephony access (premium SMS/calls, USSD purchases)
  • Unsafe data in transit (HTTP, FTP, unsigned XML) and at rest (SQLite, XML)
  • Hardcoded values (DB connection strings, API keys)
  • Side-channel data leakage through cache, temp files
  • Information disclosure via reverse engineering
  • Logic/time bombs, UI impersonation, rooting vulnerabilities
  • SQL injection on backend servers, click/tap jacking, JavaScript attacks

Pentesting Methodology:

  • Static analysis: APK reverse engineering via Dex2jar + JD-GUI/JAD, Smali, APKtool
  • Network traffic interception: Proxy configuration for emulator/device, SSL certificate import for intercepting HTTPS
  • IPTables-based per-app traffic interception using Android’s per-app unique UIDs
  • Device-level tests: /data/data inspection, sdcard content, filesystem change analysis
  • Backend scanning: nmap, w3af, nikto on identified backend servers
  • Pentesting frameworks: Drozer, AFE, Smartphone Pentest Framework

Pentesting Through Android:

  • Mobile tools: DroidSheep, Dsploit, Interceptor, Network Discovery, Shark, zAnti
  • Scripting environment: SL4A with Python (Py4a), Perl (Pl4a)
  • Custom tool development: brute force attacks, task automation, WordPress enumeration

Actionable Takeaways

  1. Android pentesting requires understanding both the platform internals and application layer
  2. Static analysis through decompilation reveals hardcoded secrets and business logic
  3. SSL certificate installation is essential for intercepting encrypted application traffic
  4. IPTables enables granular per-application network interception on rooted devices
  5. Android devices themselves can serve as portable pentesting platforms with scripting frameworks

Embed This Presentation

See Also

mobile android tamer