Trainer: Aseem Jakhar and Anant Shrivastava
Training: Xtreme Android Hacking
Objective
Smartphones and tablets have become a must-have for everyone for personal as well as official use. As people have started utilizing these devices to frequently access the Internet, read important documents, carry out financial transactions and so on and so forth, the bad guys have realized the shift and have started to focus on exploiting these platforms for their gains. There has been a lot of advancement in mobile malware and exploitation.
These devices are computers running various operating systems and packed up with hardware for telephony and wifi. There are numerous applications available for these platforms which can be freely downloaded over the internet and used.
Xtreme Android Hacking training takes up one of the finest operating system used for these devices a.k.a Android and tears it apart. As the name suggests the training takes a deep dive into all the components of Android OS starting right from the OS architecture, ARM assembly, shellcoding, hacking system components, security model, android apps to penetration testing, reverse engineering and malware analysis. Xtreme Android Hacking is specifically designed to have more hands-on and exercises for the trainees to grasp the intrinsic technical details of the Android system, Android applications and the respective vulnerabilities. The trainers have designed and developed an open source, customized distribution for android development and security testing known as Android Tamer which is also provided with the training material and a walkthrough on using Android Tamer is also taken up during the training to make the trainees familiar with the distribution. The training provides a base to the trainees to develop security research expertise on the Android platform way beyond the conventional application security testing skills.
Introduction to Android
-
What is Android?
-
The system architecture
-
The application model
-
The security model
-
Custom ROMs
-
ADB
-
Getting the Android source
-
Setting up the environment
Introduction to Android Tamer
-
Overview
-
Proxies
-
Analysis Tools
-
Simulator
-
Traffic interception
-
Application analysis
System Architecture
-
The Linux lineage
-
File system and hierarchy
-
Radio Interface Layer
Application Architecture
-
Dalvik/Zygote
-
Application components
-
Android SDK, NDK and tools
-
Hello World Application development hands-on
Android ARM Assembly primer
-
ARM overview
-
Instruction set
-
Stack implementation
-
Addressing modes
-
Subroutine calling convention
-
Syscall calling convention
-
Android assembly tools
-
Hello World assembly program hands-on
-
Shellcode basics
-
Shellcoding hands-on
-
Exercises
Android Security Architecture
-
Kernel protection
-
File system based protection
-
Application Sandboxing
-
Permissions
Penetration Testing
-
Overview
-
Setting up the penetration testing environment
-
Black Box penetration testing
-
Mapping OWASP Mobile Top Ten to Android
-
Data / Activity Sniffing
-
Unauthorized access to telephony layer (dialing, sms etc)
-
Unauthorized network access
-
Unsafe Data at transit / rest (XML / SQlite)
-
Hardcoded values Password / key / salt Untrusted inputs / intents
-
Data leakage Side channel
-
Information Disclosure
-
Logic / Time Bomb
-
UI impersonation
-
Rooting
-
Application Security update cycles
-
OS level security updates
-
HTML 5 attacks
-
SQLi
-
Click / Tap jacking
-
Playing with Javascript
-
Real world application vulnerabilities
-
Sample application vulnerabilities and exercises
Malware Analysis and Reverse Engineering
-
Reverse engineering applications and binaries
-
In-the-wild exploit case studies
-
Malware motivation and techniques
-
Common malware samples
-
Malware analysis exercises
-
Malware detection, prevention and cure
Who Should Attend?
-
Information security professionals
-
Security researchers and penetration testers
-
Anyone with interest in Android security
-
Android developers/QA
Prerequisites
-
Basic Linux knowledge
-
Programming, assembly knowledge will be a plus although not specifically required.
-
Passion to learn Android security
What to bring?
-
Bring your own laptop
-
10-15 GB free hard disk space
-
Vmplayer/VirtualBox installed on the system
What to expect?
-
Interactive hands-on training session
-
Code analysis, trial and errors
-
Getting familiar with the Android platform
What not to expect?
- Becoming an Android hacker overnight. Use the knowledge gained and research further to master the platform.
About the trainers
Aseem Jakhar
Aseem is the chief researcher at Payatu Technologies Pvt Ltd http://payatu.com with extensive experience in system programming, security research, consulting and managing security software development projects. He has worked on various security software including IBM ISS Proventia UTM appliance, Mirapoint messaging/security appliance, anti-spam engine, anti-virus software, multicast packet reflector, Transparent HTTPS proxy with captive portal, bayesian spam filter to name a few. He is an active speaker at security and open source conferences; some of the conferences he has spoken at include Defcon, Hack.lu, Blackhat, Xcon, Cyber security summit, Cocon, OSI Days, Clubhack, Gnunify. His research includes Linux remote thread injection, automated web application detection and dynamic web filter. He is the author of open source Linux thread injection kit - Jugaad which demonstrates a stealthy malware infection technique. He is well known in the hacking and security community as the founder of null - The open security community, registered not-for-profit organization http://null.community , the largest security community in India and the founder of nullcon Security conference http://nullcon.net . The focus and mission of null is advanced security research, sharing information, responsible vulnerability disclosure and assisting Govt./private organizations with security issues.
Anant Shrivastava
He holds a GWAPT, CEH and RHCE. He has been speaker at various conferences like Nullcon, c0c0n, Clubhack, his talks are focused on android. He is the author of open source distribution - Android Tamer for android security professionals. Active member of Null, Garage4Hackers. His expertise remains in Linux, Web Applications (Dev and security testing) and Mobile devices (OS and Application) Security.