SlideShare a Scribd company logo
Android Security
A Hacker Perspective
Reversing.ID
Komunitas Reverse Engineering Indonesia
Hi!
I am Satria Ady Pradana
Cyber Security
Consultant
@
Mitra Integrasi
Informatika
xathrya.sabertooth
@xathrya
Reversing.ID
Komunitas Reverse Engineering Indonesia
1.
Define Security!
“
Security is a process, not a
product.
Growth of
Technology
The Past and Present
 Back then, only few people or organizations can
afford it. Now everyone can.
 Everything has their electronic or digital equivalent.
 Used by companies, government, military, or
individuals to replace the manual works.
 Nearly every aspect of our life has been affected by
technology.
 Things getting smarter.
 Reduces in size.
 More connected than before.
Cyberspace
Around You
It’s hard to not depend
on IT technology.
Your Dependency to Digital Technology
◎Communication.
◎Entertainment.
◎Finansial.
◎Education.
◎News.
◎Etc.. Etc..
The Role of
Mobile
Devices
Key Component for
Digital Society in
Consumers End.
https://www.statista.com/statistics/263441/global-smartphone-shipments-forecast/
http://www.businessinsider.sg/smartphone-market-share-android-ios-windows-
blackberry-2016-8
Android
Getting More
Dominant
The Threats
“
With Great Userbase Comes
Great Threats
https://www.statista.com/statistics/434880/cyber-crime-exploits/
Incidents Caused by Motives
◎Financials Gain
◎Political Gain
◎Revenge and Defamation
◎Thrill and Entertainment
“
Security is not a product. To
deal with a threat, you need to
know the correct process to
countermeasure.
Android Security : A Hacker's Perspective
2.
Android Hacking
means....
Devices &
Operating System
Applications
(Software)
Android Security : A Hacker's Perspective
Demo 1:
Android RAT
Remote Access Tool
Android Security : A Hacker's Perspective
3.
Exploiting Android
Application
The Joy of Android Apps Exploitation
◎The application is in your possession.
◎Basically it tell us to do anything.
◎Your Code is Mine
• Obtain the Sensitive Data
• Get the Algorithm
• Take over
• Manipulate
Our Goal (Mostly)
Exploitation is not
always about
taking over mobile
devices!
It is about taking advantage of vulnerability
Analysis Lab
Anything you need to prepare
Set Up Tools and Environment
 Android Device / Emulator
 Disassembler
 Decompiler
 HTTP / TCP Proxy for MITM
 Packet Sniffer
 Dynamic Binary Instrumentation
Analysis
Technique
Anything you need to know
C O D E D A T A
 Static Analysis
 Dynamic Analysis
 Dynamic Binary Instrumentation
 Traffic Analysis
 Taint Analysis
Vulnerable Point
Where should I look?
Demo 2:
Exploiting
Vulnerable Apps
4.
Real Life Cyber
Security Activity
Android
Application is not
Stand Alone!
Thanks!
Any questions?

More Related Content

PPTX
From Reversing to Exploitation: Android Application Security in Essence
PPTX
CDIC 2013-Mobile Application Pentest Workshop
PDF
Case Study on supply chain attack-how an rce in jenkins leads to data breache...
ODP
Null who and_where (1)
PPTX
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
PDF
Clear and Present Danger
PDF
hacking_ble_smartwatch @idsecconf2019 cirebon
PPTX
Hacking & Securing of iOS Apps by Saurabh Mishra
From Reversing to Exploitation: Android Application Security in Essence
CDIC 2013-Mobile Application Pentest Workshop
Case Study on supply chain attack-how an rce in jenkins leads to data breache...
Null who and_where (1)
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Clear and Present Danger
hacking_ble_smartwatch @idsecconf2019 cirebon
Hacking & Securing of iOS Apps by Saurabh Mishra

What's hot (20)

PPTX
Hacker Proof: Building Secure Software
PDF
OA_Cyber security course with AI
PPTX
Cyber Security in AI (Artificial Intelligence)
PDF
Bankinfonews
PPTX
IDENTITY IN THE WORLD OF IOT
PDF
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
PDF
The good, the bad, and the ugly on integration ai with cybersecurity
PPTX
Managing Identity without Boundaries
PDF
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
PPTX
Product security by Blockchain, AI and Security Certs
PDF
Out Go The Lights: An enlightening discussion of IoT automation security By D...
PPTX
Use of Artificial Intelligence in Cyber Security - Avantika University
PDF
Is AI going to provide safety for us?
PDF
Cyber Defense Automation
PPT
You Can't Spell Enterprise Security without MFA
PPT
Identity-Defined Privacay & Security for Internet of Things
PDF
Cyber Kill Chain: Web Application Exploitation
PDF
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
PPTX
Passwordless auth
PDF
Artificial Intelligence for Cyber Security
Hacker Proof: Building Secure Software
OA_Cyber security course with AI
Cyber Security in AI (Artificial Intelligence)
Bankinfonews
IDENTITY IN THE WORLD OF IOT
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
The good, the bad, and the ugly on integration ai with cybersecurity
Managing Identity without Boundaries
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Product security by Blockchain, AI and Security Certs
Out Go The Lights: An enlightening discussion of IoT automation security By D...
Use of Artificial Intelligence in Cyber Security - Avantika University
Is AI going to provide safety for us?
Cyber Defense Automation
You Can't Spell Enterprise Security without MFA
Identity-Defined Privacay & Security for Internet of Things
Cyber Kill Chain: Web Application Exploitation
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
Passwordless auth
Artificial Intelligence for Cyber Security

Similar to Android Security : A Hacker's Perspective (20)

PPTX
Android Security: Art of Exploitation
PDF
Understanding and Solving Common IoT Security Problems.pdf
PDF
A Survey Report on : Security & Challenges in Internet of Things
PDF
Volume2 chapter1 security
DOCX
India and Its Wall of Data Security
PDF
Internet of Things (Iot) Based Smart Environment and its Applications
DOCX
India and its wall of data security
PPTX
iot ppt.pptx
PDF
DataQuest_Sairam
PDF
IoT and security
PPTX
IoT
PPTX
Internet of Things
PDF
Cyber Security in UAE - Trends That You Should Never Forget
PDF
CII Whitepaper India Cyber Risk & Resilience Review 2018
DOCX
Team 3_Final Project.docx
PDF
Telefónica security io_t_final
PPTX
iot 3.pptx
PDF
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
PDF
Top Cyber Security Course in India - GICSEH.pdf
PDF
Internet of Things Challenges and Solutions
Android Security: Art of Exploitation
Understanding and Solving Common IoT Security Problems.pdf
A Survey Report on : Security & Challenges in Internet of Things
Volume2 chapter1 security
India and Its Wall of Data Security
Internet of Things (Iot) Based Smart Environment and its Applications
India and its wall of data security
iot ppt.pptx
DataQuest_Sairam
IoT and security
IoT
Internet of Things
Cyber Security in UAE - Trends That You Should Never Forget
CII Whitepaper India Cyber Risk & Resilience Review 2018
Team 3_Final Project.docx
Telefónica security io_t_final
iot 3.pptx
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
Top Cyber Security Course in India - GICSEH.pdf
Internet of Things Challenges and Solutions

More from Satria Ady Pradana (17)

PPTX
Rekayasa Balik - Sebuah Hikayat dari Dunia Digital
PPTX
The Offensive Python - Practical Python for Penetration Testing
PPTX
From Reversing to Exploitation
PPTX
Bypass Security Checking with Frida
PPTX
(Training) Malware - To the Realm of Malicious Code
PPTX
(Workshop) Reverse Engineering - Protecting and Breaking the Software
PPTX
Reverse Engineering - Protecting and Breaking the Software
PPTX
(Workshop) Memory Forensic - Investigating Memory Artefact
PPTX
Memory Forensic - Investigating Memory Artefact
PPTX
Another Side of Hacking
PPTX
Drac lab automatic malware analysis & repository
PPTX
Web Security Workshop : A Jumpstart
PPTX
Dracos forensic flavor
PPTX
Path of Cyber Security
PPTX
Docker and-daily-devops
PDF
Defense of the assets
PPTX
Tugas Akhir 13510030 - Analisis Keamanan Dalam Pengembangan Sistem Transaksi ...
Rekayasa Balik - Sebuah Hikayat dari Dunia Digital
The Offensive Python - Practical Python for Penetration Testing
From Reversing to Exploitation
Bypass Security Checking with Frida
(Training) Malware - To the Realm of Malicious Code
(Workshop) Reverse Engineering - Protecting and Breaking the Software
Reverse Engineering - Protecting and Breaking the Software
(Workshop) Memory Forensic - Investigating Memory Artefact
Memory Forensic - Investigating Memory Artefact
Another Side of Hacking
Drac lab automatic malware analysis & repository
Web Security Workshop : A Jumpstart
Dracos forensic flavor
Path of Cyber Security
Docker and-daily-devops
Defense of the assets
Tugas Akhir 13510030 - Analisis Keamanan Dalam Pengembangan Sistem Transaksi ...

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
KodekX | Application Modernization Development
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Machine learning based COVID-19 study performance prediction
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Digital-Transformation-Roadmap-for-Companies.pptx
KodekX | Application Modernization Development
Network Security Unit 5.pdf for BCA BBA.
20250228 LYD VKU AI Blended-Learning.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Understanding_Digital_Forensics_Presentation.pptx
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Machine learning based COVID-19 study performance prediction
Review of recent advances in non-invasive hemoglobin estimation
MIND Revenue Release Quarter 2 2025 Press Release
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Reach Out and Touch Someone: Haptics and Empathic Computing

Android Security : A Hacker's Perspective

Editor's Notes

  • #10: Termasuk mobile phone. Mobile phone dan gadget adalah perangkat penting yang mendukung ekosistem cyber. - kecil, ringan, terhubung dengan internet, customizable.
  • #14: Begitu maraknya pemakaian teknologi menciptakan ancaman. Kenapa? Apa saja ancamannya?
  • #32: Static Dynamic