SlideShare a Scribd company logo
Android Security
A Hacker Perspective
Reversing.ID
Revealing the Truth through Breaking Things
Hi!
I am Satria Ady Pradana
Cyber Security
Consultant
@
Mitra Integrasi
Informatika
xathrya
@xathrya
Reversing.ID
Revealing the Truth through Breaking Things
1.
Define Security!
“
Security is a process, not a
product.
Growth of
Technology
The Past and Present
 Back then, only few people or organizations can
afford it. Now everyone can.
 Everything has their electronic or digital equivalent.
 Used by companies, government, military, or
individuals to replace the manual works.
 Nearly every aspect of our life has been affected by
technology.
 Things getting smarter.
 Reduces in size.
 More connected than before.
Cyberspace
Around You
It’s hard to not depend
on IT technology.
Your Dependency to Digital Technology
◎Communication.
◎Entertainment.
◎Finansial.
◎Education.
◎News.
◎Etc.. Etc..
The Role of
Mobile
Devices
Key Component for
Digital Society in
Consumers End.
https://www.statista.com/statistics/263441/global-smartphone-shipments-forecast/
http://www.businessinsider.sg/smartphone-market-share-android-ios-windows-
blackberry-2016-8
Android
Getting More
Dominant
The Threats
“
With Great Userbase Comes
Great Threats
https://www.statista.com/statistics/434880/cyber-crime-exploits/
Incidents Drived by Motives
◎Financials Gain
◎Political Gain
◎Revenge and Defamation
◎Thrill and Entertainment
“
Security is not a product. To
deal with a threat, you need to
know the correct process to
countermeasure.
Android Security: Art of Exploitation
2.
Android Hacking
means....
Devices &
Operating System
Applications
(Software)
Android Security: Art of Exploitation
Demo 1:
Android RAT
Remote Access Tool
Android Security: Art of Exploitation
3.
Exploiting Android
Application
The Joy of Android Apps Exploitation
◎The application is in your possession.
◎Basically it tell us to do anything.
◎Your Code is Mine
• Obtain the Sensitive Data
• Get the Algorithm
• Take over
• Manipulate
Our Goal (Mostly)
Exploitation is not
always about
taking over mobile
devices!
It is about taking advantage of vulnerability
Analysis Lab
Anything you need to prepare
Set Up Tools and Environment
 Android Device / Emulator
 Disassembler
 Decompiler
 HTTP / TCP Proxy for MITM
 Packet Sniffer
 Dynamic Binary Instrumentation
Analysis
Technique
Anything you need to know
C O D E D A T A
 Static Analysis
 Dynamic Analysis
 Dynamic Binary Instrumentation
 Traffic Analysis
 Taint Analysis
Vulnerable Point
Where should I look?
Demo 2:
Exploiting
Vulnerable Apps
4.
Real Life Cyber
Security Activity
Android
Application is not
Stand Alone!
Thanks!
Any questions?

More Related Content

PDF
Recent Technologies in Electronics & Communication and Computer Science
PPS
UX for Internet of things == Experience of Things
PPTX
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
PDF
SentinelOne - NOAH19 Tel Aviv
PPTX
Sensors, Wearables and the Internet of Things: A Revolution in the Making
PDF
Internet of things: New Technology and its Impact on Business Models
PDF
When the Internet of Things becomes the Security of Things
PPTX
Security Everywhere in the Digital Economy
Recent Technologies in Electronics & Communication and Computer Science
UX for Internet of things == Experience of Things
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
SentinelOne - NOAH19 Tel Aviv
Sensors, Wearables and the Internet of Things: A Revolution in the Making
Internet of things: New Technology and its Impact on Business Models
When the Internet of Things becomes the Security of Things
Security Everywhere in the Digital Economy

What's hot (20)

PPTX
Internet of Things (IOT) - The Tipping Point
PDF
Top 5 Smart Technology Trends We'll See in 2020
PDF
How small devices make the biggest impact on the iot
PPTX
IoT Can Revolutionize Healthcare, But Security Is Key
PPTX
Getting ‘Smart’er – Collaboration and the Internet of Everything
PDF
Internet of things - 2020
PDF
Balancing Transformation in Digital Government: Cyber Risks vs. IT Rewards - ...
PDF
IOT 101 - A primer on Internet of Things
PDF
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
PDF
Confronting the risks of artificial Intelligence
PDF
Towards a Responsible Internet of Things
PDF
Internet of Things
PDF
Mihai Raneti, Founder & CEO of CyberSwarm Inc.-Cybersecurity for the future: ...
PDF
Internet of Things
PPTX
IoT
PPTX
Microfunding mobile microfinance
PPTX
Internet of Things - Asked and Answered
PDF
iot-bringing-trust-to-iot[1]
PPTX
future trends future opportunities oct2017
PDF
CIOs Are At A Crossroads
Internet of Things (IOT) - The Tipping Point
Top 5 Smart Technology Trends We'll See in 2020
How small devices make the biggest impact on the iot
IoT Can Revolutionize Healthcare, But Security Is Key
Getting ‘Smart’er – Collaboration and the Internet of Everything
Internet of things - 2020
Balancing Transformation in Digital Government: Cyber Risks vs. IT Rewards - ...
IOT 101 - A primer on Internet of Things
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
Confronting the risks of artificial Intelligence
Towards a Responsible Internet of Things
Internet of Things
Mihai Raneti, Founder & CEO of CyberSwarm Inc.-Cybersecurity for the future: ...
Internet of Things
IoT
Microfunding mobile microfinance
Internet of Things - Asked and Answered
iot-bringing-trust-to-iot[1]
future trends future opportunities oct2017
CIOs Are At A Crossroads
Ad

Similar to Android Security: Art of Exploitation (20)

PPTX
Android Security : A Hacker's Perspective
PDF
Techvorm com-android-security-issues-solutions
PDF
Mobile security article
PDF
Mobile Apps and Security Attacks: An Introduction
PPTX
Android security
PDF
Article on Mobile Security
PDF
Securing Mobile Apps - Appfest Version
PDF
Five mobile security challenges facing the enterprise
PDF
Building an Android Scale Incident Response Process
PDF
Whitepaper - CISO Guide_6pp
PDF
Mobile Security & Analytics: What Works and What Doesn't
PDF
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
PDF
11 Reasons Why Your Company Could Be In Danger
PDF
SECURITY AND HACKING ANDROID MOBILE DEVELOPMENT .pdf
PDF
Cyber safety
PPTX
Mobile security
PDF
Android App Hacking - Erez Metula, AppSec
PPT
Mobile code mining for discovery and exploits nullcongoa2013
PDF
Evolutionand impactofhiddenmobilethreats wandera
PPTX
Smartphone and mobile device safety & security
Android Security : A Hacker's Perspective
Techvorm com-android-security-issues-solutions
Mobile security article
Mobile Apps and Security Attacks: An Introduction
Android security
Article on Mobile Security
Securing Mobile Apps - Appfest Version
Five mobile security challenges facing the enterprise
Building an Android Scale Incident Response Process
Whitepaper - CISO Guide_6pp
Mobile Security & Analytics: What Works and What Doesn't
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
11 Reasons Why Your Company Could Be In Danger
SECURITY AND HACKING ANDROID MOBILE DEVELOPMENT .pdf
Cyber safety
Mobile security
Android App Hacking - Erez Metula, AppSec
Mobile code mining for discovery and exploits nullcongoa2013
Evolutionand impactofhiddenmobilethreats wandera
Smartphone and mobile device safety & security
Ad

More from Satria Ady Pradana (20)

PPTX
Malware for Red Team
PPTX
Down The Rabbit Hole, From Networker to Security Professional
PPTX
MITM: Tales of Trust and Betrayal
PPTX
Berkarir di Cyber Security
PPTX
IOT Security FUN-damental
PPTX
Python-Assisted Red-Teaming Operation
PPTX
IoT Security - Preparing for the Worst
PDF
Silabus Training Reverse Engineering
PPTX
Practical Security - Modern Day Software
PPTX
Firmware Reverse Engineering
PPTX
Reverse Engineering: The Crash Course
PPTX
The Offensive Python: Practical Python for Penetration Testing
PPTX
From Reversing to Exploitation: Android Application Security in Essence
PPTX
Bypass Security Checking with Frida
PPTX
Malware: To The Realm of Malicious Code (Training)
PPTX
Reverse Engineering: Protecting and Breaking the Software (Workshop)
PPTX
Reverse Engineering: Protecting and Breaking the Software
PPTX
Memory Forensic: Investigating Memory Artefact (Workshop)
PPTX
Memory Forensic: Investigating Memory Artefact
PPTX
Another Side of Hacking
Malware for Red Team
Down The Rabbit Hole, From Networker to Security Professional
MITM: Tales of Trust and Betrayal
Berkarir di Cyber Security
IOT Security FUN-damental
Python-Assisted Red-Teaming Operation
IoT Security - Preparing for the Worst
Silabus Training Reverse Engineering
Practical Security - Modern Day Software
Firmware Reverse Engineering
Reverse Engineering: The Crash Course
The Offensive Python: Practical Python for Penetration Testing
From Reversing to Exploitation: Android Application Security in Essence
Bypass Security Checking with Frida
Malware: To The Realm of Malicious Code (Training)
Reverse Engineering: Protecting and Breaking the Software (Workshop)
Reverse Engineering: Protecting and Breaking the Software
Memory Forensic: Investigating Memory Artefact (Workshop)
Memory Forensic: Investigating Memory Artefact
Another Side of Hacking

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
KodekX | Application Modernization Development
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Approach and Philosophy of On baking technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
KodekX | Application Modernization Development
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Approach and Philosophy of On baking technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Programs and apps: productivity, graphics, security and other tools
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectroscopy.pptx food analysis technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
sap open course for s4hana steps from ECC to s4
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Android Security: Art of Exploitation

Editor's Notes

  • #10: Termasuk mobile phone. Mobile phone dan gadget adalah perangkat penting yang mendukung ekosistem cyber. - kecil, ringan, terhubung dengan internet, customizable.
  • #14: Begitu maraknya pemakaian teknologi menciptakan ancaman. Kenapa? Apa saja ancamannya?
  • #32: Static Dynamic