SlideShare a Scribd company logo
n|u MUMBAI September,17,2016
Drozer - An Android Application SecurityTool
#WHOAMI
▪ Vivek Mahajan @c3p70r
▪ InfoSec Enthusiast & Learner
▪ Senior Information Security Analyst @niiconsulting
@c3p70r
#Agenda
▪ Drozer Basics
▪ Leaking Content Providers
▪ Attacking Broadcast Receivers
▪ Abusing Android application permissions
▪ Breaking and Building Drozer as per need of pentest
@c3p70r
Before We Dig Drozer
▪ Android Applications are made up of:
– Activities
– Services
– Content Providers
– Broadcast Receivers
– Intents*
@c3p70r
Drozer Basics
▪ Framework forAndroid application assessment written by MWR
InfoSecurity
▪ Written on iPython
▪ Extensive list of inbuilt modules such as leaking content provider,
scanning, application permission-list, broadcast receivers etc.
▪ Drozer works on client-server architecture.
▪ Setting up a Drozer Environment
▪ Basics usage and handy commands (Sieve Demo)
@c3p70r
Leaking Content Providers
▪ Vulnerable application used – Catch
▪ Task:
– Reverse the application using apktool
– Find out the Content providers
– Query the content provide
– Vulnerability Discovered by Aditya Gupta (@adi)
https://www.youtube.com/watch?v=knNQe27blVc
@c3p70r
Attacking Broadcast Receivers
▪ Vulnerable application used – Fourgoats.
▪ Task:
– Reverse the application using apktool
– Find the broadcast receiver code
– Figure out the broadcast receiver inputs.
– Exploit the vulnerable broadcast receiver using Drozer
@c3p70r
Abusing Android Application Permissions
▪ Vulnerable application used:Adobe Reader
▪ Vulnerable to leaking content provider
▪ Path traversal vulnerability
▪ Attacker can exploit Adobe Reader’s permissions to read any
arbitrary file from SDCARD.
▪ Discovered by Sebastian Guerro
(http://blog.seguesec.com/2012/09/path-traversal-vulnerability-on-
adobe-readerandroid-application/)
@c3p70r
Drozer-KungFu
▪ Vulnerable application used: CSIP_Simple
▪ Not directly vulnerable.
▪ Custom permissions are there to protect the application (but lack in
protection)
▪ Vulnerability discovered by Joshua J. Drake (@jduck)
▪ Reference AHH (Android hackers handbook)
@c3p70r
Demo Time
@c3p70r
<--Question--->
@c3p70r

More Related Content

PDF
Null 14 may_lesser_known_attacks_by_ninadsarang
PPTX
Fuzzing | Null OWASP Mumbai | 2016 June
PDF
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
PDF
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
PPTX
SSRF For Bug Bounties
PDF
Abusing Glype Proxies - Attacks, Exploits and Defences
PDF
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
PDF
The Hookshot: Runtime Exploitation
Null 14 may_lesser_known_attacks_by_ninadsarang
Fuzzing | Null OWASP Mumbai | 2016 June
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
SSRF For Bug Bounties
Abusing Glype Proxies - Attacks, Exploits and Defences
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
The Hookshot: Runtime Exploitation

What's hot (20)

PPTX
Bypass Security Checking with Frida
PDF
Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
PDF
Learning by hacking - android application hacking tutorial
PPTX
Mobile security part 2
PDF
Android reverse engineering: understanding third-party applications. OWASP EU...
PDF
Andriod Pentesting and Malware Analysis
PDF
Android pentesting
PPTX
Android pentesting
PPTX
From Reversing to Exploitation
PPTX
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
PDF
Abusing, Exploiting and Pwning with Firefox Add-ons
PDF
Hacking Tizen: The OS of everything - Whitepaper
PDF
Introduction to Dynamic Analysis of Android Application
PPTX
Abusing Exploiting and Pwning with Firefox Addons
PPTX
[Wroclaw #2] iOS Security - 101
PPTX
Android secure offline storage - CC Mobile
PDF
Android Security & Penetration Testing
PDF
Effectiveness of AV in Detecting Web Application Backdoors
PPT
IEEE Day 2013 - Reverse Engineering an Android Application
PDF
My Null Android Penetration Session
Bypass Security Checking with Frida
Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
Learning by hacking - android application hacking tutorial
Mobile security part 2
Android reverse engineering: understanding third-party applications. OWASP EU...
Andriod Pentesting and Malware Analysis
Android pentesting
Android pentesting
From Reversing to Exploitation
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Abusing, Exploiting and Pwning with Firefox Add-ons
Hacking Tizen: The OS of everything - Whitepaper
Introduction to Dynamic Analysis of Android Application
Abusing Exploiting and Pwning with Firefox Addons
[Wroclaw #2] iOS Security - 101
Android secure offline storage - CC Mobile
Android Security & Penetration Testing
Effectiveness of AV in Detecting Web Application Backdoors
IEEE Day 2013 - Reverse Engineering an Android Application
My Null Android Penetration Session
Ad

Similar to Drozer - An Android Application Security Tool (20)

PPTX
[Wroclaw #1] Android Security Workshop
PDF
A Blueprint for Web Attack Survival
PDF
The WAF book (Web App Firewall )
PPTX
ModSecurity 3.0 and NGINX: Getting Started
PDF
[OPD 2019] Web Apps vs Blockchain dApps
ODP
Devoxx 2014 presentation
PPTX
Identity Management: Using OIDC to Empower the Next-Generation Apps
PDF
Pentesting Mobile Applications (Prashant Verma)
PDF
Security events in 2014
PDF
Web application & proxy server
PPTX
Security in Android Application
PDF
AppSec PNW: Android and iOS Application Security with MobSF
PPTX
ModSecurity 3.0 and NGINX: Getting Started - EMEA
PPTX
Native - Hybrid - Web Mobile Architectures
PPTX
Android Penetration Testing - OWASP Chapter (June 2016)
PDF
Presentation of the CROSSMINER H2020 at OW2con'19, June 12-13 in Paris.
 
PDF
Hacking android apps by srini0x00
PDF
CNIT 128 7. Attacking Android Applications (Part 2)
PDF
Ridwan Fadjar Septian PyCon ID 2021 Regular Talk - django application monitor...
PDF
ToorCon 14 : Malandroid : The Crux of Android Infections
[Wroclaw #1] Android Security Workshop
A Blueprint for Web Attack Survival
The WAF book (Web App Firewall )
ModSecurity 3.0 and NGINX: Getting Started
[OPD 2019] Web Apps vs Blockchain dApps
Devoxx 2014 presentation
Identity Management: Using OIDC to Empower the Next-Generation Apps
Pentesting Mobile Applications (Prashant Verma)
Security events in 2014
Web application & proxy server
Security in Android Application
AppSec PNW: Android and iOS Application Security with MobSF
ModSecurity 3.0 and NGINX: Getting Started - EMEA
Native - Hybrid - Web Mobile Architectures
Android Penetration Testing - OWASP Chapter (June 2016)
Presentation of the CROSSMINER H2020 at OW2con'19, June 12-13 in Paris.
 
Hacking android apps by srini0x00
CNIT 128 7. Attacking Android Applications (Part 2)
Ridwan Fadjar Septian PyCon ID 2021 Regular Talk - django application monitor...
ToorCon 14 : Malandroid : The Crux of Android Infections
Ad

More from nullowaspmumbai (20)

PDF
ELK in Security Analytics
PPTX
Switch security
PPTX
Radio hacking - Part 1
PPTX
How I got my First CVE
PPTX
Power forensics
PPTX
Infrastructure security & Incident Management
PPTX
Middleware hacking
PPTX
Internet censorship circumvention techniques
PPTX
How i got my first cve
PPTX
Adversarial machine learning updated
PPTX
PPTX
Adversarial machine learning
PPTX
Dll Hijacking
PPTX
Abusing Target
PDF
NTFS Forensics
PPTX
Middleware hacking
PDF
Ganesh naik linux_kernel_internals
PDF
Buffer overflow null
PDF
Null mumbai Session on ransomware by_Aditya Jamkhande
ELK in Security Analytics
Switch security
Radio hacking - Part 1
How I got my First CVE
Power forensics
Infrastructure security & Incident Management
Middleware hacking
Internet censorship circumvention techniques
How i got my first cve
Adversarial machine learning updated
Adversarial machine learning
Dll Hijacking
Abusing Target
NTFS Forensics
Middleware hacking
Ganesh naik linux_kernel_internals
Buffer overflow null
Null mumbai Session on ransomware by_Aditya Jamkhande

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Empathic Computing: Creating Shared Understanding
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
NewMind AI Monthly Chronicles - July 2025
Network Security Unit 5.pdf for BCA BBA.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectral efficient network and resource selection model in 5G networks
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars
20250228 LYD VKU AI Blended-Learning.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Empathic Computing: Creating Shared Understanding
Building Integrated photovoltaic BIPV_UPV.pdf
A Presentation on Artificial Intelligence
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity

Drozer - An Android Application Security Tool

  • 1. n|u MUMBAI September,17,2016 Drozer - An Android Application SecurityTool
  • 2. #WHOAMI ▪ Vivek Mahajan @c3p70r ▪ InfoSec Enthusiast & Learner ▪ Senior Information Security Analyst @niiconsulting @c3p70r
  • 3. #Agenda ▪ Drozer Basics ▪ Leaking Content Providers ▪ Attacking Broadcast Receivers ▪ Abusing Android application permissions ▪ Breaking and Building Drozer as per need of pentest @c3p70r
  • 4. Before We Dig Drozer ▪ Android Applications are made up of: – Activities – Services – Content Providers – Broadcast Receivers – Intents* @c3p70r
  • 5. Drozer Basics ▪ Framework forAndroid application assessment written by MWR InfoSecurity ▪ Written on iPython ▪ Extensive list of inbuilt modules such as leaking content provider, scanning, application permission-list, broadcast receivers etc. ▪ Drozer works on client-server architecture. ▪ Setting up a Drozer Environment ▪ Basics usage and handy commands (Sieve Demo) @c3p70r
  • 6. Leaking Content Providers ▪ Vulnerable application used – Catch ▪ Task: – Reverse the application using apktool – Find out the Content providers – Query the content provide – Vulnerability Discovered by Aditya Gupta (@adi) https://www.youtube.com/watch?v=knNQe27blVc @c3p70r
  • 7. Attacking Broadcast Receivers ▪ Vulnerable application used – Fourgoats. ▪ Task: – Reverse the application using apktool – Find the broadcast receiver code – Figure out the broadcast receiver inputs. – Exploit the vulnerable broadcast receiver using Drozer @c3p70r
  • 8. Abusing Android Application Permissions ▪ Vulnerable application used:Adobe Reader ▪ Vulnerable to leaking content provider ▪ Path traversal vulnerability ▪ Attacker can exploit Adobe Reader’s permissions to read any arbitrary file from SDCARD. ▪ Discovered by Sebastian Guerro (http://blog.seguesec.com/2012/09/path-traversal-vulnerability-on- adobe-readerandroid-application/) @c3p70r
  • 9. Drozer-KungFu ▪ Vulnerable application used: CSIP_Simple ▪ Not directly vulnerable. ▪ Custom permissions are there to protect the application (but lack in protection) ▪ Vulnerability discovered by Joshua J. Drake (@jduck) ▪ Reference AHH (Android hackers handbook) @c3p70r

Editor's Notes

  • #5: -Activities are UI screens where user can Interact with them… in short activities represent a single screen with user interface. -Service is a component which runs in the background to perform long running operations. Services doesn’t provide the user interface. For an eg music player running in the background while you are working on the different application. Can be started by an activity. -Content providers are always start with content:// Generally used to store, retrieve and share the data from the SQLite database. Also XML and text format. -Broadcast messages are generated by the android OS. Android applications register for intents to observer and applications get backs a notification from the android system when that particular intent occur. For an eg: Battery low, Message received, Alarm etc… -Intents Ignites a broadcast receiver. Starts a service through an activity Starts a services through a BROADCAST RECEIVER Helps to migrate from one activity to another activity. Helps to deliver data from one activity to another activity ** Intents are Divided in to two categories:- Explicit Intent and Implicit intent In simple words an Intent is basically an intention to do an action Con