SlideShare a Scribd company logo
Mobile Application
 Security Testing




            Gursev Kalra
             Dec 5, 2009
Agenda

►Introduction
►Browser Based Mobile Applications
►Installable Mobile Applications
►Intercepting Application Traffic
►Various Traffic Interception Schemes
►Mobile Traffic and SSL
►Conclusion



                                        www.foundstone.com
                                        © 2008, McAfee, Inc.
Introduction

►Who am I?
  ■ Senior Security Consultant – Foundstone
    Professional Services
  ■ Web Applications, Networks…




                                              www.foundstone.com
                                              © 2008, McAfee, Inc.
Introduction

►Mobile Applications
  ■ Tremendous growth in consumer and business
    mobile applications
  ■ Many new players
  ■ Security aspects might get overlooked




                                                 www.foundstone.com
                                                 © 2008, McAfee, Inc.
Browser Based Mobile Applications




                              www.foundstone.com
                              © 2008, McAfee, Inc.
Installable Mobile Applications




                                  www.foundstone.com
                                  © 2008, McAfee, Inc.
Intercepting Application Traffic for
    Nokia S40 Series Phones

• Set up a custom web proxy and obtain its IP and port

• Edit the configuration WML and change proxy IP and
  port to the custom web proxy

• Compile WML to a provisioning (WBXML) file


• Transfer the new settings to S40 mobile phone

• Activate custom settings and access the Internet
  using new settings


                                                         www.foundstone.com
                                                         © 2008, McAfee, Inc.
Intercepting Application Traffic for
  Nokia S60 Series Phones

• Set up a custom web proxy and obtain its
  IP and port

• Create duplicate of existing Access Point
  settings

• For the copy created, change the proxy
  IP and port to the custom proxy

• Access Internet using custom proxy
  settings


                                              www.foundstone.com
                                              © 2008, McAfee, Inc.
Proxy With Public IP Address


   Phone with Application
   Access Point: Service provider default settings
   Proxy Server Address: W1.X2.Y3.Z4 (Public IP)
   Port Number: 8888                                                           Internet




                                         Public IP: W1.X2.Y3.Z4
                                         Paros/Fiddler/Burp/Charles: Web
                                          Proxy running on port 8888




                                                                            W1.X2.Y3.Z4    www.foundstone.com
                                                                                           © 2008, McAfee, Inc.
Proxy On WLAN

   Phone with Application
   WLAN Netw. Name: PenTest                                             Internet
   WLAN Mode: WPA2
   Proxy Server Address:                 SSID: PenTest
    192.168.30.102                        IP: 192.168.30.100
   Port Number: 8888




    192.168.30.101


                           Paros/Fiddler/Burp/Charles:
                            Web Proxy running on port
                            8888



                                                                                www.foundstone.com
                                                               192.168.30.102   © 2008, McAfee, Inc.
Proxy With One Phone


                                           Internet


   Public IP - Connected to Internet
    via Mobile Phone Modem
   Paros/Fiddler/Burp/Charles:
    Web Proxy running on port 8888




                                       Phone with Application
                                       Phone as a Modem
                                       Access Point: Service provider default
         W1.X2.Y3.Z4                    settings
                                       Proxy Server Address: W1.X2.Y3.Z4
                                                                                 www.foundstone.com
                                       Port Number: 8888                        © 2008, McAfee, Inc.
Proxy With External Internet
                    Connection

                                                                             Internet
   Phone with Application
   Access Point: Service provider default
    settings
   Proxy Server Address: W1.X2.Y3.Z4
   Port Number: 8888
                                                                                USB Modem




                          Public IP - Connected to Internet
                           via Mobile Phone Modem
                          Paros/Fiddler/Burp/Charles:
                           Web Proxy running on port
                           8888



                                                               W1.X2.Y3.Z4              www.foundstone.com
                                                                                        © 2008, McAfee, Inc.
Mobile Traffic Interception and SSL

• Export your web proxy’s certificated in DER format


• Copy the certificate file to a web server

• Set the MIME type of the directory to which the certificate is copied
  to application/x-x509-ca-cert

• Use the mobile web browser to browse to the certificate file


• Import the certificate when prompted


• Delete the un-trusted certificate after testing



                                                                          www.foundstone.com
                                                                          © 2008, McAfee, Inc.
Conclusion

►Mobile applications extend traditional
 network boundaries and introduce new
 avenues of attack
►They often have access to sensitive
 business and personal information
►They are constantly challenging and
 extending their reach
►Security is critical and should be part of
 SDLC!!

                                              www.foundstone.com
                                              © 2008, McAfee, Inc.
Queries




          www.foundstone.com
          © 2008, McAfee, Inc.
Thank You


             Gursev Kalra
gursev(dot)kalra(at)foundstone(dot)com

                                         www.foundstone.com
                                         © 2008, McAfee, Inc.

More Related Content

PDF
How to hack a telecom and stay alive
PPTX
How to Hack a Telecom and Stay Alive
PDF
10.1.1.64.2504
PDF
Abdullah Al Mamun 062507056
PPTX
Protect your IPPBX against VOIP attacks
PPTX
Zayo presentation6 29-11
PDF
Introduction of ferrari 4 g mobile wi fi-english
PPTX
Zayo Group Overview
How to hack a telecom and stay alive
How to Hack a Telecom and Stay Alive
10.1.1.64.2504
Abdullah Al Mamun 062507056
Protect your IPPBX against VOIP attacks
Zayo presentation6 29-11
Introduction of ferrari 4 g mobile wi fi-english
Zayo Group Overview

What's hot (8)

PDF
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PDF
SIP, Unified Communications (UC) and Security
PDF
Building a WebRTC Communication and collaboration platform - techleash barcamp
KEY
Vibe headline benefits 0411
PDF
Yeastar My pbx u100_datasheet_en
PDF
Product Overview: April 2015 (Si3D)
PDF
Yeastar My pbx u200_datasheet_en
PDF
WebRTC Opens the Floodgates
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
SIP, Unified Communications (UC) and Security
Building a WebRTC Communication and collaboration platform - techleash barcamp
Vibe headline benefits 0411
Yeastar My pbx u100_datasheet_en
Product Overview: April 2015 (Si3D)
Yeastar My pbx u200_datasheet_en
WebRTC Opens the Floodgates

Viewers also liked (17)

PDF
Mobile application security – effective methodology, efficient testing! hem...
PPTX
Mobile Application Security Testing (Static Code Analysis) of Android App
PDF
Pentesting Mobile Applications (Prashant Verma)
PPTX
Cybersecurity Best Practices in Financial Services
PDF
How to scale mobile application security testing
ODP
Mobile Apps Security Testing -1
PPT
iOS Application Pentesting
PPTX
Web and Mobile Application Security
PPTX
Basic Guide For Mobile Application Testing
PDF
Security Testing Mobile Applications
PPTX
iOS-Application-Security-iAmPr3m
PPTX
The curious case of mobile app security.pptx
PPTX
Pentesting iOS Applications
PDF
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
PDF
Mobile Application Security
PPT
Security testing
PDF
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Mobile application security – effective methodology, efficient testing! hem...
Mobile Application Security Testing (Static Code Analysis) of Android App
Pentesting Mobile Applications (Prashant Verma)
Cybersecurity Best Practices in Financial Services
How to scale mobile application security testing
Mobile Apps Security Testing -1
iOS Application Pentesting
Web and Mobile Application Security
Basic Guide For Mobile Application Testing
Security Testing Mobile Applications
iOS-Application-Security-iAmPr3m
The curious case of mobile app security.pptx
Pentesting iOS Applications
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security
Security testing
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...

Similar to Gursev kalra _mobile_application_security_testing - ClubHack2009 (20)

PDF
Attacking Blackberry For Phun and Profit
PDF
Layer 7: Securing Web 2.0 - What You Need to Know
PDF
Introduction to Small Business Server 2003 Part 2
PPTX
INFT132 093 03 Web Concepts
PDF
Top Ten Web Attacks
PPTX
Consuming Web Services in Microsoft Silverlight 3
PDF
Web 2 And Application Delivery Public
PPTX
Developing and Deploying Applications on Internet Information Services (IIS)
PPTX
Developing and Deploying Applications on Internet Information Services (IIS)
PPTX
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
PPTX
Implementing transparent proxy server with acl
PPTX
MoMoAthens Cross-Screen_Introduction to Webinos by Webinos
DOCX
อินเทอร์เน็ต
PDF
Scalable Internet Servers and Load Balancing
PDF
Surge 2012 fred_moyer_lightning
PDF
Aus cert event_2010
PDF
HWIOS Websocket CMS explained
PDF
Live question » 修改华为hg255 d超级密码,改用原路由
KEY
Plone Deployment (PloneConf Edition)
PDF
Xfocus xcon 2008_aks_oknock
Attacking Blackberry For Phun and Profit
Layer 7: Securing Web 2.0 - What You Need to Know
Introduction to Small Business Server 2003 Part 2
INFT132 093 03 Web Concepts
Top Ten Web Attacks
Consuming Web Services in Microsoft Silverlight 3
Web 2 And Application Delivery Public
Developing and Deploying Applications on Internet Information Services (IIS)
Developing and Deploying Applications on Internet Information Services (IIS)
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Implementing transparent proxy server with acl
MoMoAthens Cross-Screen_Introduction to Webinos by Webinos
อินเทอร์เน็ต
Scalable Internet Servers and Load Balancing
Surge 2012 fred_moyer_lightning
Aus cert event_2010
HWIOS Websocket CMS explained
Live question » 修改华为hg255 d超级密码,改用原路由
Plone Deployment (PloneConf Edition)
Xfocus xcon 2008_aks_oknock

More from ClubHack (20)

PDF
India legal 31 october 2014
PPTX
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
PPT
Cyber Insurance
PPTX
Summarising Snowden and Snowden as internal threat
PPTX
Fatcat Automatic Web SQL Injector by Sandeep Kamble
PDF
The Difference Between the Reality and Feeling of Security by Thomas Kurian
PDF
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
PPTX
Smart Grid Security by Falgun Rathod
PPTX
Legal Nuances to the Cloud by Ritambhara Agrawal
PPT
Infrastructure Security by Sivamurthy Hiremath
PDF
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
PPTX
Hacking and Securing iOS Applications by Satish Bomisstty
PPTX
Critical Infrastructure Security by Subodh Belgi
PPTX
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
PDF
XSS Shell by Vandan Joshi
PDF
Clubhack Magazine Issue February 2012
PDF
ClubHack Magazine issue 26 March 2012
PDF
ClubHack Magazine issue April 2012
PDF
ClubHack Magazine Issue May 2012
PDF
ClubHack Magazine – December 2011
India legal 31 october 2014
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyber Insurance
Summarising Snowden and Snowden as internal threat
Fatcat Automatic Web SQL Injector by Sandeep Kamble
The Difference Between the Reality and Feeling of Security by Thomas Kurian
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Smart Grid Security by Falgun Rathod
Legal Nuances to the Cloud by Ritambhara Agrawal
Infrastructure Security by Sivamurthy Hiremath
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hacking and Securing iOS Applications by Satish Bomisstty
Critical Infrastructure Security by Subodh Belgi
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
XSS Shell by Vandan Joshi
Clubhack Magazine Issue February 2012
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue April 2012
ClubHack Magazine Issue May 2012
ClubHack Magazine – December 2011

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
KodekX | Application Modernization Development
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Cloud computing and distributed systems.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Modernizing your data center with Dell and AMD
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The AUB Centre for AI in Media Proposal.docx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
20250228 LYD VKU AI Blended-Learning.pptx
KodekX | Application Modernization Development
Advanced methodologies resolving dimensionality complications for autism neur...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation_ Review paper, used for researhc scholars
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Cloud computing and distributed systems.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Understanding_Digital_Forensics_Presentation.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Modernizing your data center with Dell and AMD
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Gursev kalra _mobile_application_security_testing - ClubHack2009

  • 1. Mobile Application Security Testing Gursev Kalra Dec 5, 2009
  • 2. Agenda ►Introduction ►Browser Based Mobile Applications ►Installable Mobile Applications ►Intercepting Application Traffic ►Various Traffic Interception Schemes ►Mobile Traffic and SSL ►Conclusion www.foundstone.com © 2008, McAfee, Inc.
  • 3. Introduction ►Who am I? ■ Senior Security Consultant – Foundstone Professional Services ■ Web Applications, Networks… www.foundstone.com © 2008, McAfee, Inc.
  • 4. Introduction ►Mobile Applications ■ Tremendous growth in consumer and business mobile applications ■ Many new players ■ Security aspects might get overlooked www.foundstone.com © 2008, McAfee, Inc.
  • 5. Browser Based Mobile Applications www.foundstone.com © 2008, McAfee, Inc.
  • 6. Installable Mobile Applications www.foundstone.com © 2008, McAfee, Inc.
  • 7. Intercepting Application Traffic for Nokia S40 Series Phones • Set up a custom web proxy and obtain its IP and port • Edit the configuration WML and change proxy IP and port to the custom web proxy • Compile WML to a provisioning (WBXML) file • Transfer the new settings to S40 mobile phone • Activate custom settings and access the Internet using new settings www.foundstone.com © 2008, McAfee, Inc.
  • 8. Intercepting Application Traffic for Nokia S60 Series Phones • Set up a custom web proxy and obtain its IP and port • Create duplicate of existing Access Point settings • For the copy created, change the proxy IP and port to the custom proxy • Access Internet using custom proxy settings www.foundstone.com © 2008, McAfee, Inc.
  • 9. Proxy With Public IP Address  Phone with Application  Access Point: Service provider default settings  Proxy Server Address: W1.X2.Y3.Z4 (Public IP)  Port Number: 8888 Internet  Public IP: W1.X2.Y3.Z4  Paros/Fiddler/Burp/Charles: Web Proxy running on port 8888 W1.X2.Y3.Z4 www.foundstone.com © 2008, McAfee, Inc.
  • 10. Proxy On WLAN  Phone with Application  WLAN Netw. Name: PenTest Internet  WLAN Mode: WPA2  Proxy Server Address: SSID: PenTest 192.168.30.102 IP: 192.168.30.100  Port Number: 8888 192.168.30.101  Paros/Fiddler/Burp/Charles: Web Proxy running on port 8888 www.foundstone.com 192.168.30.102 © 2008, McAfee, Inc.
  • 11. Proxy With One Phone Internet  Public IP - Connected to Internet via Mobile Phone Modem  Paros/Fiddler/Burp/Charles: Web Proxy running on port 8888  Phone with Application  Phone as a Modem  Access Point: Service provider default W1.X2.Y3.Z4 settings  Proxy Server Address: W1.X2.Y3.Z4 www.foundstone.com  Port Number: 8888 © 2008, McAfee, Inc.
  • 12. Proxy With External Internet Connection Internet  Phone with Application  Access Point: Service provider default settings  Proxy Server Address: W1.X2.Y3.Z4  Port Number: 8888 USB Modem  Public IP - Connected to Internet via Mobile Phone Modem  Paros/Fiddler/Burp/Charles: Web Proxy running on port 8888 W1.X2.Y3.Z4 www.foundstone.com © 2008, McAfee, Inc.
  • 13. Mobile Traffic Interception and SSL • Export your web proxy’s certificated in DER format • Copy the certificate file to a web server • Set the MIME type of the directory to which the certificate is copied to application/x-x509-ca-cert • Use the mobile web browser to browse to the certificate file • Import the certificate when prompted • Delete the un-trusted certificate after testing www.foundstone.com © 2008, McAfee, Inc.
  • 14. Conclusion ►Mobile applications extend traditional network boundaries and introduce new avenues of attack ►They often have access to sensitive business and personal information ►They are constantly challenging and extending their reach ►Security is critical and should be part of SDLC!! www.foundstone.com © 2008, McAfee, Inc.
  • 15. Queries www.foundstone.com © 2008, McAfee, Inc.
  • 16. Thank You Gursev Kalra gursev(dot)kalra(at)foundstone(dot)com www.foundstone.com © 2008, McAfee, Inc.