SlideShare a Scribd company logo
Slides and projects at samsclass.info
Is Your Mobile App Secure?



DEF CON 23 Wall of Sheep

Sat., Aug 8, 2015 3 pm

Sam Bowne

City College San Francisco
Slides and projects at samsclass.info
Adding Trojans to Apps
Slides and projects at samsclass.info
Android is #1
• 80% market
share in 2014
– Link Ch 4a
Slides and projects at samsclass.info
App Signing
• All apps must be signed to be installed,
BUT
– Android allows self-signed certificates
• Google Play is the "official" app store, BUT
– Google doesn't police it well
– Apps can be installed from email, Web pages,
etc.
Slides and projects at samsclass.info
Android Debug
Bridge
• Command-line tool
• Allows you to communicate with a mobile
device via a USB cable or an SVD running
within an emulator
• Connects to device's daemon running on
TCP port 5037
Slides and projects at samsclass.info
Useful ADB Commands
• push
– Copies a file from your computer to the mobile
device
• pull
– Copies a file from the mobile device to your
computer
• logcat
– Shows logging information on the console
– Useful to see if an app or the OS is logging
sensitive information
Slides and projects at samsclass.info
Useful ADB Commands
• install
– Copies an application package file (APK) to
the mobile device and installs the app
– Useful for side-loading apps (so you don't
have to use Google Play)
• shell
– Starts a remote shell on the mobile device
– Allows you to execute arbitrary commands
Slides and projects at samsclass.info
Decompiling and Disassembly
Slides and projects at samsclass.info
Static Analysis
• Source code is generally kept confidential
by app developers
• A binary, compiled app can be analyzed by
disassembling or decompiling them, into
– Smali assembly code (used by Dalvik VM), or
– Java code
Slides and projects at samsclass.info
Slides and projects at samsclass.info
TD Ameritrade
• No obfuscation
Slides and projects at samsclass.info
Bank of America
• ProGuard Free Obfuscator
– Worthless
Slides and projects at samsclass.info
Java v. Smali Code
Slides and projects at samsclass.info
Building & Signing an App
Slides and projects at samsclass.info
Monitoring the Log
Slides and projects at samsclass.info
./adb logcat
• Much better way to monitor log
• Filter with grep
Slides and projects at samsclass.info
Attacks via Decompiling and
Disassembly
• Insert Trojan code, like keyloggers
• Find encryption methods & keys
• Change variables to bypass client-side
authentication or input validation
• Cheat at games
Slides and projects at samsclass.info
• Link Ch 4z43
Slides and projects at samsclass.info
Step-by-Step: Bank of America
Slides and projects at samsclass.info
Step-by-Step: Bank of America
Slides and projects at samsclass.info
Step-by-Step: Bank of America
Slides and projects at samsclass.info
Step-by-Step: Bank of America
Slides and projects at samsclass.info
DEMO: Bank of America
Slides and projects at samsclass.info
DEMO: The Bancorp
Slides and projects at samsclass.info
DEMO: Capital One
Slides and projects at samsclass.info
DEMO: SunTrust
• Konylabs
• Capture HTTP
Parameters
Slides and projects at samsclass.info
DEMO: TradeKing
• App is patched!
• "Verifier" detects the
Trojan
Slides and projects at samsclass.info
DroidDream (2011)
• Was primarily distributed by the Google Play
store
• Legitimate apps were repackaged to include
DroidDream and then put back in the Play store
Slides and projects at samsclass.info
Google's Response
• Google removed the repackaged apps
from the Play Store
• But 50,000 – 200,000 users were already
infected
Slides and projects at samsclass.info
Google Application Verification Service
• Launched in 2012
• Tries to detect malicious apps
• Much less effective than 3rd-party AV
– Link Ch 5e
Slides and projects at samsclass.info
Decompiling, Disassembly, and
Repackaging Countermeasures
• Every binary can be reverse-engineered
– Given enough time and effort
• Never store secrets on the client-side
• Never rely on client-side authentication or
client-side validation
• Obfuscate source code
– ProGuard (free) or Arxan (commercial)
Slides and projects at samsclass.info
DashO – Powerful Obfuscator
Slides and projects at samsclass.info
All Strings Concealed
• BUT it costs $2000
Slides and projects at samsclass.info
Slides and projects at samsclass.info
Broken SSL

Repeating Old Work
Slides and projects at samsclass.info
CERT's Test in 2014
• 23,667 vulnerable apps
• All warned in 2014 by CERT
Slides and projects at samsclass.info
Still Vulnerable
Slides and projects at samsclass.info
Simple SSL Test
• Route Android
traffic through
Burp Proxy
• Don't install the
PortSwigger root
certificate
• This is a MITM
attack
• The default
browser detects it
Slides and projects at samsclass.info
DEMO: PicsArt (100 Million)
Slides and projects at samsclass.info
DEMO: InstaChat(100 Million)
Slides and projects at samsclass.info
DEMO: OKCupid – FIXED!
Slides and projects at samsclass.info
DEMO: Safeway (1 Million)
Slides and projects at samsclass.info
DEMO: Safeway (1 Million)
Slides and projects at samsclass.info
Broken SSL

Medical Apps
Slides and projects at samsclass.info
CERT found 265 Vulnerable Medical Apps
Slides and projects at samsclass.info
HIPAA
Slides and projects at samsclass.info
My Repeat of CERT Tests
Slides and projects at samsclass.info
DEMO: GenieMD
Slides and projects at samsclass.info
DEMO: LowestMed corporate
Slides and projects at samsclass.info
LowestMed Response
• Phone call to President of CCSF
threatening a lawsuit
• After I contacted their lawyer, he told me
that there is no PII in the app beyond this
point, so it is not a covered entity under
HIPAA
Slides and projects at samsclass.info
Broken SSL

Testing New Apps
Slides and projects at samsclass.info
Responsible Disclosure
• I need to give these guys time to
respond, so most of them are still
confidential
• I can discuss one, because they fixed it
really fast!
Slides and projects at samsclass.info
Blue Cross Blue Shield of North Carolina
Slides and projects at samsclass.info
Leaked Blue Cross Credentials
• Also leaked Facebook,
Twitter, and YouTube
credentials
Slides and projects at samsclass.info
Fixed in Two Days
• New version refuses to
use invalid SSL
certificates
Slides and projects at samsclass.info
Security Products
Slides and projects at samsclass.info
AIG MobileGuard
Security app
required for
insurance
coverage
Removed
from Google
Play after my
reports
Slides and projects at samsclass.info
Already Trojaned ☺
Slides and projects at samsclass.info
Local Storage of Sensitive Data
Security Question
Security Answer
PIN
Slides and projects at samsclass.info
DEMO: MobileSuperHero

(10,000)
• Logs the PIN
• Last update 12-13-12
Slides and projects at samsclass.info
DEMO: Virgin Mobile Rescue

(100,000)
• Logs the PIN
• Last update 7-22-13
• Must uninstall Mobile
Superhero to use it
Slides and projects at samsclass.info
DEMO: Rebound (50)
• Logs the PIN
• Last update 7-16-13
Slides and projects at samsclass.info
DEMO: Rebound Mobile Security
(50)
• Logs the PIN
• Last updated 11-7-2013

More Related Content

PDF
CNIT 126 Ch 9: OllyDbg
PDF
CNIT 129S: Ch 12: Attacking Users: Cross-Site Scripting
PDF
CNIT 126: Ch 2 & 3
PDF
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
PDF
CNIT 128: 3. Attacking iOS Applications (Part 2)
PPTX
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
PDF
CNIT 126 11. Malware Behavior
PDF
CNIT 126: 8: Debugging
CNIT 126 Ch 9: OllyDbg
CNIT 129S: Ch 12: Attacking Users: Cross-Site Scripting
CNIT 126: Ch 2 & 3
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 128: 3. Attacking iOS Applications (Part 2)
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
CNIT 126 11. Malware Behavior
CNIT 126: 8: Debugging

What's hot (20)

PDF
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
PDF
CNIT 152: 6. Scope & 7. Live Data Collection
PDF
Practical Malware Analysis: Ch 9: OllyDbg
PDF
9: OllyDbg
PDF
Practical Malware Analysis: Ch 11: Malware Behavior
PDF
CNIT 128 3. Attacking iOS Applications (Part 2)
PDF
3. Security Engineering
PDF
CNIT 152 12 Investigating Windows Systems (Part 2)
PDF
CNIT 126 Ch 11: Malware Behavior
PDF
Practical Malware Analysis: Ch 8: Debugging
PDF
CNIT 152: 1 Real-World Incidents
PDF
CNIT 126: 10: Kernel Debugging with WinDbg
PDF
CNIT 128: Android Implementation Issues (Part 2)
PDF
Thick Application Penetration Testing: Crash Course
PPTX
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
PDF
Ch 7: Attacking Session Management
PDF
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
PDF
CISSP Prep: Ch 9. Software Development Security
PDF
3. Security Engineering
PDF
Ch 10: Attacking Back-End Components
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
CNIT 152: 6. Scope & 7. Live Data Collection
Practical Malware Analysis: Ch 9: OllyDbg
9: OllyDbg
Practical Malware Analysis: Ch 11: Malware Behavior
CNIT 128 3. Attacking iOS Applications (Part 2)
3. Security Engineering
CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 126 Ch 11: Malware Behavior
Practical Malware Analysis: Ch 8: Debugging
CNIT 152: 1 Real-World Incidents
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 128: Android Implementation Issues (Part 2)
Thick Application Penetration Testing: Crash Course
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Ch 7: Attacking Session Management
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
CISSP Prep: Ch 9. Software Development Security
3. Security Engineering
Ch 10: Attacking Back-End Components
Ad

Viewers also liked (20)

PDF
CNIT 128 Ch 4: Android
PDF
Ch 7: Programming for Security Professionals
PDF
CNIT 121: 11 Analysis Methodology
PDF
CNIT 129S: Securing Web Applications Ch 1-2
PDF
CNIT 129S: Ch 6: Attacking Authentication
PDF
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
PDF
CNIT 121: 2 IR Management Handbook
PDF
CNIT 40: 6: DNSSEC and beyond
PDF
CNIT 129S: Ch 5: Bypassing Client-Side Controls
PDF
CNIT 121: 12 Investigating Windows Systems (Part 3)
PDF
CNIT 129S: Ch 4: Mapping the Application
PDF
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
PDF
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
PDF
CNIT 129S: 8: Attacking Access Controls
PDF
CNIT 129S: Ch 3: Web Application Technologies
PDF
CNIT 121: Computer Forensics Ch 1
PDF
CNIT 121: 3 Pre-Incident Preparation
PDF
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
PDF
CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)
PDF
CNIT 40: 3: DNS vulnerabilities
CNIT 128 Ch 4: Android
Ch 7: Programming for Security Professionals
CNIT 121: 11 Analysis Methodology
CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Ch 6: Attacking Authentication
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
CNIT 121: 2 IR Management Handbook
CNIT 40: 6: DNSSEC and beyond
CNIT 129S: Ch 5: Bypassing Client-Side Controls
CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 129S: Ch 4: Mapping the Application
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 129S: 8: Attacking Access Controls
CNIT 129S: Ch 3: Web Application Technologies
CNIT 121: Computer Forensics Ch 1
CNIT 121: 3 Pre-Incident Preparation
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)
CNIT 40: 3: DNS vulnerabilities
Ad

Similar to Is Your Mobile App Secure? (20)

PPTX
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
PDF
Attacking and Defending Mobile Applications
PDF
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
PPT
SOASTA Webinar: Process Compression For Mobile App Dev 120612
PDF
OWASP_Russia_2016_-_Yury_Chemerkin_--_run.pdf
PPTX
2018 11-19 improving business agility with security policy automation final
PPTX
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
PPTX
JavaOne 2016 "Java, Microservices, Cloud and Containers"
PDF
Deep Dive into Disaster Recovery in the Cloud
PDF
AWS live hack: Atlassian + Snyk OSS on AWS
PDF
iOS Application Security.pdf
PPTX
Fragments-Plug the vulnerabilities in your App
PDF
Vulnerabilities and Bugs in Mobile Apps with Quick Tours
PPTX
Application security meetup k8_s security with zero trust_29072021
PDF
Native VS HTML5
PDF
SLLacker Presentation
PPTX
The End of Security as We Know It - Shannon Lietz
PDF
How to Find Vulnerabilities and Bugs in Mobile Applications
PDF
SecDevOps Risk Workflow - v0.6
PDF
NTXISSACSC3 - Manage Mobile Security Incidents like A Boss by Ismail Guneydas
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Attacking and Defending Mobile Applications
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
SOASTA Webinar: Process Compression For Mobile App Dev 120612
OWASP_Russia_2016_-_Yury_Chemerkin_--_run.pdf
2018 11-19 improving business agility with security policy automation final
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
JavaOne 2016 "Java, Microservices, Cloud and Containers"
Deep Dive into Disaster Recovery in the Cloud
AWS live hack: Atlassian + Snyk OSS on AWS
iOS Application Security.pdf
Fragments-Plug the vulnerabilities in your App
Vulnerabilities and Bugs in Mobile Apps with Quick Tours
Application security meetup k8_s security with zero trust_29072021
Native VS HTML5
SLLacker Presentation
The End of Security as We Know It - Shannon Lietz
How to Find Vulnerabilities and Bugs in Mobile Applications
SecDevOps Risk Workflow - v0.6
NTXISSACSC3 - Manage Mobile Security Incidents like A Boss by Ismail Guneydas

More from Sam Bowne (20)

PDF
Introduction to the Class & CISSP Certification
PDF
Cyberwar
PDF
3: DNS vulnerabilities
PDF
8. Software Development Security
PDF
4 Mapping the Application
PDF
3. Attacking iOS Applications (Part 2)
PDF
12 Elliptic Curves
PDF
11. Diffie-Hellman
PDF
2a Analyzing iOS Apps Part 1
PDF
9 Writing Secure Android Applications
PDF
12 Investigating Windows Systems (Part 2 of 3)
PDF
10 RSA
PDF
12 Investigating Windows Systems (Part 1 of 3
PDF
9. Hard Problems
PDF
8 Android Implementation Issues (Part 1)
PDF
11 Analysis Methodology
PDF
8. Authenticated Encryption
PDF
7. Attacking Android Applications (Part 2)
PDF
7. Attacking Android Applications (Part 1)
PDF
5. Stream Ciphers
Introduction to the Class & CISSP Certification
Cyberwar
3: DNS vulnerabilities
8. Software Development Security
4 Mapping the Application
3. Attacking iOS Applications (Part 2)
12 Elliptic Curves
11. Diffie-Hellman
2a Analyzing iOS Apps Part 1
9 Writing Secure Android Applications
12 Investigating Windows Systems (Part 2 of 3)
10 RSA
12 Investigating Windows Systems (Part 1 of 3
9. Hard Problems
8 Android Implementation Issues (Part 1)
11 Analysis Methodology
8. Authenticated Encryption
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 1)
5. Stream Ciphers

Recently uploaded (20)

PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
01-Introduction-to-Information-Management.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Basic Mud Logging Guide for educational purpose
PDF
Complications of Minimal Access Surgery at WLH
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Institutional Correction lecture only . . .
PPTX
Pharma ospi slides which help in ospi learning
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Classroom Observation Tools for Teachers
PPTX
master seminar digital applications in india
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
human mycosis Human fungal infections are called human mycosis..pptx
O5-L3 Freight Transport Ops (International) V1.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Computing-Curriculum for Schools in Ghana
Renaissance Architecture: A Journey from Faith to Humanism
01-Introduction-to-Information-Management.pdf
Microbial disease of the cardiovascular and lymphatic systems
Basic Mud Logging Guide for educational purpose
Complications of Minimal Access Surgery at WLH
Module 4: Burden of Disease Tutorial Slides S2 2025
Microbial diseases, their pathogenesis and prophylaxis
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Final Presentation General Medicine 03-08-2024.pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Institutional Correction lecture only . . .
Pharma ospi slides which help in ospi learning
Anesthesia in Laparoscopic Surgery in India
Classroom Observation Tools for Teachers
master seminar digital applications in india
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

Is Your Mobile App Secure?

  • 1. Slides and projects at samsclass.info Is Your Mobile App Secure?
 
 DEF CON 23 Wall of Sheep
 Sat., Aug 8, 2015 3 pm
 Sam Bowne
 City College San Francisco
  • 2. Slides and projects at samsclass.info Adding Trojans to Apps
  • 3. Slides and projects at samsclass.info Android is #1 • 80% market share in 2014 – Link Ch 4a
  • 4. Slides and projects at samsclass.info App Signing • All apps must be signed to be installed, BUT – Android allows self-signed certificates • Google Play is the "official" app store, BUT – Google doesn't police it well – Apps can be installed from email, Web pages, etc.
  • 5. Slides and projects at samsclass.info Android Debug Bridge • Command-line tool • Allows you to communicate with a mobile device via a USB cable or an SVD running within an emulator • Connects to device's daemon running on TCP port 5037
  • 6. Slides and projects at samsclass.info Useful ADB Commands • push – Copies a file from your computer to the mobile device • pull – Copies a file from the mobile device to your computer • logcat – Shows logging information on the console – Useful to see if an app or the OS is logging sensitive information
  • 7. Slides and projects at samsclass.info Useful ADB Commands • install – Copies an application package file (APK) to the mobile device and installs the app – Useful for side-loading apps (so you don't have to use Google Play) • shell – Starts a remote shell on the mobile device – Allows you to execute arbitrary commands
  • 8. Slides and projects at samsclass.info Decompiling and Disassembly
  • 9. Slides and projects at samsclass.info Static Analysis • Source code is generally kept confidential by app developers • A binary, compiled app can be analyzed by disassembling or decompiling them, into – Smali assembly code (used by Dalvik VM), or – Java code
  • 10. Slides and projects at samsclass.info
  • 11. Slides and projects at samsclass.info TD Ameritrade • No obfuscation
  • 12. Slides and projects at samsclass.info Bank of America • ProGuard Free Obfuscator – Worthless
  • 13. Slides and projects at samsclass.info Java v. Smali Code
  • 14. Slides and projects at samsclass.info Building & Signing an App
  • 15. Slides and projects at samsclass.info Monitoring the Log
  • 16. Slides and projects at samsclass.info ./adb logcat • Much better way to monitor log • Filter with grep
  • 17. Slides and projects at samsclass.info Attacks via Decompiling and Disassembly • Insert Trojan code, like keyloggers • Find encryption methods & keys • Change variables to bypass client-side authentication or input validation • Cheat at games
  • 18. Slides and projects at samsclass.info • Link Ch 4z43
  • 19. Slides and projects at samsclass.info Step-by-Step: Bank of America
  • 20. Slides and projects at samsclass.info Step-by-Step: Bank of America
  • 21. Slides and projects at samsclass.info Step-by-Step: Bank of America
  • 22. Slides and projects at samsclass.info Step-by-Step: Bank of America
  • 23. Slides and projects at samsclass.info DEMO: Bank of America
  • 24. Slides and projects at samsclass.info DEMO: The Bancorp
  • 25. Slides and projects at samsclass.info DEMO: Capital One
  • 26. Slides and projects at samsclass.info DEMO: SunTrust • Konylabs • Capture HTTP Parameters
  • 27. Slides and projects at samsclass.info DEMO: TradeKing • App is patched! • "Verifier" detects the Trojan
  • 28. Slides and projects at samsclass.info DroidDream (2011) • Was primarily distributed by the Google Play store • Legitimate apps were repackaged to include DroidDream and then put back in the Play store
  • 29. Slides and projects at samsclass.info Google's Response • Google removed the repackaged apps from the Play Store • But 50,000 – 200,000 users were already infected
  • 30. Slides and projects at samsclass.info Google Application Verification Service • Launched in 2012 • Tries to detect malicious apps • Much less effective than 3rd-party AV – Link Ch 5e
  • 31. Slides and projects at samsclass.info Decompiling, Disassembly, and Repackaging Countermeasures • Every binary can be reverse-engineered – Given enough time and effort • Never store secrets on the client-side • Never rely on client-side authentication or client-side validation • Obfuscate source code – ProGuard (free) or Arxan (commercial)
  • 32. Slides and projects at samsclass.info DashO – Powerful Obfuscator
  • 33. Slides and projects at samsclass.info All Strings Concealed • BUT it costs $2000
  • 34. Slides and projects at samsclass.info
  • 35. Slides and projects at samsclass.info Broken SSL
 Repeating Old Work
  • 36. Slides and projects at samsclass.info CERT's Test in 2014 • 23,667 vulnerable apps • All warned in 2014 by CERT
  • 37. Slides and projects at samsclass.info Still Vulnerable
  • 38. Slides and projects at samsclass.info Simple SSL Test • Route Android traffic through Burp Proxy • Don't install the PortSwigger root certificate • This is a MITM attack • The default browser detects it
  • 39. Slides and projects at samsclass.info DEMO: PicsArt (100 Million)
  • 40. Slides and projects at samsclass.info DEMO: InstaChat(100 Million)
  • 41. Slides and projects at samsclass.info DEMO: OKCupid – FIXED!
  • 42. Slides and projects at samsclass.info DEMO: Safeway (1 Million)
  • 43. Slides and projects at samsclass.info DEMO: Safeway (1 Million)
  • 44. Slides and projects at samsclass.info Broken SSL
 Medical Apps
  • 45. Slides and projects at samsclass.info CERT found 265 Vulnerable Medical Apps
  • 46. Slides and projects at samsclass.info HIPAA
  • 47. Slides and projects at samsclass.info My Repeat of CERT Tests
  • 48. Slides and projects at samsclass.info DEMO: GenieMD
  • 49. Slides and projects at samsclass.info DEMO: LowestMed corporate
  • 50. Slides and projects at samsclass.info LowestMed Response • Phone call to President of CCSF threatening a lawsuit • After I contacted their lawyer, he told me that there is no PII in the app beyond this point, so it is not a covered entity under HIPAA
  • 51. Slides and projects at samsclass.info Broken SSL
 Testing New Apps
  • 52. Slides and projects at samsclass.info Responsible Disclosure • I need to give these guys time to respond, so most of them are still confidential • I can discuss one, because they fixed it really fast!
  • 53. Slides and projects at samsclass.info Blue Cross Blue Shield of North Carolina
  • 54. Slides and projects at samsclass.info Leaked Blue Cross Credentials • Also leaked Facebook, Twitter, and YouTube credentials
  • 55. Slides and projects at samsclass.info Fixed in Two Days • New version refuses to use invalid SSL certificates
  • 56. Slides and projects at samsclass.info Security Products
  • 57. Slides and projects at samsclass.info AIG MobileGuard Security app required for insurance coverage Removed from Google Play after my reports
  • 58. Slides and projects at samsclass.info Already Trojaned ☺
  • 59. Slides and projects at samsclass.info Local Storage of Sensitive Data Security Question Security Answer PIN
  • 60. Slides and projects at samsclass.info DEMO: MobileSuperHero
 (10,000) • Logs the PIN • Last update 12-13-12
  • 61. Slides and projects at samsclass.info DEMO: Virgin Mobile Rescue
 (100,000) • Logs the PIN • Last update 7-22-13 • Must uninstall Mobile Superhero to use it
  • 62. Slides and projects at samsclass.info DEMO: Rebound (50) • Logs the PIN • Last update 7-16-13
  • 63. Slides and projects at samsclass.info DEMO: Rebound Mobile Security (50) • Logs the PIN • Last updated 11-7-2013