SlideShare a Scribd company logo
CLICK AND DRAGGER
Denial and Deception on Android 	

- the grugq [ @thegrugq ]
AGENDA
• OPSEC Refresher	

• Phones Suck	

• Threat Model	

• Some Solutions	

• Conclusion
ABOUT ME
OPERATIONAL SECURITY
The ShortVersion
Click and Dragger: Denial and Deception on Android mobile
–Quellcrist Falconer
“If you want to lose a fight, talk about it first”
DENIAL & DECEPTION
DENIAL
Prevent the adversary from gaining useful information
DECEPTION
Feed the adversary false information
• Cover	

• Cover for action	

• Cover for status	

• Concealment	

• Compartmentation
–James Clapper, Director of National Intelligence
“People must communicate.They will make mistakes
and we will exploit them.”
PHONES SUCK
–Allen Dulles, 	

Former Director of Central Intelligence
“The greatest material curse to the profession, despite
all its advantages, is undoubtedly the telephone.”
NO MOBILE ANONYMITY
MOBILE IDENTIFIERS
LOCATION
• Specific location, e.g. home, work, etc.	

• Mobility pattern, from home, via commute, to
work	

• Mirroring, two (or more) devices traveling
together
NETWORK
• Numbers dialed, (who you call)	

• Calls received, (who calls you)	

• Calling pattern, (number dialed, for how long,
when, how frequently)
PHYSICAL
• IMEI, mobile device ID (the serial number)	

• IMSI, mobile subscriber ID (the phone number)
CONTENT
• Identifiers, e.g. names, locations	

• Voice fingerprinting	

• Keywords
SMARTPHONES
• Ad network analytics	

• GPS	

• Apps scrape and upload content	

• Mothership pings	

• Android ID	

• MAC address
SMARTPHONES CONT.
• IP address	

• WiFi beacons	

• Cameras	

• Gait analysis (via sensors)
THREAT MODEL
LOCAL SECURITY FORCES
• Reporters are searched and interrogated	

• AJ reporters arrested for “spy equipment”	

• Mobile 3G access point	

• Militia members thought it looked
“suspicious”
NOT NSA
USERS
SECURITY IS HARD WORK
SECURITYTAKES DISCIPLINE
USERS ARE LAZY
so are we
EASYTO USE
SECURE BY DEFAULT
REASONABLY SECURE
BURNER PHONES
WHAT ARETHEY GOOD FOR?
• Threat actors without nation state level capabilities	

• Your mom	

• Building a non-operational legend	

• Flesh out a persona that doesn’t need
protection
DEFINITELY NOT NSA
BURNER GUIDELINES
• Dumber the better	

• Learn to disable completely (battery + SIM out)	

• Disable around locations linked to you (home!)	

• Never put in real information	

• Feel free to load with fake data
https://b3rn3d.herokuapp.com/blog/2014/01/22/burner-phone-best-practices/
BURNER GUIDELINES, CONT.
• Call non-operational numbers to chaff the analysis	

• Keep it short	

• Keep it simple	

• Get rid of it as soon as possible
BURNER GUIDE CONT.
• Purchase using cash from smaller stores	

• Time delay before activation (months)	

• Dispose of with extreme prejudice
CLANDESTINE CALLS
Click and Dragger: Denial and Deception on Android mobile
–Allen Dulles
“Never dial [the] number before having thought about
your conversation. Do not improvise even the dummy
part of it. But do not be too elaborate.The great
rule…is to be natural.”
• Keep it short, simple and natural	

• Prefer signalling over operational data	

• signalling > open codes > plain talk	

• Enter your conversation with a plan
–Allen Dulles, Former Director of Central Intelligence
“Even if you do not use [the phone] carelessly
yourself, the other fellow, very often will, so in any
case, warn him.”
FORTRESS PHONE
NSA GUIDELINES
• Two forms of encryption	

• Belts and braces	

• Data at rest	

• FDE + app encryption	

• Data in motion	

• VPN + app encryption
YOU CANNOT HAVE A
SECURE ANDROID PHONE
BECAUSE IT IS A PHONE
BECAUSE IT IS ANDROID
LEO’S LOVE ANDROID
YOU CAN'T BOLT ON SECURITY
Android cannot be secured by adding apps
BUT WHAT IF I…
No. Seriously, just no.
• Blackphone	

• For people with money	

• Samsung KNOX	

• For people who don’t want a secure phone
• GuardianROM	

• For people who like to reboot	

• CryptogenMod*	

• For DIY hackers
* name subject to change
IS IT NSA-PROOF?
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobile
CRYPTOGENMOD
Hardened Android ROM
FEATURES
• Lots of crypto	

• Robust against physical access	

• Resilient against network attacks	

• Impact containment
• Derived from CyanogenMod 11	

• Stripped down (no browser, no analytics)	

• Advanced privacy patches	

• OpenPDroid + PDroid Manager	

• Secure application replacements
• Kernel hardening tweaks	

• A lot more work to be done here	

• Hardened userland	

• A lot more work to be done here
PROTECTION
• Local physical access	

• Remote hacking	

• Baseband hacking	

• Network monitoring	

• GSM monitoring
PHYSICAL
• Forensic analysis	

• Encryption	

• Security Ratchet
REMOTE
• Reduce attack surface dramatically	

• No browser, services, or email	

• No app store
BASEBAND
• Nothing I can do	

• Except PORTAL	

• But it’s not the end of the world	

• BB exploits are finicky	

• BB design is everything (segmentation FTW)
NETWORK MONITORING
• VPN direct to a secure backend	

• Limited information is exposed	

• Provides dual layer encryption
OPSEC STILL CRITICAL
Secure phones can’t cure stupid.
DARKMATTER
This App Kills Forensic Analysis
SECURE APP CONTAINERS +
SECURE OPERATIONAL ENV
CRYPTED APP CONTAINERS
MOBILETRUECRYPT
• Runs apps withinTrueCrypt containers	

• Automagically kills sensitive apps, then	

• mount -o bind … /data/data/$app
MOBILETRUECRYPT
• tc-play https://github.com/bwalex/tc-play	

• Uses theTrueCrypt volume format	

• Supports outer and hidden volumes	

• Backend is dm-crypt not FUSE
MOBILETRUECRYPT
• Why not use native /data encryption?	

• AES-256-XTS > AES-128-CBC	

• Use both
WIN STATES
CLOSED CRYPTED
CONTAINERS
SHUTDOWN/REBOOT
COUNTS
HOW DO WE GETTHERE?
EVENT BASED HARDENING
CHANGE SECURITY POSTURE
BASED ON OBSERVATIONS OFTHE
OPERATIONAL ENVIRONMENT
• Observe the operational environment	

• Monitor for SecurityEvents
• Harden the security posture	

• Trigger SecurityActions
INDICATORS OF A NEGATIVE
OPERATIONAL ENVIRONMENT
• Failed login	

• Timer	

• Temperature drop	

• Radio silence	

• Debugger attach	

• Receive alert	

• SIM removed
HARDEN SECURITY POSTURE
• Kill sensitive applications	

• Unmount file systems	

• Wipe files	

• Wipe ram	

• Reboot phone
DURESS CODES
• Explicit duress codes don’t work	

• “of these two codes, only use this one when
you’re under extreme stress. ps don’t forget”	

• “if you use the wrong code, you are severely
punished”
Click and Dragger: Denial and Deception on Android mobile
CryptogenMod + 	

DarkMatter =
http://github.com/grugq/darkmatter
RAISE	

NSA	

PRICE 2 PWN*
* probably
THEY’LL ADAPT
Click and Dragger: Denial and Deception on Android mobile
THANKS!
QUESTIONS?
THANKYOU
@thegrugq	

the.grugq@gmail.com

More Related Content

KEY
OPSEC for hackers
PDF
An Underground education
PDF
Cybercrime In The Deep Web
PPTX
Red Team Framework
PDF
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
PDF
ATT&CKcon Intro
PPTX
Introduction à e-SCM
PPTX
Threat Hunting - Moving from the ad hoc to the formal
OPSEC for hackers
An Underground education
Cybercrime In The Deep Web
Red Team Framework
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
ATT&CKcon Intro
Introduction à e-SCM
Threat Hunting - Moving from the ad hoc to the formal

What's hot (20)

PPTX
Understanding Zero Trust Security for IBM i
PDF
Beyaz Şapkalı Hacker CEH Eğitimi - Pasif Bilgi Toplama (OSINT)
PPTX
Vulnerability Management
PDF
DevLOVE DDDBC
PPTX
CYBER SECURITY
PDF
OSINT x UCCU Workshop on Open Source Intelligence
PDF
Siber İstihbarat Eğitim Dokümanı
PDF
100 Security Operation Center Tools.pdf
PDF
Security architecture
PPTX
Security Operations Center (SOC) Essentials for the SME
PDF
From OSINT to Phishing presentation
PDF
乗っ取れコンテナ!!開発者から見たコンテナセキュリティの考え方(CloudNative Days Tokyo 2021 発表資料)
PDF
Pursuing evasive custom command & control - GuideM
PDF
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
PDF
Alienvault how to build a security operations center (on a budget) (2017, a...
PPTX
クラウドネイティブ時代の大規模ウォーターフォール開発(CloudNative Days Tokyo 2021 発表資料)
PPTX
Introduction to Cyber Security
PDF
ANSSI - fiche des bonnes pratiques en cybersécurité
PDF
Widthの発音について
PPTX
Security operation center
Understanding Zero Trust Security for IBM i
Beyaz Şapkalı Hacker CEH Eğitimi - Pasif Bilgi Toplama (OSINT)
Vulnerability Management
DevLOVE DDDBC
CYBER SECURITY
OSINT x UCCU Workshop on Open Source Intelligence
Siber İstihbarat Eğitim Dokümanı
100 Security Operation Center Tools.pdf
Security architecture
Security Operations Center (SOC) Essentials for the SME
From OSINT to Phishing presentation
乗っ取れコンテナ!!開発者から見たコンテナセキュリティの考え方(CloudNative Days Tokyo 2021 発表資料)
Pursuing evasive custom command & control - GuideM
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
Alienvault how to build a security operations center (on a budget) (2017, a...
クラウドネイティブ時代の大規模ウォーターフォール開発(CloudNative Days Tokyo 2021 発表資料)
Introduction to Cyber Security
ANSSI - fiche des bonnes pratiques en cybersécurité
Widthの発音について
Security operation center
Ad

Similar to Click and Dragger: Denial and Deception on Android mobile (20)

ODP
Your cell phone is covered in spiders
PDF
Les 10 risques liés aux applications mobiles
PDF
Mobile Security Training, Mobile Device Security Training
PDF
Tisa mobile forensic
PPT
Mobile code mining for discovery and exploits nullcongoa2013
PDF
Droidcon secureyourapp fighttheleaks-samsung
PPTX
Android Device Hardening
PPTX
Mobile security
PDF
(Pdf) yury chemerkin balccon_2013
PDF
ASFWS 2011 - Secure software development for mobile devices
PDF
6.3. How to get out of an inprivacy jail
PDF
Consumer_Device_Privacy
PDF
Attacking and Defending Mobile Applications
PDF
Smartphone Smart Card 061013
ODP
Cell phone security lite
PDF
Android Q & iOS 13 Privacy Enhancements
PDF
Smartphone 7 aug14
PDF
Mobile Securty - An Oxymoron?
PPT
Analysis and research of system security based on android
PDF
Defcon 22-weston-hecker-burner-phone-ddos
Your cell phone is covered in spiders
Les 10 risques liés aux applications mobiles
Mobile Security Training, Mobile Device Security Training
Tisa mobile forensic
Mobile code mining for discovery and exploits nullcongoa2013
Droidcon secureyourapp fighttheleaks-samsung
Android Device Hardening
Mobile security
(Pdf) yury chemerkin balccon_2013
ASFWS 2011 - Secure software development for mobile devices
6.3. How to get out of an inprivacy jail
Consumer_Device_Privacy
Attacking and Defending Mobile Applications
Smartphone Smart Card 061013
Cell phone security lite
Android Q & iOS 13 Privacy Enhancements
Smartphone 7 aug14
Mobile Securty - An Oxymoron?
Analysis and research of system security based on android
Defcon 22-weston-hecker-burner-phone-ddos
Ad

Recently uploaded (10)

PPTX
Introduction to Packet Tracer Course Overview - Aug 21 (1).pptx
PPTX
Social Media People PowerPoint Templates.pptx
PDF
Best 4 Sites for Buy Verified Cash App Accounts – BTC Only.pdf
DOC
NIU毕业证学历认证,阿比林基督大学毕业证留学生学历
DOC
Camb毕业证学历认证,格罗斯泰斯特主教大学毕业证仿冒文凭毕业证
PDF
Lesson 13- HEREDITY _ pedSAWEREGFVCXZDSASEWFigree.pdf
PPTX
ASMS Telecommunication company Profile
DOC
SIUE毕业证学历认证,阿祖萨太平洋大学毕业证学位证书复制
PDF
Kids, Screens & Emotional Development by Meenakshi Khakat
PDF
2025 Guide to Buy Verified Cash App Accounts You Can Trust.pdf
Introduction to Packet Tracer Course Overview - Aug 21 (1).pptx
Social Media People PowerPoint Templates.pptx
Best 4 Sites for Buy Verified Cash App Accounts – BTC Only.pdf
NIU毕业证学历认证,阿比林基督大学毕业证留学生学历
Camb毕业证学历认证,格罗斯泰斯特主教大学毕业证仿冒文凭毕业证
Lesson 13- HEREDITY _ pedSAWEREGFVCXZDSASEWFigree.pdf
ASMS Telecommunication company Profile
SIUE毕业证学历认证,阿祖萨太平洋大学毕业证学位证书复制
Kids, Screens & Emotional Development by Meenakshi Khakat
2025 Guide to Buy Verified Cash App Accounts You Can Trust.pdf

Click and Dragger: Denial and Deception on Android mobile