SlideShare a Scribd company logo
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
Episode II
RETURN OF THE
BACK-END/NETWORK
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
Episode II
RETURN OF THE
NETWORK/BACK-END
Episode I
THE FORENSIC
MENACE
Episode III
ATTACK OF
THE CODE
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Connect
Twitter: @NowSecureMobile
—
Subscribe to #MobSec5, our weekly mobile security news digest
http://mobsec5.nowsecure.com/
—
Web: nowsecure.com
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Michael Krueger
Solutions Engineer | NowSecure
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Contents
● The Trilogy series overview
● Data-in-transit
● Server-side security
● Suggested tools to get started
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
Mobile
forensics &
data recovery
Network, web
services &
API testing
Server-side
penetration
testing
Reverse
engineering &
code analysis
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
“I can show you the ways of the [Force data in transit].”
— Kylo Ren
https://milnersblog.com/tag/the-characters-of-star-wars-the-force-awakens/
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Data in transit concerns
● Insecure communication
○ Certificate validation issues
○ Privacy leakage
● Insecure authentication
● Insecure authorization
○ Server accepting/responding to
requests without authorization
○ Client-based authorization decisions
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Man-in-the-middle (MITM)
● Secretly intercept (modify) communications between systems believing they are communicating directly
● Aims to circumvent mutual authentication (or lack thereof)
● Use it to test for potential vulnerabilities and validate that app sends proper requests/intended data
Who are you really talking to?
Original connection
Victim
Attacker
Presents fake
certificate
Server
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Lack of certificate validation
Don’t implement your own crypto!
It still happens because developers want to accept self-signed
certificates or because code implementation is too complex
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Mitmproxy basic setup
Device 192.168.10.15
Gateway set to 192.168.10.66 192.168.10.1
Server
Laptop w/ mitmproxy
Listening at ports 80 & 443
192.168.10.66
Mitmproxy CA certificate
(optional)
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Android handset gateway configuration
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
IP forwarding
1
2
3
sysctl - w net.ipv4.ip_forward = 1
iptables - t nat - A PREROUTING - i eth0 - p tcp--dport 80 - j REDIRECT--to - port 8080
iptables - t nat - A PREROUTING - i eth0 - p tcp--dport 443 - j REDIRECT--to - port 8080
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Looking for HTTPS traffic
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Privacy leakage
● Email address
● Username/password
● Phone number
● IMEI/IMSI
● Home address
● And so much more
See: “Who Knows What About Me? A Survey of Behind the
Scenes Personal Data Sharing to Third Parties by Mobile Apps”
http://jots.pub/a/2015103001/
Sharing more than you intend
Sharing of sensitive data by
Android apps (left) to domains (right)
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Authentication vs. authorization
Do you know the difference?
Authentication
The process of sending
credentials in an
attempt to connect
Authorization
Gaining access to a resource
because configured permissions
allow you access
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Insecure authentication
● Predictable session identifiers
● Failing to log users out
● Session lifetime risks
○ Sessions valid too long
○ Sessions valid across multiple channels
● Session fixation
Who copied my house key???
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Insecure authorization
I feel like being an administrator today.
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.http://disney.wikia.com/wiki/Leia_Organa
“Somebody has to save our [skins servers].”
— Princess Leia
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Server-side issues
● Injection
○ SQL
○ XSS
○ Command
● Improper session handling
● Weak ciphers
● Many more...
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Weak cipher examples
What do you accept?
https://www.ssllabs.com/
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Weak cipher examples
What do you accept?
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Intelligence Gathering
● What IP addresses does your app talk to?
● Query WHOIS to learn more about each IP address
● Use geolocation services to confirm IP address location
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Endpoint identification
https://www.wireshark.org
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Suggested tools for back-end testing
Rooted Android device
I use a Google Nexus 5
Linux machine or VM
w/ Android Studio tools
May we recommend Santoku Linux?
(Also, Kali Linux)
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Tools for testing
Qualys SSL Labs https://www.ssllabs.com/ssltest/
Nmap
https://nmap.org/nsedoc/scripts/ssl-enum-ciphers.html
https://nmap.org/nsedoc/scripts/ssl-cert.html
Mitmproxy http://docs.mitmproxy.org/en/stable/
Burp Suite https://support.portswigger.net/
IPFingerprints http://www.ipfingerprints.com/
Santoku Linux https://santoku-linux.com/
Wireshark https://www.wireshark.org
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Pointers to keep in mind during analysis
Don’t just focus
on the encrypted
payload. Look
at metadata.
When searching
for data in large files,
command line tools
are best: Try grep
Try multiple tools.
Find the one
you’re most
comfortable with.
If you’re scanning a
third-party server,
get permission
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Vulnerable data exists in more than just the payload
Try using both trusted and untrusted certificates
when intercepting data in transit
Don’t underestimate the time/effort involved in
network-focused testing
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
Episode III
ATTACK OF THE CODE
Thursday, January 19
11 a.m. CST / 9 a.m. PST
REGISTER NOW: http://bit.ly/2gOPih8
Let’s talk
NowSecure
+1 312.878.1100
@NowSecureMobile
www.nowsecure.com
Subscribe to #MobSec5 - a digest of the week’s mobile news
that matters - http://mobsec5.nowsecure.com/

More Related Content

PDF
Mobile Penetration Testing: Episode 1 - The Forensic Menace
PDF
How Android and iOS Security Enhancements Complicate Threat Detection
PDF
Mobile Penetration Testing: Episode III - Attack of the Code
PDF
How to make Android apps secure: dos and don’ts
PDF
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
PDF
Via forensics thotcon-2013-mobile-security-with-santoku-linux
PDF
The fundamentals of Android and iOS app security
PDF
It's not about you: Mobile security in 2016
Mobile Penetration Testing: Episode 1 - The Forensic Menace
How Android and iOS Security Enhancements Complicate Threat Detection
Mobile Penetration Testing: Episode III - Attack of the Code
How to make Android apps secure: dos and don’ts
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Via forensics thotcon-2013-mobile-security-with-santoku-linux
The fundamentals of Android and iOS app security
It's not about you: Mobile security in 2016

What's hot (20)

PDF
OWASP Mobile Top 10
PDF
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
PDF
How to scale mobile application security testing
PDF
Five mobile security challenges facing the enterprise
PPTX
Addressing the OWASP Mobile Security Threats using Xamarin
PDF
PDF
Mobile Hacking
PPTX
Communication security 2021
PDF
Owasp Mobile Top 10 - M7 & M8
PDF
Mobile Defense-in-Dev (Depth)
PDF
Cyber Kill Chain: Web Application Exploitation
PDF
Lookout pegasus-android-technical-analysis
PDF
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
PDF
Webinar: Insights from Cyren's 2016 cyberthreat report
PDF
OWASP Day - OWASP Day - Lets secure!
PPTX
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
PDF
Webinar: Is your web security broken? - 10 things you need to know
PPTX
CeBIT 2015 Presentation
PDF
Webinar: IT security at SMBs: 2016 benchmarking survey
PPTX
The Threat Landscape in the Era of Directed Attacks - Webinar
OWASP Mobile Top 10
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
How to scale mobile application security testing
Five mobile security challenges facing the enterprise
Addressing the OWASP Mobile Security Threats using Xamarin
Mobile Hacking
Communication security 2021
Owasp Mobile Top 10 - M7 & M8
Mobile Defense-in-Dev (Depth)
Cyber Kill Chain: Web Application Exploitation
Lookout pegasus-android-technical-analysis
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Webinar: Insights from Cyren's 2016 cyberthreat report
OWASP Day - OWASP Day - Lets secure!
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Webinar: Is your web security broken? - 10 things you need to know
CeBIT 2015 Presentation
Webinar: IT security at SMBs: 2016 benchmarking survey
The Threat Landscape in the Era of Directed Attacks - Webinar
Ad

Similar to Mobile Penetration Testing: Episode II - Attack of the Code (20)

PDF
The Datacenter Network You Wish You Had
PDF
The Datacenter Network You Wish You Had: It's yours for the taking.
PDF
Cybersecurity Fundamentals for Bar Associations
PDF
The Slow Death of Passwords
PDF
Identity Relationship Management - The Right Approach for a Complex Digital W...
PDF
Security & Identity for the Internet of Things Webinar
PPTX
OSX/Pirrit: The blue balls of OS X adware
PDF
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
PDF
Pas d'IoT sans Identité!
PDF
IOT Networks
PDF
Recovering Your Customers From Ransomware Without Paying Ransom
PDF
Cisco Connect Halifax 2018 Anatomy of attack
PPTX
Backstage Tour of Identity - London Identity Summit
PDF
[IGC2018] 잔디소프트 윤세민 - HTML5 게임 어디까지 가능한가
PDF
Hacking intranet websites
PPTX
Financial Grade OAuth & OpenID Connect
PDF
Security and Virtualization in the Data Center
PPTX
[CB16] Background Story of "Operation neutralizing banking malware" and highl...
PDF
Android P Security Updates: What You Need to Know
PPTX
INTOSTREAM INTRO_2016_SEP
The Datacenter Network You Wish You Had
The Datacenter Network You Wish You Had: It's yours for the taking.
Cybersecurity Fundamentals for Bar Associations
The Slow Death of Passwords
Identity Relationship Management - The Right Approach for a Complex Digital W...
Security & Identity for the Internet of Things Webinar
OSX/Pirrit: The blue balls of OS X adware
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
Pas d'IoT sans Identité!
IOT Networks
Recovering Your Customers From Ransomware Without Paying Ransom
Cisco Connect Halifax 2018 Anatomy of attack
Backstage Tour of Identity - London Identity Summit
[IGC2018] 잔디소프트 윤세민 - HTML5 게임 어디까지 가능한가
Hacking intranet websites
Financial Grade OAuth & OpenID Connect
Security and Virtualization in the Data Center
[CB16] Background Story of "Operation neutralizing banking malware" and highl...
Android P Security Updates: What You Need to Know
INTOSTREAM INTRO_2016_SEP
Ad

More from NowSecure (20)

PDF
iOS recon with Radare2
PDF
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
PDF
Android Q & iOS 13 Privacy Enhancements
PDF
Debunking the Top 5 Myths About Mobile AppSec
PDF
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
PDF
Building a Mobile App Pen Testing Blueprint
PDF
Mobile App Security Predictions 2019
PDF
Jeff's Journey: Best Practices for Securing Mobile App DevOps
PDF
A Risk-Based Mobile App Security Testing Strategy
PDF
iOS 12 Preview - What You Need To Know
PDF
5 Tips for Agile Mobile App Security Testing
PDF
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
PDF
5 Mobile App Security MUST-DOs in 2018
PDF
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
PDF
What attackers know about your mobile apps that you don’t: Banking & FinTech
PDF
Solving for Compliance: Mobile app security for banking and financial services
PDF
Leaky Mobile Apps: What You Need to Know
PDF
Vetting Mobile Apps for Corporate Use: Security Essentials
PDF
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
PDF
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
iOS recon with Radare2
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
Android Q & iOS 13 Privacy Enhancements
Debunking the Top 5 Myths About Mobile AppSec
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
Building a Mobile App Pen Testing Blueprint
Mobile App Security Predictions 2019
Jeff's Journey: Best Practices for Securing Mobile App DevOps
A Risk-Based Mobile App Security Testing Strategy
iOS 12 Preview - What You Need To Know
5 Tips for Agile Mobile App Security Testing
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
5 Mobile App Security MUST-DOs in 2018
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
What attackers know about your mobile apps that you don’t: Banking & FinTech
Solving for Compliance: Mobile app security for banking and financial services
Leaky Mobile Apps: What You Need to Know
Vetting Mobile Apps for Corporate Use: Security Essentials
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PDF
Approach and Philosophy of On baking technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Empathic Computing: Creating Shared Understanding
PDF
cuic standard and advanced reporting.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
Chapter 3 Spatial Domain Image Processing.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Encapsulation theory and applications.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Unlocking AI with Model Context Protocol (MCP)
Building Integrated photovoltaic BIPV_UPV.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
Approach and Philosophy of On baking technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Empathic Computing: Creating Shared Understanding
cuic standard and advanced reporting.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity

Mobile Penetration Testing: Episode II - Attack of the Code

  • 1. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. Episode II RETURN OF THE BACK-END/NETWORK
  • 2. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. Episode II RETURN OF THE NETWORK/BACK-END Episode I THE FORENSIC MENACE Episode III ATTACK OF THE CODE
  • 3. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Connect Twitter: @NowSecureMobile — Subscribe to #MobSec5, our weekly mobile security news digest http://mobsec5.nowsecure.com/ — Web: nowsecure.com
  • 4. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Michael Krueger Solutions Engineer | NowSecure
  • 5. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Contents ● The Trilogy series overview ● Data-in-transit ● Server-side security ● Suggested tools to get started
  • 6. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. Mobile forensics & data recovery Network, web services & API testing Server-side penetration testing Reverse engineering & code analysis
  • 7. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. “I can show you the ways of the [Force data in transit].” — Kylo Ren https://milnersblog.com/tag/the-characters-of-star-wars-the-force-awakens/
  • 8. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Data in transit concerns ● Insecure communication ○ Certificate validation issues ○ Privacy leakage ● Insecure authentication ● Insecure authorization ○ Server accepting/responding to requests without authorization ○ Client-based authorization decisions
  • 9. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Man-in-the-middle (MITM) ● Secretly intercept (modify) communications between systems believing they are communicating directly ● Aims to circumvent mutual authentication (or lack thereof) ● Use it to test for potential vulnerabilities and validate that app sends proper requests/intended data Who are you really talking to? Original connection Victim Attacker Presents fake certificate Server
  • 10. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Lack of certificate validation Don’t implement your own crypto! It still happens because developers want to accept self-signed certificates or because code implementation is too complex
  • 11. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Mitmproxy basic setup Device 192.168.10.15 Gateway set to 192.168.10.66 192.168.10.1 Server Laptop w/ mitmproxy Listening at ports 80 & 443 192.168.10.66 Mitmproxy CA certificate (optional)
  • 12. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Android handset gateway configuration
  • 13. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. IP forwarding 1 2 3 sysctl - w net.ipv4.ip_forward = 1 iptables - t nat - A PREROUTING - i eth0 - p tcp--dport 80 - j REDIRECT--to - port 8080 iptables - t nat - A PREROUTING - i eth0 - p tcp--dport 443 - j REDIRECT--to - port 8080
  • 14. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Looking for HTTPS traffic
  • 15. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Privacy leakage ● Email address ● Username/password ● Phone number ● IMEI/IMSI ● Home address ● And so much more See: “Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps” http://jots.pub/a/2015103001/ Sharing more than you intend Sharing of sensitive data by Android apps (left) to domains (right)
  • 16. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Authentication vs. authorization Do you know the difference? Authentication The process of sending credentials in an attempt to connect Authorization Gaining access to a resource because configured permissions allow you access
  • 17. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Insecure authentication ● Predictable session identifiers ● Failing to log users out ● Session lifetime risks ○ Sessions valid too long ○ Sessions valid across multiple channels ● Session fixation Who copied my house key???
  • 18. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Insecure authorization I feel like being an administrator today.
  • 19. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.http://disney.wikia.com/wiki/Leia_Organa “Somebody has to save our [skins servers].” — Princess Leia
  • 20. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Server-side issues ● Injection ○ SQL ○ XSS ○ Command ● Improper session handling ● Weak ciphers ● Many more...
  • 21. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Weak cipher examples What do you accept? https://www.ssllabs.com/
  • 22. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Weak cipher examples What do you accept?
  • 23. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Intelligence Gathering ● What IP addresses does your app talk to? ● Query WHOIS to learn more about each IP address ● Use geolocation services to confirm IP address location
  • 24. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Endpoint identification https://www.wireshark.org
  • 25. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Suggested tools for back-end testing Rooted Android device I use a Google Nexus 5 Linux machine or VM w/ Android Studio tools May we recommend Santoku Linux? (Also, Kali Linux)
  • 26. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Tools for testing Qualys SSL Labs https://www.ssllabs.com/ssltest/ Nmap https://nmap.org/nsedoc/scripts/ssl-enum-ciphers.html https://nmap.org/nsedoc/scripts/ssl-cert.html Mitmproxy http://docs.mitmproxy.org/en/stable/ Burp Suite https://support.portswigger.net/ IPFingerprints http://www.ipfingerprints.com/ Santoku Linux https://santoku-linux.com/ Wireshark https://www.wireshark.org
  • 27. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Pointers to keep in mind during analysis Don’t just focus on the encrypted payload. Look at metadata. When searching for data in large files, command line tools are best: Try grep Try multiple tools. Find the one you’re most comfortable with. If you’re scanning a third-party server, get permission
  • 28. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Vulnerable data exists in more than just the payload Try using both trusted and untrusted certificates when intercepting data in transit Don’t underestimate the time/effort involved in network-focused testing
  • 29. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. Episode III ATTACK OF THE CODE Thursday, January 19 11 a.m. CST / 9 a.m. PST REGISTER NOW: http://bit.ly/2gOPih8
  • 30. Let’s talk NowSecure +1 312.878.1100 @NowSecureMobile www.nowsecure.com Subscribe to #MobSec5 - a digest of the week’s mobile news that matters - http://mobsec5.nowsecure.com/