Oh Yes, I love your private data
Android App Security
Bangalore Meet up @
Abhinav Sejpal
Fidelity Investments
WHO AM I
Next Generation problem Solver
Researcher & Reader in free time
Speaker at
Facilitator at Weekend Testing
Crowd Tester (AKA. Bug bounty Hunter)
Reported Security Vulnerabilities for 50+ unique customers all over the world
inlcluding Apple, yahoo, Outlook, adobe & etc.
Love to develop nasty code & Hack it :)
Works as Security Researcher at
AKA. Bug Wrangler
Null & OWASP Community
Accenture Digital Mobility
~Publication ~
DISCLAIMER
This Presentation is intended for educational purposes only and I cannot be held liable for
any kind of damages done whatsoever to your machine, or other damages.
Please - Don't try this attack on any others system without having context knowledge or
permission, this may harm to someone directly or indirectly.
Feel free to use this presentation for practice or education purpose.
It's no way related to my employer - its my own research and ideas.
^ I hope - You gotcha ^
SOCIAL MEDIA FEED
Hashtag for this session
#OWASPBlr, #MobileSecurity
: Twitter handle for feedback :
@ @OWASPBangalore Abhinav_Sejpal
AGENDA
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
OWASP Bangalore meet - Android Mobile Security
INDIAN HACKERS/INFOSEC GUYS & GROUPS YOU
SHOULD BE FOLLOWING IN TWITTER
Thank-you http://garage4hackers.com/ community
@ , @ @ and @
CREDITS
anantshri exploitprotocol adi1391 5h1vang
Big thank and you one & All.OWASPBANGALORE
YES - I'M DONE!
Feel free to write me at bug.wrangler at outlook.com
LICENSE AND COPYRIGHTS
https://slides.com/abhinavsejpal/owasp-androidsecurity
copyrights 2015-2016 Abhinav Sejpal
-----
(CC BY-NC-ND 3.0)
Attribution-NonCommercial-NoDerivs 3.0 Unported
Dedicated to my lovely daddy

More Related Content

PDF
Android mobile app security offensive security workshop
PDF
Bug Bounty Hunter's Manifesto V1.0
PPTX
LKNOG3 - Bug Bounty
PDF
PDF
GoSec 2015 - Protecting the web from within
PDF
RailsConf 2015 - Metasecurity: Beyond Patching Vulnerabilities
PPTX
Mejores prácticas en el diseño e implementación de APIs
PPTX
Learn why use selenium with 3 million dollar bugs!
Android mobile app security offensive security workshop
Bug Bounty Hunter's Manifesto V1.0
LKNOG3 - Bug Bounty
GoSec 2015 - Protecting the web from within
RailsConf 2015 - Metasecurity: Beyond Patching Vulnerabilities
Mejores prácticas en el diseño e implementación de APIs
Learn why use selenium with 3 million dollar bugs!

What's hot (11)

PPT
James jara portafolio
PPT
How To Fix Bugs
PDF
Bug Bounty Basics
PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
PDF
Build your mobile app from a to z presentation
PDF
KEY
Mozilla Crash Analysis and Reporting
PDF
Uncovering Secrets of Progressive Web Apps
PPT
Spyware
PPT
Spyware and adware
PPT
Spyware Adware1
James jara portafolio
How To Fix Bugs
Bug Bounty Basics
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Build your mobile app from a to z presentation
Mozilla Crash Analysis and Reporting
Uncovering Secrets of Progressive Web Apps
Spyware
Spyware and adware
Spyware Adware1
Ad

Viewers also liked (10)

PPTX
About my blog
PDF
Owasp top 10 web application security hazards part 2
PPT
Facebook voor bestuurders
PDF
Breaking the mould_unlocking_the_benefits_of_a_tailored_upstream_operating_model
PPSX
Semaforo Audiovisual
PDF
Tfs branching guide_main_2010_v1
KEY
Sheepskin Flurries
PDF
Printversion ice summer school 1 7-2013.key
PPT
CERTAMEN DE NAVIDAD. CIBER@AULA FRESNEDILLAS DE LA OLIVA.
DOC
Vek.od.ua Лидерство Доленко
About my blog
Owasp top 10 web application security hazards part 2
Facebook voor bestuurders
Breaking the mould_unlocking_the_benefits_of_a_tailored_upstream_operating_model
Semaforo Audiovisual
Tfs branching guide_main_2010_v1
Sheepskin Flurries
Printversion ice summer school 1 7-2013.key
CERTAMEN DE NAVIDAD. CIBER@AULA FRESNEDILLAS DE LA OLIVA.
Vek.od.ua Лидерство Доленко
Ad

Recently uploaded (20)

PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Architecture types and enterprise applications.pdf
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPT
What is a Computer? Input Devices /output devices
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
CloudStack 4.21: First Look Webinar slides
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Modernising the Digital Integration Hub
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Getting started with AI Agents and Multi-Agent Systems
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Custom Battery Pack Design Considerations for Performance and Safety
Architecture types and enterprise applications.pdf
Convolutional neural network based encoder-decoder for efficient real-time ob...
A review of recent deep learning applications in wood surface defect identifi...
Flame analysis and combustion estimation using large language and vision assi...
Microsoft Excel 365/2024 Beginner's training
sustainability-14-14877-v2.pddhzftheheeeee
What is a Computer? Input Devices /output devices
The influence of sentiment analysis in enhancing early warning system model f...
Benefits of Physical activity for teenagers.pptx
OpenACC and Open Hackathons Monthly Highlights July 2025
NewMind AI Weekly Chronicles – August ’25 Week III
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
CloudStack 4.21: First Look Webinar slides
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Modernising the Digital Integration Hub
Consumable AI The What, Why & How for Small Teams.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...

OWASP Bangalore meet - Android Mobile Security

  • 1. Oh Yes, I love your private data Android App Security Bangalore Meet up @ Abhinav Sejpal Fidelity Investments
  • 2. WHO AM I Next Generation problem Solver Researcher & Reader in free time Speaker at Facilitator at Weekend Testing Crowd Tester (AKA. Bug bounty Hunter) Reported Security Vulnerabilities for 50+ unique customers all over the world inlcluding Apple, yahoo, Outlook, adobe & etc. Love to develop nasty code & Hack it :) Works as Security Researcher at AKA. Bug Wrangler Null & OWASP Community Accenture Digital Mobility
  • 4. DISCLAIMER This Presentation is intended for educational purposes only and I cannot be held liable for any kind of damages done whatsoever to your machine, or other damages. Please - Don't try this attack on any others system without having context knowledge or permission, this may harm to someone directly or indirectly. Feel free to use this presentation for practice or education purpose. It's no way related to my employer - its my own research and ideas. ^ I hope - You gotcha ^
  • 5. SOCIAL MEDIA FEED Hashtag for this session #OWASPBlr, #MobileSecurity : Twitter handle for feedback : @ @OWASPBangalore Abhinav_Sejpal
  • 23. INDIAN HACKERS/INFOSEC GUYS & GROUPS YOU SHOULD BE FOLLOWING IN TWITTER Thank-you http://garage4hackers.com/ community
  • 24. @ , @ @ and @ CREDITS anantshri exploitprotocol adi1391 5h1vang Big thank and you one & All.OWASPBANGALORE
  • 25. YES - I'M DONE! Feel free to write me at bug.wrangler at outlook.com
  • 26. LICENSE AND COPYRIGHTS https://slides.com/abhinavsejpal/owasp-androidsecurity copyrights 2015-2016 Abhinav Sejpal ----- (CC BY-NC-ND 3.0) Attribution-NonCommercial-NoDerivs 3.0 Unported Dedicated to my lovely daddy