SlideShare a Scribd company logo
Mobile App Security Meet
OWASP Mobile Top 10
Mobile App Security Meet
Recap
History
● Open Web Application Security Project
● Started in 2001 as an online community
● De facto standard for Application security
● Mandated standard by Compliances
● 42000+ Strong
Mobile App Security Meet
Famous Projects
● Top 10 Issues (Documentation)
● Security tools
● Damn Vulnerable Apps (WebGoat)
● Code Review Guidelines
Mobile App Security Meet
Why Top10 for Mobile?
● Started in 2010
● Essential : Mobile >>> PC/Laptop
● Attack Landscape
● More Targets
● 6.1B by 2018
Mobile App Security Meet
What Mobile App Security boils down to?
Mobile App Security Meet
Securing assets on the device
Mobile App Security Meet
Principles
➢ Do not store/leak data ➢ Do not Drive
Mobile App Security Meet
Principles
➢ Do not store/leak data
➢ Do not store/leak sensitive data
➢ Do not Drive
➢ Do not Drink and Drive
Mobile App Security Meet
Principles
➢ Do not store/leak data
➢ Do not store/leak sensitive data
➢ Do not store/leak sensitive data in plain
➢ Do not Drive
➢ Do not Drink and Drive
➢ Do not Drink and Drive in a F1 race
Mobile App Security Meet
Relevant OWASP Sections
● M2 – Insecure Data Storage
● M4 – Unintended Data Leakage
● M7 – Client Side Injection
● M10 – Lack of Binary Protection
Mobile App Security Meet
M2 – Insecure Data Storage
● Adversary got physical access to phone
● Presence of Malware which accesses file system
● Your app runs on a rooted or jailbroken device
Mobile App Security Meet
M2 : Whats stored?
● Unames
● Authtokens
● Passwords
● UDID/EMEI **
● SSN
● Credit card Numbers
● Appdata – Cache, Log,
Mobile App Security Meet
M2 : Locations
● SQLite Dbs
● Log Files
● PlistFiles
● XML Files
● SD Card
● CloudSynced
● Shared Preferences
Mobile App Security Meet
M4 : Unintended Data Leakage
● Placing sensitive information in insecure location
● Overlap with M2
Mobile App Security Meet
M4 : Threat Model Locations
● Application Backgrounding
● Logging
● Clipboard
● URL Caching
● CrashLogs
● LocalStorage
● Analytics Data sent
Mobile App Security Meet
M7 Client Side Injections
● Execution of malicious code in the context and scope of mobile app
● Sometimes with privileged scope
Mobile App Security Meet
M7 : Locations
● Sqlite Injection
● Local file Inclusions
● XSS (WebView)
● Intent Injections
Mobile App Security Meet
M10 : lack of Binary Protection
● A Binary at a client side cannot be trusted for its integrity
● Execution of a Binary can be monitored and altered
● IP can be decoded and used elsewhere
Mobile App Security Meet
M10 : Results in
● Repackaging to insert Malware or Adware
● Bypass security Control
● Runtime Code Injection
● Method Swizzling
Mobile App Security Meet
M10 : Best Practices
● JailBreak Detection Controls
● Checksum Controls
● Debug Detection controls
● Android Root Detection
Mobile App Security Meet
Securing assets on the wire and at server
Mobile App Security Meet
● M1 – Weak Server Side Controls
● M3 – Insufficient Transport Layer Protection
● M5 – Poor Authentication and Authorisation
● M6 – Broken Cryptography
● M8 - Security Decisions via Untrusted Inputs
● M9 – Improper Session Handling
Mobile App Security Meet
M1 : Weak Server Side Controls
● Traditions SQL Injection
● XSS
● CSRF
● Other OWASP Top 10 (Web)
Mobile App Security Meet
M3 : Insufficient Transport Layer Protection
● Results in MITM
● SSL Certificates
● Strong enough Ciphers
● HTTP/HTTPS
● SSL Pinning
Mobile App Security Meet
M5 : Poor Authentication and Authorisation
All client-side authorization and authentication controls will be
bypassed
”
Mobile App Security Meet
M5 : Poor Authentication and Authorisation
Authorization and authentication controls must be re-enforced
on the server-side
Mobile App Security Meet
M9 : Improper Session Handling
● Results are same as M5
● Have a good time out
● Rotate cookies
● Switching access levels
● Creation of secure tokens
Mobile App Security Meet
M6 : Broken Cryptography
● Still using MD5, RC2 ?
● Move on!
● Use strong Algos
● White Box Crypto (WBC)!!
Mobile App Security Meet
M8 : Security Decisions Via Untrusted Inputs
● Threat model all your app inputs
● IPC??
● Hidden fields
● Parameters to determine access level
Mobile App Security Meet
Conclusion
● Mobile App Security is critical and maturing at a faster pace
● Refer to OWASP guidelines to build accepted level of security within the mobile applications

More Related Content

PPTX
Owasp mobile top 10
PDF
OWASP Mobile Top 10
PPTX
Android pentesting
PPTX
Android Application Penetration Testing - Mohammed Adam
PDF
Web Application Security
PPTX
Android Hacking + Pentesting
PPTX
Secure coding practices
PPTX
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Owasp mobile top 10
OWASP Mobile Top 10
Android pentesting
Android Application Penetration Testing - Mohammed Adam
Web Application Security
Android Hacking + Pentesting
Secure coding practices
Automated Security Analysis of Android & iOS Applications with Mobile Securit...

What's hot (20)

PPTX
Secure Coding 101 - OWASP University of Ottawa Workshop
PPT
Owasp Top 10 And Security Flaw Root Causes
PPTX
Automated API pentesting using fuzzapi
PDF
Api security-testing
PDF
OWASP Mobile Top 10 Deep-Dive
PDF
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
PPTX
OWASP Top 10 2021 What's New
PDF
OWASP API Security Top 10 - API World
PDF
Android security and penetration testing | DIVA | Yogesh Ojha
PPTX
Secure coding practices
PPTX
Mobile Application Testing
PPTX
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
PDF
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
PDF
Android Security & Penetration Testing
PDF
Security testing in mobile applications
PPTX
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
PPT
Secure code practices
PDF
Secure Code Review 101
PPT
Introduction To OWASP
PPTX
Vulnerabilities in modern web applications
Secure Coding 101 - OWASP University of Ottawa Workshop
Owasp Top 10 And Security Flaw Root Causes
Automated API pentesting using fuzzapi
Api security-testing
OWASP Mobile Top 10 Deep-Dive
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
OWASP Top 10 2021 What's New
OWASP API Security Top 10 - API World
Android security and penetration testing | DIVA | Yogesh Ojha
Secure coding practices
Mobile Application Testing
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
Android Security & Penetration Testing
Security testing in mobile applications
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Secure code practices
Secure Code Review 101
Introduction To OWASP
Vulnerabilities in modern web applications
Ad

Viewers also liked (8)

PDF
Owasp Mobile Top 10 – 2014
PPTX
Addressing the OWASP Mobile Security Threats using Xamarin
PDF
Owasp Top 10 (M-10 : Lack of Binary Protection) | Null Meet
PDF
Owasp Mobile Top 10 - M7 & M8
PPTX
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
PDF
It's not about you: Mobile security in 2016
PPTX
Applications mobiles et sécurité
PDF
OWASP Day - OWASP Day - Lets secure!
Owasp Mobile Top 10 – 2014
Addressing the OWASP Mobile Security Threats using Xamarin
Owasp Top 10 (M-10 : Lack of Binary Protection) | Null Meet
Owasp Mobile Top 10 - M7 & M8
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
It's not about you: Mobile security in 2016
Applications mobiles et sécurité
OWASP Day - OWASP Day - Lets secure!
Ad

Similar to OWASP Top 10 for Mobile (20)

PPTX
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
PDF
Mobile Application Security Threats through the Eyes of the Attacker
PPTX
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
PDF
Mobile Threats and Owasp Top 10 Risks
PDF
OWASP_Russia_2016_-_Yury_Chemerkin_--_run.pdf
PPTX
OWASP Mobile TOP 10 2014
PDF
Debunking the Top 5 Myths About Mobile AppSec
PDF
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
PDF
How to make Android apps secure: dos and don’ts
PDF
Security Best Practices for Mobile Development
PDF
Creating secure apps using the salesforce mobile sdk
PPTX
Mobile Security - Dutch Mobile .Net Developers
PPTX
apidays New York 2025 - Why an SDK is Needed to Protect APIs from Mobile Apps...
PPTX
Appsecurity, win or loose
ODP
Secure VoIP - DroidCon 2015
PDF
OWASP Mobile Security: Top 10 Risks for 2017
PDF
OWASP Top 10 Proactive Control 2016 (C5-C10)
PPT
Mobile code mining for discovery and exploits nullcongoa2013
PDF
DefCamp_2016_Chemerkin_Yury_--_publish.pdf
PDF
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Mobile Application Security Threats through the Eyes of the Attacker
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Mobile Threats and Owasp Top 10 Risks
OWASP_Russia_2016_-_Yury_Chemerkin_--_run.pdf
OWASP Mobile TOP 10 2014
Debunking the Top 5 Myths About Mobile AppSec
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
How to make Android apps secure: dos and don’ts
Security Best Practices for Mobile Development
Creating secure apps using the salesforce mobile sdk
Mobile Security - Dutch Mobile .Net Developers
apidays New York 2025 - Why an SDK is Needed to Protect APIs from Mobile Apps...
Appsecurity, win or loose
Secure VoIP - DroidCon 2015
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Top 10 Proactive Control 2016 (C5-C10)
Mobile code mining for discovery and exploits nullcongoa2013
DefCamp_2016_Chemerkin_Yury_--_publish.pdf
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?

OWASP Top 10 for Mobile

  • 1. Mobile App Security Meet OWASP Mobile Top 10
  • 2. Mobile App Security Meet Recap History ● Open Web Application Security Project ● Started in 2001 as an online community ● De facto standard for Application security ● Mandated standard by Compliances ● 42000+ Strong
  • 3. Mobile App Security Meet Famous Projects ● Top 10 Issues (Documentation) ● Security tools ● Damn Vulnerable Apps (WebGoat) ● Code Review Guidelines
  • 4. Mobile App Security Meet Why Top10 for Mobile? ● Started in 2010 ● Essential : Mobile >>> PC/Laptop ● Attack Landscape ● More Targets ● 6.1B by 2018
  • 5. Mobile App Security Meet What Mobile App Security boils down to?
  • 6. Mobile App Security Meet Securing assets on the device
  • 7. Mobile App Security Meet Principles ➢ Do not store/leak data ➢ Do not Drive
  • 8. Mobile App Security Meet Principles ➢ Do not store/leak data ➢ Do not store/leak sensitive data ➢ Do not Drive ➢ Do not Drink and Drive
  • 9. Mobile App Security Meet Principles ➢ Do not store/leak data ➢ Do not store/leak sensitive data ➢ Do not store/leak sensitive data in plain ➢ Do not Drive ➢ Do not Drink and Drive ➢ Do not Drink and Drive in a F1 race
  • 10. Mobile App Security Meet Relevant OWASP Sections ● M2 – Insecure Data Storage ● M4 – Unintended Data Leakage ● M7 – Client Side Injection ● M10 – Lack of Binary Protection
  • 11. Mobile App Security Meet M2 – Insecure Data Storage ● Adversary got physical access to phone ● Presence of Malware which accesses file system ● Your app runs on a rooted or jailbroken device
  • 12. Mobile App Security Meet M2 : Whats stored? ● Unames ● Authtokens ● Passwords ● UDID/EMEI ** ● SSN ● Credit card Numbers ● Appdata – Cache, Log,
  • 13. Mobile App Security Meet M2 : Locations ● SQLite Dbs ● Log Files ● PlistFiles ● XML Files ● SD Card ● CloudSynced ● Shared Preferences
  • 14. Mobile App Security Meet M4 : Unintended Data Leakage ● Placing sensitive information in insecure location ● Overlap with M2
  • 15. Mobile App Security Meet M4 : Threat Model Locations ● Application Backgrounding ● Logging ● Clipboard ● URL Caching ● CrashLogs ● LocalStorage ● Analytics Data sent
  • 16. Mobile App Security Meet M7 Client Side Injections ● Execution of malicious code in the context and scope of mobile app ● Sometimes with privileged scope
  • 17. Mobile App Security Meet M7 : Locations ● Sqlite Injection ● Local file Inclusions ● XSS (WebView) ● Intent Injections
  • 18. Mobile App Security Meet M10 : lack of Binary Protection ● A Binary at a client side cannot be trusted for its integrity ● Execution of a Binary can be monitored and altered ● IP can be decoded and used elsewhere
  • 19. Mobile App Security Meet M10 : Results in ● Repackaging to insert Malware or Adware ● Bypass security Control ● Runtime Code Injection ● Method Swizzling
  • 20. Mobile App Security Meet M10 : Best Practices ● JailBreak Detection Controls ● Checksum Controls ● Debug Detection controls ● Android Root Detection
  • 21. Mobile App Security Meet Securing assets on the wire and at server
  • 22. Mobile App Security Meet ● M1 – Weak Server Side Controls ● M3 – Insufficient Transport Layer Protection ● M5 – Poor Authentication and Authorisation ● M6 – Broken Cryptography ● M8 - Security Decisions via Untrusted Inputs ● M9 – Improper Session Handling
  • 23. Mobile App Security Meet M1 : Weak Server Side Controls ● Traditions SQL Injection ● XSS ● CSRF ● Other OWASP Top 10 (Web)
  • 24. Mobile App Security Meet M3 : Insufficient Transport Layer Protection ● Results in MITM ● SSL Certificates ● Strong enough Ciphers ● HTTP/HTTPS ● SSL Pinning
  • 25. Mobile App Security Meet M5 : Poor Authentication and Authorisation All client-side authorization and authentication controls will be bypassed ”
  • 26. Mobile App Security Meet M5 : Poor Authentication and Authorisation Authorization and authentication controls must be re-enforced on the server-side
  • 27. Mobile App Security Meet M9 : Improper Session Handling ● Results are same as M5 ● Have a good time out ● Rotate cookies ● Switching access levels ● Creation of secure tokens
  • 28. Mobile App Security Meet M6 : Broken Cryptography ● Still using MD5, RC2 ? ● Move on! ● Use strong Algos ● White Box Crypto (WBC)!!
  • 29. Mobile App Security Meet M8 : Security Decisions Via Untrusted Inputs ● Threat model all your app inputs ● IPC?? ● Hidden fields ● Parameters to determine access level
  • 30. Mobile App Security Meet Conclusion ● Mobile App Security is critical and maturing at a faster pace ● Refer to OWASP guidelines to build accepted level of security within the mobile applications