SlideShare a Scribd company logo
Mobile Vulnerability and Exploitation

        John Sawyer – InGuardians
           Tom Eston – SecureState
      Kevin Johnson – Secure Ideas
John Sawyer
   InGuardians, Inc. - Senior Security
    Analyst
   DarkReading.com - Author/Blogger
   1@stplace - Retired CTF packet
    monkey
     Winners DEFCON 14 & 15
   Avid Mountain Biker…
       in Florida.
Tom Eston
 Manager, SecureState
  Profiling & Penetration Team
 Blogger – SpyLogic.net
 Infrequent Podcaster –
  Security Justice/Social Media
  Security
 Zombie aficionado
 I like to break new technology
Kevin Johnson
 Father of Brenna and Sarah
 Secure Ideas, Senior Security
  Consultant
 SANS Instructor and Author
     SEC542/SEC642/SEC571
   Open-Source Bigot
     SamuraiWTF, Yokoso,
     Laudanum etc
   Ninja
What are we talking about today?
 What’s at risk?
 Tools, Testing and Exploitation
 Common vulnerabilities found in popular apps
   (this is the fun part)
What are Smart Bombs?
 We’ve got powerful technology in the
  palm of our hands!
 We store and transmit sensitive data
 Mobile devices are being used by:
     Major Businesses (PII)
     Energy Companies (The Grid)
     The Government(s)
     Hospitals (PHI)
     Your Mom (Scary)
That’s right…your Mom
Testing Mobile Apps
   What are the 3 major areas for testing?

     File System
      What are apps writing to the file system?
      How is data stored?
     Application Layer
      How are apps communicating via HTTP and
      Web Services? SSL?
     Transport Layer
      How are apps communicating over the
      network? TCP and Third-party APIs
OWASP Top 10 Mobile Risks
1.   Insecure Data Storage
2.   Weak Server Side Controls
3.   Insufficient Transport Layer Protection
4.   Client Side Injection
5.   Poor Authorization and Authentication
OWASP Top 10 Mobile Risks
6. Improper Session Handling
7. Security Decisions Via Untrusted Inputs
8. Side Channel Data Leakage
9. Broken Cryptography
10. Sensitive Information Disclosure
OWASP Mobile Security Project
   You should get involved!
   https://www.owasp.org/index.php/OWASP_Mobile_Security_Project
Other Issues
   Privacy of your data!
     Mobile apps talk to many third party APIs
      (ads)
     What’s collected by Google/Apple/Microsoft?
Common Tools
 SSH
 VNC server
 A compiler (gcc / agcc)
 Android SDK (adb!)
 XCode
 Jailbroken iDevice
 Rooted Android Device
Filesystem Analysis
   Forensic approach
     Filesystem artifacts
     Timeline analysis
     Log analysis
     Temp files
Forensic Tools
   Mobile Forensic Tools
     EnCase, FTK, Cellebrite
   Free and/or Open Source
     file, strings, less, dd, md5sum
     The Sleuthkit (mactime, mac-robber)
Timelines
   Timelines are awesome
     Anyone know log2timeline?
   Filesystem
     mac-robber
     mactime
   Logs
     Application- &
     OS-specific
Filesystem Timelines
   mac-robber
     C app
     free & open source
     must be compiled to run on devices
   mactime
     Part of The Sleuthkit
     runs on Mac, Win, Linux
Compiling mac-robber (Android)
   Android
     Install arm gcc toolchain
     Compile & push via adb
    




     I used Ubuntu, works on MobiSec & Backtrack
     Detailed instructions:
      ○ http://www.darkreading.com/blog/232800148/quick-start-
        guide-compiling-mac-robber-for-android-vuln-research.html
Compiling mac-robber (iOS)
   iOS (jailbroken)
     Download & Install libgcc onto device
     Install iphone-gcc
     Download & Install C headers/libraries
Running mac-robber (iOS)
   iOS & Android via SSH



   Android via adb



   Then, process each with mactime
Filesystem Timelines
Where is the data?
Temp Files
Gallery Lock Lite
   “Protects” your images
Smart Bombs: Mobile Vulnerability and Exploitation
Viewing & Searching Files
 cat, less, vi, strings, grep
 SQLite files
     GUI browser, API (Ruby, Python, etc)
   Android apps
     ashell, aSQLiteManager, aLogViewer
Application Layer - HTTP
   Tools Used:
     Burp Suite
     Burp Suite
     oh yeah Burp Suite!
Why Look at the App Layer?
 Very common in mobile platforms
 Many errors are found within the
  application
     And how it talks to the back end service
   Able to use many existing tools
Launching Burp Suite
   Memory!
Misunderstanding Encryption
Want Credentials?
Transport Layer - TCP
   Tools Used:
     Wireshark
     Tcpdump
     Network Miner
Why look at the transport layer?
 Check to see how network protocols are
  handled in the app
 Easily look for SSL certificate or other
  communication issues
NetworkMiner
 Extracts files/images and more
 Can pull out clear txt credentials
 Quickly view parameters
Smart Bombs: Mobile Vulnerability and Exploitation
TCP Lab Setup
   Run tcpdump directly on the device



   Run Wireshark by sniffing traffic over
    wireless AP or network hub setup (lots
    of ways to do this)

   Import PCAPs into NetworkMiner
App Vulnerabilities
 Several examples that we’ve found
 Many from the Top 25 downloaded apps
Evernote
 Notebooks are stored in the cloud
 But…caches some files on the device…
 OWASP M1: Insecure Data Storage
Smart Bombs: Mobile Vulnerability and Exploitation
MyFitnessPal
   Android app stores sensitive data on the
    device (too much data)
Smart Bombs: Mobile Vulnerability and Exploitation
Password Keeper “Lite”
 PIN and passwords stored in clear-text
  SQLite database
 So much for the security of your
  passwords…
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Draw Something
 Word list stored on the device
 Modify to mess with your friends
LinkedIn
 SSL only for authentication
 Session tokens and data sent over HTTP
 Lots of apps do this
 M3: Insufficient Transport Layer Protection
Auth over SSL




                Data sent over HTTP
Smart Bombs: Mobile Vulnerability and Exploitation
Pandora
 Registration over HTTP
 User name/Password and Registration
  info sent over clear text
 Unfortunately…lots of apps do this
Smart Bombs: Mobile Vulnerability and Exploitation
Hard Coded Passwords/Keys
 Major Grocery Chain “Rewards” Android app
 Simple to view the source, extract private key
 OWASP M9: Broken Cryptography
 Do developers really do this?
Why yes, they do!
Privacy Issues
 Example: Draw Something App (Top 25)
 UDID and more sent to the following
  third-party ad providers:
     appads.com
     mydas.mobi
     greystripe.com
     tapjoyads.com
What is UDID?
   Alpha-numeric string that uniquely
    identifies an Apple device
Smart Bombs: Mobile Vulnerability and Exploitation
Pinterest and Flurry.com
Smart Bombs: Mobile Vulnerability and Exploitation
Conclusions
 Mobile devices are critically common
 Most people use them without thinking
  of security
 Developers seem to be repeating the
  past
 We need to secure this area
Contact Us
   John Sawyer
     Twitter: @johnhsawyer
     john@inguardians.com
   Tom Eston
     Twitter: @agent0x0
     teston@securestate.com
   Kevin Johnson
     Twitter: @secureideas
     kjohnson@secureideas.net

More Related Content

PDF
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
PDF
Smart Bombs: Mobile Vulnerability and Exploitation
PDF
Attacking and Defending Apple iOS Devices
PDF
YOW! Connected 2014 - Developing Secure iOS Applications
PDF
Malware on Smartphones and Tablets - The Inconvenient Truth
PPTX
iOS Security and Encryption
PPT
Jail breaking
PDF
Security Best Practices for Mobile Development
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Smart Bombs: Mobile Vulnerability and Exploitation
Attacking and Defending Apple iOS Devices
YOW! Connected 2014 - Developing Secure iOS Applications
Malware on Smartphones and Tablets - The Inconvenient Truth
iOS Security and Encryption
Jail breaking
Security Best Practices for Mobile Development

What's hot (20)

PPTX
Pentesting iPhone applications
PDF
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
PPTX
Hacking Mobile Apps
PDF
Android Hacking
PDF
Ruxmon April 2014 - Introduction to iOS Penetration Testing
PPT
Mobile Security Assessment: 101
PDF
Android security and penetration testing | DIVA | Yogesh Ojha
KEY
Jailbreaking iOS
PDF
Hacking and Securing iOS Apps : Part 1
PPT
WhatsApp Forensic
PDF
Yow connected developing secure i os applications
PDF
Mobile Hacking
PDF
Hacking your Android (slides)
PPTX
Android Hacking + Pentesting
PDF
BYOM Build Your Own Methodology (in Mobile Forensics)
PPTX
iOS-Application-Security-iAmPr3m
PDF
Mobile Application Security Code Reviews
PDF
Let's Hack a House
PDF
Android system security
PDF
Android Security Development
Pentesting iPhone applications
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Hacking Mobile Apps
Android Hacking
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Mobile Security Assessment: 101
Android security and penetration testing | DIVA | Yogesh Ojha
Jailbreaking iOS
Hacking and Securing iOS Apps : Part 1
WhatsApp Forensic
Yow connected developing secure i os applications
Mobile Hacking
Hacking your Android (slides)
Android Hacking + Pentesting
BYOM Build Your Own Methodology (in Mobile Forensics)
iOS-Application-Security-iAmPr3m
Mobile Application Security Code Reviews
Let's Hack a House
Android system security
Android Security Development
Ad

Viewers also liked (20)

PDF
The Android vs. Apple iOS Security Showdown
PPT
GPS and Weapons Technology
PPTX
Stealth fighter technolgy
PPT
Deepak e bomb
PDF
Radar ppt
PPTX
Comparison of mobile os
PPTX
Android vs iOS security
PPTX
PCA General Assembly Report 2016
PPTX
real numbers
PPTX
PDF
Naval Aircraft & Missiles Web
PPTX
India's advancement in missile defence system
PPS
China Railway Highspeed Train Jan 2015
PDF
Research on Comparative Study of Different Mobile Operating System_Part-1
PPT
Ricky seminar
PPTX
Ballistic missile defense system
 
PPTX
Railway coaches
PPTX
Laser Guided Misiles
PDF
SmartphoneHacking_Android_Exploitation
PPTX
Application of dc generator at railway coach
The Android vs. Apple iOS Security Showdown
GPS and Weapons Technology
Stealth fighter technolgy
Deepak e bomb
Radar ppt
Comparison of mobile os
Android vs iOS security
PCA General Assembly Report 2016
real numbers
Naval Aircraft & Missiles Web
India's advancement in missile defence system
China Railway Highspeed Train Jan 2015
Research on Comparative Study of Different Mobile Operating System_Part-1
Ricky seminar
Ballistic missile defense system
 
Railway coaches
Laser Guided Misiles
SmartphoneHacking_Android_Exploitation
Application of dc generator at railway coach
Ad

Similar to Smart Bombs: Mobile Vulnerability and Exploitation (20)

PPTX
Mobile security
PPTX
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
PPTX
Pentesting Android Apps
PDF
Android App Hacking - Erez Metula, AppSec
PDF
DefCamp_2016_Chemerkin_Yury_--_publish.pdf
PPTX
Lecture about network and host security to NII students
DOCX
FBI & Secret Service- Business Email Compromise Workshop
PPTX
Android– forensics and security testing
PDF
Next Dimension and Cisco | Solutions for PIPEDA Compliance
PPTX
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
PDF
Hacking android apps by srini0x00
DOCX
Webinar Security: Apps of Steel transcription
PPTX
Securing Underprotected APIs - Deja vu Security
PPT
Web Application Testing for Today’s Biggest and Emerging Threats
PPTX
Mobile application security
PPTX
Mobile Application Security
PPT
Introduction To Information Security
PPTX
Pentesting iOS Applications
PPTX
Secure Android Apps- nVisium Security
PPTX
Untitled 1
Mobile security
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Pentesting Android Apps
Android App Hacking - Erez Metula, AppSec
DefCamp_2016_Chemerkin_Yury_--_publish.pdf
Lecture about network and host security to NII students
FBI & Secret Service- Business Email Compromise Workshop
Android– forensics and security testing
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Hacking android apps by srini0x00
Webinar Security: Apps of Steel transcription
Securing Underprotected APIs - Deja vu Security
Web Application Testing for Today’s Biggest and Emerging Threats
Mobile application security
Mobile Application Security
Introduction To Information Security
Pentesting iOS Applications
Secure Android Apps- nVisium Security
Untitled 1

More from Tom Eston (15)

PDF
Privacy Exposed: Ramifications of Social Media and Mobile Technology
PDF
Cash is King: Who's Wearing Your Crown?
PDF
Social Zombies: Rise of the Mobile Dead
PDF
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
PDF
Social Zombies Gone Wild: Totally Exposed and Uncensored
PDF
Social Zombies II: Your Friends Need More Brains
KEY
Enterprise Open Source Intelligence Gathering
KEY
Staying Safe & Secure on Twitter
KEY
New School Man-in-the-Middle
KEY
Rise of the Autobots: Into the Underground of Social Network Bots
PPT
Information Gathering With Maltego
PPT
Automated Penetration Testing With Core Impact
PPT
Automated Penetration Testing With The Metasploit Framework
PPT
Physical Security Assessments
PDF
Online Social Networks: 5 threats and 5 ways to use them safely
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Cash is King: Who's Wearing Your Crown?
Social Zombies: Rise of the Mobile Dead
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies II: Your Friends Need More Brains
Enterprise Open Source Intelligence Gathering
Staying Safe & Secure on Twitter
New School Man-in-the-Middle
Rise of the Autobots: Into the Underground of Social Network Bots
Information Gathering With Maltego
Automated Penetration Testing With Core Impact
Automated Penetration Testing With The Metasploit Framework
Physical Security Assessments
Online Social Networks: 5 threats and 5 ways to use them safely

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Modernizing your data center with Dell and AMD
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
Chapter 3 Spatial Domain Image Processing.pdf
Big Data Technologies - Introduction.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Machine learning based COVID-19 study performance prediction
Encapsulation_ Review paper, used for researhc scholars
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Empathic Computing: Creating Shared Understanding
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Modernizing your data center with Dell and AMD
Review of recent advances in non-invasive hemoglobin estimation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Monthly Chronicles - July 2025
MYSQL Presentation for SQL database connectivity
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Advanced methodologies resolving dimensionality complications for autism neur...

Smart Bombs: Mobile Vulnerability and Exploitation

  • 1. Mobile Vulnerability and Exploitation John Sawyer – InGuardians Tom Eston – SecureState Kevin Johnson – Secure Ideas
  • 2. John Sawyer  InGuardians, Inc. - Senior Security Analyst  DarkReading.com - Author/Blogger  1@stplace - Retired CTF packet monkey  Winners DEFCON 14 & 15  Avid Mountain Biker… in Florida.
  • 3. Tom Eston  Manager, SecureState Profiling & Penetration Team  Blogger – SpyLogic.net  Infrequent Podcaster – Security Justice/Social Media Security  Zombie aficionado  I like to break new technology
  • 4. Kevin Johnson  Father of Brenna and Sarah  Secure Ideas, Senior Security Consultant  SANS Instructor and Author  SEC542/SEC642/SEC571  Open-Source Bigot  SamuraiWTF, Yokoso, Laudanum etc  Ninja
  • 5. What are we talking about today?  What’s at risk?  Tools, Testing and Exploitation  Common vulnerabilities found in popular apps (this is the fun part)
  • 6. What are Smart Bombs?  We’ve got powerful technology in the palm of our hands!  We store and transmit sensitive data  Mobile devices are being used by:  Major Businesses (PII)  Energy Companies (The Grid)  The Government(s)  Hospitals (PHI)  Your Mom (Scary)
  • 8. Testing Mobile Apps  What are the 3 major areas for testing?  File System What are apps writing to the file system? How is data stored?  Application Layer How are apps communicating via HTTP and Web Services? SSL?  Transport Layer How are apps communicating over the network? TCP and Third-party APIs
  • 9. OWASP Top 10 Mobile Risks 1. Insecure Data Storage 2. Weak Server Side Controls 3. Insufficient Transport Layer Protection 4. Client Side Injection 5. Poor Authorization and Authentication
  • 10. OWASP Top 10 Mobile Risks 6. Improper Session Handling 7. Security Decisions Via Untrusted Inputs 8. Side Channel Data Leakage 9. Broken Cryptography 10. Sensitive Information Disclosure
  • 11. OWASP Mobile Security Project  You should get involved!  https://www.owasp.org/index.php/OWASP_Mobile_Security_Project
  • 12. Other Issues  Privacy of your data!  Mobile apps talk to many third party APIs (ads)  What’s collected by Google/Apple/Microsoft?
  • 13. Common Tools  SSH  VNC server  A compiler (gcc / agcc)  Android SDK (adb!)  XCode  Jailbroken iDevice  Rooted Android Device
  • 14. Filesystem Analysis  Forensic approach  Filesystem artifacts  Timeline analysis  Log analysis  Temp files
  • 15. Forensic Tools  Mobile Forensic Tools  EnCase, FTK, Cellebrite  Free and/or Open Source  file, strings, less, dd, md5sum  The Sleuthkit (mactime, mac-robber)
  • 16. Timelines  Timelines are awesome  Anyone know log2timeline?  Filesystem  mac-robber  mactime  Logs  Application- & OS-specific
  • 17. Filesystem Timelines  mac-robber  C app  free & open source  must be compiled to run on devices  mactime  Part of The Sleuthkit  runs on Mac, Win, Linux
  • 18. Compiling mac-robber (Android)  Android  Install arm gcc toolchain  Compile & push via adb   I used Ubuntu, works on MobiSec & Backtrack  Detailed instructions: ○ http://www.darkreading.com/blog/232800148/quick-start- guide-compiling-mac-robber-for-android-vuln-research.html
  • 19. Compiling mac-robber (iOS)  iOS (jailbroken)  Download & Install libgcc onto device  Install iphone-gcc  Download & Install C headers/libraries
  • 20. Running mac-robber (iOS)  iOS & Android via SSH  Android via adb  Then, process each with mactime
  • 22. Where is the data?
  • 24. Gallery Lock Lite  “Protects” your images
  • 26. Viewing & Searching Files  cat, less, vi, strings, grep  SQLite files  GUI browser, API (Ruby, Python, etc)  Android apps  ashell, aSQLiteManager, aLogViewer
  • 27. Application Layer - HTTP  Tools Used:  Burp Suite  Burp Suite  oh yeah Burp Suite!
  • 28. Why Look at the App Layer?  Very common in mobile platforms  Many errors are found within the application  And how it talks to the back end service  Able to use many existing tools
  • 32. Transport Layer - TCP  Tools Used:  Wireshark  Tcpdump  Network Miner
  • 33. Why look at the transport layer?  Check to see how network protocols are handled in the app  Easily look for SSL certificate or other communication issues
  • 34. NetworkMiner  Extracts files/images and more  Can pull out clear txt credentials  Quickly view parameters
  • 36. TCP Lab Setup  Run tcpdump directly on the device  Run Wireshark by sniffing traffic over wireless AP or network hub setup (lots of ways to do this)  Import PCAPs into NetworkMiner
  • 37. App Vulnerabilities  Several examples that we’ve found  Many from the Top 25 downloaded apps
  • 38. Evernote  Notebooks are stored in the cloud  But…caches some files on the device…  OWASP M1: Insecure Data Storage
  • 40. MyFitnessPal  Android app stores sensitive data on the device (too much data)
  • 42. Password Keeper “Lite”  PIN and passwords stored in clear-text SQLite database  So much for the security of your passwords…
  • 46. Draw Something  Word list stored on the device  Modify to mess with your friends
  • 47. LinkedIn  SSL only for authentication  Session tokens and data sent over HTTP  Lots of apps do this  M3: Insufficient Transport Layer Protection
  • 48. Auth over SSL Data sent over HTTP
  • 50. Pandora  Registration over HTTP  User name/Password and Registration info sent over clear text  Unfortunately…lots of apps do this
  • 52. Hard Coded Passwords/Keys  Major Grocery Chain “Rewards” Android app  Simple to view the source, extract private key  OWASP M9: Broken Cryptography  Do developers really do this?
  • 54. Privacy Issues  Example: Draw Something App (Top 25)  UDID and more sent to the following third-party ad providers:  appads.com  mydas.mobi  greystripe.com  tapjoyads.com
  • 55. What is UDID?  Alpha-numeric string that uniquely identifies an Apple device
  • 59. Conclusions  Mobile devices are critically common  Most people use them without thinking of security  Developers seem to be repeating the past  We need to secure this area
  • 60. Contact Us  John Sawyer  Twitter: @johnhsawyer  john@inguardians.com  Tom Eston  Twitter: @agent0x0  teston@securestate.com  Kevin Johnson  Twitter: @secureideas  kjohnson@secureideas.net