SlideShare a Scribd company logo
The Art Of
Android Hacking
by, Abhinav Mishra (0ctac0der)
Who is this weird tall guy??
Abhinav Mishra | @0ctac0der
Senior Security Consultant @ TOTHENEW Digital
Top 5 Mobile Security Researcher | Synack Red Team (@SynackRedTeam)
Web and Mobile Application Security Researcher
Bug Bounty Hunter, Speaker, Trainer, Traveler, Movie buff
Have you seen “Mr. Robot” ? Any comments? Link
What is he talking about??
● Android application security
○ Android architecture
○ Application structure
○ Cool tools and distributions
○ Emulators, Devices, Attacks, Vulnerabilities …..
● What (& How) to look for in an android application
● Some interesting findings
● (Random talks)
● Cool demonstrations
● Next steps to learn android appsec
Que le jeu commence…..
Quick Questions
● What all you know about android…
● Application structure
● Vulnerability ?
Okay, my turn now
● What you want to know/learn?
● What you want me to demo?
● Any tool you love? We can talk….
Quick Android Walkthrough
● Linux Kernel
● Privilege separation Model
(UID & GID)
● Android Permission model
(android manifest)
● APK components:
○ AndroidManifest.xml
○ Classes.dex
○ META-INF
○ Resources.arsc
○ Assets
○ Res
○ Lib
Reversing a cute APK
Things I am going to do in next 10-15 minutes:
● Choose any apk
● Decompile with apktool | $apktool d package_name.apk
● Read and understand the AndroidManifest.xml
● Showing components in the code:
○ Activities, Broadcast receivers, Content providers ….
● Extract the apk with any extractor
● Change the classes.dex to jar | $dex2jar classes.dex
● Show multiple java classes
● Possible issues to be discovered
● SMALI files and converting to JAR
Tools & Demos
● Emulators???
○ Genymotion
○ Android Studio | AVD
● ADB (Android Debug Bridge)
○ $adb install
○ $ adb pull / push
● AppUse Virtual Machine
● Android Monitor / Logcat
● Application Local files
Drozer Basics
● Drozer client and server
● Setting up the console
● Basic commands:
○ $ run app.packer.list
○ $run app.package.info
○ $run app.package.attacksurface
○ $ run app.activity.start
15 min checks
1. Debuggable | Backup : True ???
2. AndroidManifest: Permissions
3. Hardcoded stuff
4. SSL Pinning ??
5. Drozer: attack surface | exported components
6. Local storage encryption
7. Sdcard storage | public folder usage
8. TLS protection check
Because Money matters
Vulnerability 1
Date: Mar-2014
Issue: Debuggable = True
Bounty: $500
How to check:
APK AndroidManifest.xml “debuggable=true”
Because Money matters
Vulnerability 2
Date: May-2015
Issue: App fragment injection
Bounty: $250
How to check:
Anyone?
Because Money matters
Vulnerability 3
Date: May-2015
Issue: Hardcoded Account Credentials
Bounty: $200
How to check:
Anyone?
Because Money matters
Vulnerability 4
Date: June-2015
Issue: Exported component malicious usage
Bounty: $1000
How to check:
Anyone?
Because Money matters
Vulnerability 5
Date: Oct-2015
Issue: Parameter manipulation
Bounty: $1000
How to check:
Let me explain this one to you.
My virtual machine (Droider)
Prerequisites
● 16 GB RAM
● Intel COREi7 processor
● 500 GB free hard disk space
● Minimum internet speed required 50 MBPS
● Google Nexus 7 device, rooted
What Next ….
● Learn more
● Read online
● Use tools: Drozer, QARK etc.
● Start practising

More Related Content

PPTX
Peerlyst Delhi NCR Chapter Meet
PDF
Android Hacking
PDF
Learning by hacking - android application hacking tutorial
PDF
Hacking your Android (slides)
PDF
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
PPTX
[Wroclaw #1] Android Security Workshop
PDF
Hacking android apps by srini0x00
PDF
Android security and penetration testing | DIVA | Yogesh Ojha
Peerlyst Delhi NCR Chapter Meet
Android Hacking
Learning by hacking - android application hacking tutorial
Hacking your Android (slides)
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
[Wroclaw #1] Android Security Workshop
Hacking android apps by srini0x00
Android security and penetration testing | DIVA | Yogesh Ojha

What's hot (20)

PDF
My Null Android Penetration Session
PPTX
Pentesting Android Applications
PPTX
[Wroclaw #2] iOS Security - 101
PDF
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
PDF
Mobile Application Pentest [Fast-Track]
PDF
Android Security & Penetration Testing
PDF
Owasp advanced mobile-application-code-review-techniques-v0.2
PDF
Pentesting Mobile Applications (Prashant Verma)
PDF
Stealing sensitive data from android phones the hacker way
PPTX
Webinar On Ethical Hacking & Cybersecurity - Day2
PDF
Security Best Practices for Mobile Development
PPTX
Ransomware - what is it, how to protect against it
PDF
Android Tamer (Anant Shrivastava)
PDF
Android Security Development
PDF
Security Issues in Android Custom ROM
PDF
Android App Hacking - Erez Metula, AppSec
PPTX
Hacking with Remote Admin Tools (RAT)
PDF
BYOM Build Your Own Methodology (in Mobile Forensics)
PDF
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
PDF
Android Security - Common Security Pitfalls in Android Applications
My Null Android Penetration Session
Pentesting Android Applications
[Wroclaw #2] iOS Security - 101
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Mobile Application Pentest [Fast-Track]
Android Security & Penetration Testing
Owasp advanced mobile-application-code-review-techniques-v0.2
Pentesting Mobile Applications (Prashant Verma)
Stealing sensitive data from android phones the hacker way
Webinar On Ethical Hacking & Cybersecurity - Day2
Security Best Practices for Mobile Development
Ransomware - what is it, how to protect against it
Android Tamer (Anant Shrivastava)
Android Security Development
Security Issues in Android Custom ROM
Android App Hacking - Erez Metula, AppSec
Hacking with Remote Admin Tools (RAT)
BYOM Build Your Own Methodology (in Mobile Forensics)
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
Android Security - Common Security Pitfalls in Android Applications

Viewers also liked (16)

PPT
Mobile phone Data Hacking
PDF
Mobile Hacking
PDF
Android Security Basics
PDF
Growth Hacking For Mobile - Hack 2 Validate & Hack 2 Grow
PDF
Hacking Android OS
PPTX
Hacking Mobile Apps
PPTX
Android Hacking + Pentesting
PDF
How not to make a hacker friendly application
PDF
Discovering Google Secrets
PPTX
password cracking and Key logger
PPTX
Password Cracking
PPTX
Password Attack
PDF
Grow Hack Athens Pt.1: Growth Hacking For Web Apps
PPT
TYPES OF HACKING
PPTX
Hacking ppt
PPTX
Hacking & its types
Mobile phone Data Hacking
Mobile Hacking
Android Security Basics
Growth Hacking For Mobile - Hack 2 Validate & Hack 2 Grow
Hacking Android OS
Hacking Mobile Apps
Android Hacking + Pentesting
How not to make a hacker friendly application
Discovering Google Secrets
password cracking and Key logger
Password Cracking
Password Attack
Grow Hack Athens Pt.1: Growth Hacking For Web Apps
TYPES OF HACKING
Hacking ppt
Hacking & its types

Similar to The art of android hacking (20)

PDF
Getting started with Android pentesting
PPTX
Getting started with android
PDF
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
PDF
CNIT 128 6. Analyzing Android Applications (Part 1)
PDF
Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
PPTX
Advanced Malware Analysis Training Session 8 - Introduction to Android
PPTX
Rapid Android Application Security Testing
PDF
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
PPTX
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
PPTX
Hacker Halted 2014 - Reverse Engineering the Android OS
PDF
Hacking your Droid (Aditya Gupta)
PDF
Reading Group Presentation: Why Eve and Mallory Love Android
PDF
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
PPTX
Android village @nullcon 2012
PPTX
How to Test Security and Vulnerability of Your Android and iOS Apps
PDF
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
PDF
Testing Android Security Codemotion Amsterdam edition
PDF
Testing Android Security - Jose Manuel Ortega Candel - Codemotion Amsterdam 2016
PPTX
Untitled 1
PPTX
Android Security
Getting started with Android pentesting
Getting started with android
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
CNIT 128 6. Analyzing Android Applications (Part 1)
Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
Advanced Malware Analysis Training Session 8 - Introduction to Android
Rapid Android Application Security Testing
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Hacker Halted 2014 - Reverse Engineering the Android OS
Hacking your Droid (Aditya Gupta)
Reading Group Presentation: Why Eve and Mallory Love Android
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
Android village @nullcon 2012
How to Test Security and Vulnerability of Your Android and iOS Apps
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
Testing Android Security Codemotion Amsterdam edition
Testing Android Security - Jose Manuel Ortega Candel - Codemotion Amsterdam 2016
Untitled 1
Android Security

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Cell Structure & Organelles in detailed.
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Basic Mud Logging Guide for educational purpose
O5-L3 Freight Transport Ops (International) V1.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Microbial disease of the cardiovascular and lymphatic systems
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Complications of Minimal Access Surgery at WLH
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Final Presentation General Medicine 03-08-2024.pptx
Pharma ospi slides which help in ospi learning
Cell Structure & Organelles in detailed.
Week 4 Term 3 Study Techniques revisited.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
TR - Agricultural Crops Production NC III.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Renaissance Architecture: A Journey from Faith to Humanism
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx

The art of android hacking

  • 1. The Art Of Android Hacking by, Abhinav Mishra (0ctac0der)
  • 2. Who is this weird tall guy?? Abhinav Mishra | @0ctac0der Senior Security Consultant @ TOTHENEW Digital Top 5 Mobile Security Researcher | Synack Red Team (@SynackRedTeam) Web and Mobile Application Security Researcher Bug Bounty Hunter, Speaker, Trainer, Traveler, Movie buff Have you seen “Mr. Robot” ? Any comments? Link
  • 3. What is he talking about?? ● Android application security ○ Android architecture ○ Application structure ○ Cool tools and distributions ○ Emulators, Devices, Attacks, Vulnerabilities ….. ● What (& How) to look for in an android application ● Some interesting findings ● (Random talks) ● Cool demonstrations ● Next steps to learn android appsec
  • 4. Que le jeu commence….. Quick Questions ● What all you know about android… ● Application structure ● Vulnerability ? Okay, my turn now ● What you want to know/learn? ● What you want me to demo? ● Any tool you love? We can talk….
  • 5. Quick Android Walkthrough ● Linux Kernel ● Privilege separation Model (UID & GID) ● Android Permission model (android manifest) ● APK components: ○ AndroidManifest.xml ○ Classes.dex ○ META-INF ○ Resources.arsc ○ Assets ○ Res ○ Lib
  • 6. Reversing a cute APK Things I am going to do in next 10-15 minutes: ● Choose any apk ● Decompile with apktool | $apktool d package_name.apk ● Read and understand the AndroidManifest.xml ● Showing components in the code: ○ Activities, Broadcast receivers, Content providers …. ● Extract the apk with any extractor ● Change the classes.dex to jar | $dex2jar classes.dex ● Show multiple java classes ● Possible issues to be discovered ● SMALI files and converting to JAR
  • 7. Tools & Demos ● Emulators??? ○ Genymotion ○ Android Studio | AVD ● ADB (Android Debug Bridge) ○ $adb install ○ $ adb pull / push ● AppUse Virtual Machine ● Android Monitor / Logcat ● Application Local files
  • 8. Drozer Basics ● Drozer client and server ● Setting up the console ● Basic commands: ○ $ run app.packer.list ○ $run app.package.info ○ $run app.package.attacksurface ○ $ run app.activity.start
  • 9. 15 min checks 1. Debuggable | Backup : True ??? 2. AndroidManifest: Permissions 3. Hardcoded stuff 4. SSL Pinning ?? 5. Drozer: attack surface | exported components 6. Local storage encryption 7. Sdcard storage | public folder usage 8. TLS protection check
  • 10. Because Money matters Vulnerability 1 Date: Mar-2014 Issue: Debuggable = True Bounty: $500 How to check: APK AndroidManifest.xml “debuggable=true”
  • 11. Because Money matters Vulnerability 2 Date: May-2015 Issue: App fragment injection Bounty: $250 How to check: Anyone?
  • 12. Because Money matters Vulnerability 3 Date: May-2015 Issue: Hardcoded Account Credentials Bounty: $200 How to check: Anyone?
  • 13. Because Money matters Vulnerability 4 Date: June-2015 Issue: Exported component malicious usage Bounty: $1000 How to check: Anyone?
  • 14. Because Money matters Vulnerability 5 Date: Oct-2015 Issue: Parameter manipulation Bounty: $1000 How to check: Let me explain this one to you.
  • 15. My virtual machine (Droider) Prerequisites ● 16 GB RAM ● Intel COREi7 processor ● 500 GB free hard disk space ● Minimum internet speed required 50 MBPS ● Google Nexus 7 device, rooted
  • 16. What Next …. ● Learn more ● Read online ● Use tools: Drozer, QARK etc. ● Start practising