SlideShare a Scribd company logo
1 of 57
Download to read offline
LINE
Game
Security
Mobile Client Protect
By AIR ARMOR Lead Sang Min, Chung
20180405
LINE
Game
Security
Mobile Client Protect
Sang Min, Chung April 2018
Who should you fight?
Abuser, Cheater, Reverser, Hacker, …
No, security solution vs abuser.
Do not trust security solutions.
There is no complete security solution.
Developer vs Abuser
Abusers among Abusers
Hacker
Manageable Hobby, Interest, Beginner
Business
Business
Distribution Community
Hacking Steps
Abusing
Find exceptional situation (bug).
Network, Time
Scanning Phase
Combine
Bypass Hide
Xposed + Xline Bypasser + xLINE Games + GameGuardian
Outside
File
Crypto
Network
TLS
Resource
Validation
Bug
Test
Interesting
Time-consuming
Reversing Phase
Inside
Binary
?
Binary
?
Binary
?
Binary
?
Boring
IDA, JEB, Cydia Substrate, Xposed, FRIDA, apktool, dex2jar, HexRay ...
Symbol, Constant, Debug Info, Swizzling, Hooking, Vulnerability, …
Binary == Code
Symbols and Focus
No time-consuming
Difficulty by Difference
Disadvantage
User(= abuser) friendly secure environment,
Permission, Private API, Identification, Serial, MAC
Sandboxing
Platform Version,
armeabi, armeabi-v7a, arm64-v8a, x86, x86_64, mips, mips64
Supporting Target
x86 s/w emulator,
Intel, ASUS, Taiwan
libhoudini.so
Dalvik, ART, App thinning , bitcode, …
Jailbreak is a threat,
Rooting is not a threat, Thailand
iOS vs Android
PoC, Rough, Aggressive, Experimental, ...
Crash? No problem!
Self-Defense
catch_.me_.if_.you_.can_
How do we do?
Security
Honeypot, Trap
Detection, Obfuscation
Hunt
Monitoring
Don’t request!
Blocking != Security
Try to monitor
Security == Management
Developers can do
Symbols
Human-Readable, Printable
Hide Symbols
No Base64
No! Base64
Use Local Variable
Hide Strings
Use Local Variable
Hide Strings
Custom Encoder, Mix Table, Rotate Byte
Make Custom Encoder
Use Local Variable
Use Stack
Use Byte Array
Encode to Byte Array
dlopen, dlsym
Dynamic Linking
Java
Reflection
Jni RegisterNative
No! Export JNI
Jni RegisterNative
Register JNI
Sample Code
Sample
Sample Code
Sample
Sample Code
Sample
Sample Code
Sample
-
Hide Variable
Common mistake
leak
curl
curl
X509TurstManager
TrustManager
HostnameVerifier
HostnameVerifier
WebViewClient onReceivedSslError
WebViewClient
strncpy
string.h
#define
Log
Proguard
Log
os_log
Log
Closing Remark
Developer vs Abuser
Try something and Try something,
Try something again, still Try something,
Try again the next day, Try again the next week,
Try so on.
Hacker Mentality
Remember it
Anti-symbols
Check
grep –rn ”.*” *
THANK YOU
https://air.line.me/

More Related Content

Similar to LINE Game Security II by AIR ARMOR Chung Sang Min 20180405

2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final
MARIUS EUGEN OPRAN
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
Being Uniq Sonu
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
Andris Soroka
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
TechGenie
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
frontone
 

Similar to LINE Game Security II by AIR ARMOR Chung Sang Min 20180405 (20)

How AI used in cybersecurity
How AI used in cybersecurityHow AI used in cybersecurity
How AI used in cybersecurity
 
CrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deckCrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deck
 
MongoDB .local Toronto 2019: Keep your Business Safe and Scaling Holistically...
MongoDB .local Toronto 2019: Keep your Business Safe and Scaling Holistically...MongoDB .local Toronto 2019: Keep your Business Safe and Scaling Holistically...
MongoDB .local Toronto 2019: Keep your Business Safe and Scaling Holistically...
 
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...DevSecCon London 2018: Building effective DevSecOps teams through role-playin...
DevSecCon London 2018: Building effective DevSecOps teams through role-playin...
 
Mobile Game Hacking: Defense Against the Dark Arts | James Ahn
Mobile Game Hacking: Defense Against the Dark Arts | James AhnMobile Game Hacking: Defense Against the Dark Arts | James Ahn
Mobile Game Hacking: Defense Against the Dark Arts | James Ahn
 
ShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attackShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attack
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web Designinng
 
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
 
Oh... that's ransomware and... look behind you a three-headed Monkey
Oh... that's ransomware and... look behind you a three-headed MonkeyOh... that's ransomware and... look behind you a three-headed Monkey
Oh... that's ransomware and... look behind you a three-headed Monkey
 
SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!
 
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 

LINE Game Security II by AIR ARMOR Chung Sang Min 20180405