SlideShare a Scribd company logo
1 of 91
*[ AUDITING MOBILE APPLICATIONS ]




Author: Jose Selvi
Date: 30/Jun/2011
$ WHOIS JSELVI



                 Jose Selvi
         http://twitter.com/JoseSelvi

   jselvi@s21sec.com     jselvi@pentester.es
http://www.s21sec.com http://www.pentester.es
INDEX

        Apps Revolution

        Divide & Conquer (D&C)

        Mobile Networking

        Server Side

        Client Side

        What’s Up with WhatsApp
APPS REVOLUTION




                  Pág. 5
“OLD SCHOOL” APPS
“OLD SCHOOL” APPS
WEBSITE FEVER
WEBSITE FEVER
WEBSITE FEVER
MOBILE FEVER
MOBILE FEVER
MOBILE FEVER
MOBILE FEVER
MOBILE FEVER
APPLICATIONS EVOLUTION 2010
DIVIDE & CONQUER (D&C)

AND MORE




                         Pág. 5
MOBILE LAB
MOBILE LAB




     CLIENT
MOBILE LAB




              SERVER


     CLIENT
MOBILE LAB




              SERVER


     CLIENT
MOBILE LAB

                           NETWORK
          CLIENT                          SERVER




  Phone full control   Some ways        We CAN’T change
                                        the server
  SW full control      We’re able to
                       control the      We CAN’T have a
                       network          look to the
  We’re able to
                                        software
  change config and
  software             Sometimes hard
                       and expensive    Black Box Testing
JAILBREAK / ROOTING

 Sometimes emulator r00lz!
 • Android Emulator (SDK)
 • iOS Simulator (SDK)

 But sometimes not...

 We don’t have full built-in control
 Maybe we should...
 • iOS Jailbreak
 • Android Rooting
MOBILE NETWORKING




                    Pág. 5
MULTI-CHANNEL!
MOBILE LAB
MAN-IN-THE-MIDDLE

  msf auxiliary(fakedns) >
     [*] DNS bypass domain api.facebook.com resolved 66.220.146.36
     [*] DNS bypass domain iphone.facebook.com resolved 66.220.153.30
     [*] DNS bypass domain m.facebook.com resolved 66.220.158.26
“FAKE” DNS




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                       20.20.20.20   DNS SERVER
“FAKE” DNS




                 ¿whois www.google.com?


 IP: 20.20.20.10                                        10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                                          20.20.20.20   DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                                10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20



                       ¿whois www.google.com?




                        20.20.20.20             DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                           10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20



                                     ¿whois www.google.com?




                       20.20.20.20        DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                               10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20



                                     www.google.com = 74.125.39.104




                       20.20.20.20            DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                                        10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20



                       www.google.com = 74.125.39.104




                         20.20.20.20                    DNS SERVER
“FAKE” DNS




                 www.google.com = 74.125.39.104


 IP: 20.20.20.10                                         10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                                           20.20.20.20   DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                       20.20.20.20   DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                       20.20.20.20   DNS SERVER
“FAKE” DNS




                 ¿whois api.facebook.com?


 IP: 20.20.20.10                                          10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                                            20.20.20.20   DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                                  10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20



                       ¿whois api.facebook.com?




                        20.20.20.20               DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                                        10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20



                       api.facebook.com = 20.20.20.20




                       20.20.20.20                      DNS SERVER
“FAKE” DNS




                 api.facebook.com = 20.20.20.20


 IP: 20.20.20.10                                           10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                                             20.20.20.20   DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                       20.20.20.20   DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20


                       PROXY



                       20.20.20.20   DNS SERVER
REDIRECT TRICK




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0   20.20.20.20
 GW: 20.20.20.20
 DNS: 8.8.8.8




                       PROXY
REDIRECT TRICK




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0   20.20.20.20
 GW: 20.20.20.20
 DNS: 8.8.8.8




                       PROXY
REDIRECT TRICK




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0   20.20.20.20
 GW: 20.20.20.20
 DNS: 8.8.8.8




                       PROXY
SSL/HTTPS




                       PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0           10.10.10.10
 GW: 20.20.20.20
 DNS: 8.8.8.8
SSL/HTTPS




                       PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0           CERT
                                 10.10.10.10
 GW: 20.20.20.20
 DNS: 8.8.8.8
PKI: Public Key Infraestructure



                                     SERVER

                                      PUB    PRIV

              CA
        PUB        PRIV




                                  CLIENT
                                   PUB
                                    PUB
                                     PUB
                                       PUB
                                       CA1
PKI: Public Key Infraestructure


                                     SERVER
       CA
 PUB             PRIV                PUB   PRIV
                         INFO CERT




 CLIENT
       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                     SERVER
       CA
 PUB             PRIV                    PRIV
                         INFO CERT




                           PUB


 CLIENT
       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                     SERVER
       CA
 PUB             PRIV                    PRIV
                         INFO CERT




                           PUB


 CLIENT
       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                     SERVER
       CA
 PUB             PRIV                    PRIV
                         INFO CERT




                           PUB


 CLIENT                  DIGEST


       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                        SERVER
       CA
 PUB             PRIV                       PRIV

                   DIGEST   INFO CERT




                              PUB


 CLIENT                     DIGEST


       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                         SERVER
       CA
 PUB          PRIV                           PRIV
             SIGNED DIGEST   INFO CERT




                               PUB


 CLIENT                      DIGEST


       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                        SERVER
       CA
 PUB             PRIV                       PRIV
                          INFO CERT




                             PUB


 CLIENT                    DIGEST

                        SIGNED DIGEST
       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                        SERVER
       CA
 PUB             PRIV                       PRIV
                          INFO CERT




                            PUB


 CLIENT                    DIGEST

                        SIGNED DIGEST
       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                              SERVER
       CA
 PUB             PRIV                             PRIV
                                  INFO CERT




                                    PUB


 CLIENT
       PUB
        PUB
         PUB
           PUB          DIGEST
           CA1
                  SIGNED DIGEST
PKI: Public Key Infraestructure


                                              SERVER
       CA
 PUB             PRIV                             PRIV
                                  INFO CERT




                                    PUB


 CLIENT
       PUB
        PUB
         PUB
           PUB          DIGEST
           CA1
                        DIGEST’
PKI: Public Key Infraestructure


                                              SERVER
       CA
 PUB             PRIV                             PRIV
                                  INFO CERT




                                    PUB


 CLIENT
       PUB
        PUB
         PUB
           PUB          DIGEST
           CA1
                        DIGEST’
Real Certificate Sample
SSL/HTTPS




                       PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0           10.10.10.10
 GW: 20.20.20.20
 DNS: 8.8.8.8
SSL/HTTPS




                       PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0           CERT
                                 10.10.10.10
 GW: 20.20.20.20
 DNS: 8.8.8.8
SSL/HTTPS




                         PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0   FAKE
                                 CERT
                                   10.10.10.10
                       CERT
 GW: 20.20.20.20
 DNS: 8.8.8.8



                       FAKE
                        CA
SSL/HTTPS




                         PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0   FAKE
                                 CERT
                                   10.10.10.10
                       CERT
 GW: 20.20.20.20
 DNS: 8.8.8.8
SSL/HTTPS




                         PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0   FAKE
                                 CERT
                                   10.10.10.10
                       CERT
 GW: 20.20.20.20
 DNS: 8.8.8.8
SSL/HTTPS




                         PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0   FAKE
                                 CERT
                                   10.10.10.10
                       CERT
 GW: 20.20.20.20
 DNS: 8.8.8.8
SSL/HTTPS




                         PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0   FAKE
                                 CERT
                                   10.10.10.10
                       CERT
 GW: 20.20.20.20
 DNS: 8.8.8.8
IMPORT CERTIFICATES


iPhone / iPad
 • Export from proxy (Burp, ...) o built (openssl, ...).
 • iPhone Configuration Utility



Android
• Only VPN certs, not Web.
• Hard...
• Still Working...
BINGO!
SERVER SIDE




              Pág. 5
AS USUAL...

 Browser
 Nessus
 Qualys
 SQLMap
 Metasploit
 Backtrack
 ...

 Of course, your brain!
CLIENT SIDE




              Pág. 5
iOS BINARY FORMAT
iOS BINARY FORMAT
iOS BINARY FORMAT
iOS BINARY FORMAT
iOS BINARY FORMAT
ANDROID BINARY FORMAT
ANDROID BINARY FORMAT




App.java
ANDROID BINARY FORMAT




App.java   App.class
ANDROID BINARY FORMAT




App.java   App.class    App.dex
ANDROID BINARY FORMAT




App.java   App.class    App.dex
ANDROID BINARY FORMAT




App.java   App.class    App.dex
PUT ALL TOGETHER!
Man-in-the-

     CRACKING VERIFYCERT
certificados como válidos), algo que evidentemente no podrá hacer un atacante que no
tuviera previo control de la máquina pero que nos situa en la posición de un intruso que
haya comprometido previamente el NOC de Good. En esta ocasión, dado que no se ha
conseguido vulnerar los certificados SSL, NO bastaría con el compromiso de algunos de
los routers internmedios, como SI ocurría en el caso anterior.




                                                                              www.s21sec.c
WHAT’S UP WITH WHATSAPP?




                       Pág. 5
WHAT’S UP WITH WHATSAPP?




                       Pág. 5
KNOWN WHATSAPP ISSUES

 Unencrypted Traffic
 • But using 443 tcp port...

 Storing ALL conversation FOREVER

 Storing GPS position!
 • WTF!!
 • Why??!!

 Much more...



 Great research from SecurityByDefault guys!
WHATSAPP HIJACKING
ALERT! SPAM!




               SEC-560:
       Network Penetration Testing
          and Ethical Hacking
THANKS! QUESTIONS?



                Jose Selvi
        http://twitter.com/JoseSelvi

   jselvi@s21sec.com     jselvi@pentester.es
http://www.s21sec.com http://www.pentester.es
*[ THANKS! SEE YOU! ]




            Pág. 7

More Related Content

Similar to Auditing Mobile Apps

Stranger Things: The Forces that Disrupt Netflix
Stranger Things: The Forces that Disrupt NetflixStranger Things: The Forces that Disrupt Netflix
Stranger Things: The Forces that Disrupt NetflixC4Media
 
Functional legacy - how to incorporate ZIO in your legacy services
Functional legacy - how to incorporate ZIO in your legacy servicesFunctional legacy - how to incorporate ZIO in your legacy services
Functional legacy - how to incorporate ZIO in your legacy servicesNatan Silnitsky
 
Networking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey FedorovNetworking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey FedorovSergey Fedorov
 
Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)Andreas Taudte
 
Kubernetes Networking
Kubernetes NetworkingKubernetes Networking
Kubernetes NetworkingCJ Cullen
 
Networking in Kubernetes
Networking in KubernetesNetworking in Kubernetes
Networking in KubernetesMinhan Xia
 
Best practices for using VPNs for easy network-to-network protection
Best practices for using VPNs for easy network-to-network protectionBest practices for using VPNs for easy network-to-network protection
Best practices for using VPNs for easy network-to-network protectionWestermo Network Technologies
 
Consul Connect - EPAM SEC - 22nd september 2018
Consul Connect - EPAM SEC - 22nd september 2018Consul Connect - EPAM SEC - 22nd september 2018
Consul Connect - EPAM SEC - 22nd september 2018Peter Souter
 
Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...
Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...
Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...Daniel Oh
 
AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018
AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018
AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018Amazon Web Services Korea
 
(NET405) Build a Remote Access VPN Solution on AWS
(NET405) Build a Remote Access VPN Solution on AWS(NET405) Build a Remote Access VPN Solution on AWS
(NET405) Build a Remote Access VPN Solution on AWSAmazon Web Services
 
利用AWS建立企業全球化網路
利用AWS建立企業全球化網路利用AWS建立企業全球化網路
利用AWS建立企業全球化網路Amazon Web Services
 
Serverless Design Patterns (London Dev Community)
Serverless Design Patterns (London Dev Community)Serverless Design Patterns (London Dev Community)
Serverless Design Patterns (London Dev Community)Yan Cui
 
Best Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network AttackBest Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network AttackAmazon Web Services
 
AWS SSA Webinar 10 - Getting Started on AWS: Networking
AWS SSA Webinar 10 - Getting Started on AWS: NetworkingAWS SSA Webinar 10 - Getting Started on AWS: Networking
AWS SSA Webinar 10 - Getting Started on AWS: NetworkingCobus Bernard
 
Managing microservices with istio on OpenShift - Meetup
Managing microservices with istio on OpenShift - MeetupManaging microservices with istio on OpenShift - Meetup
Managing microservices with istio on OpenShift - MeetupJosé Román Martín Gil
 
Serveless design patterns
Serveless design patternsServeless design patterns
Serveless design patternsYan Cui
 
The Cloud Foundry bootcamp talk from SpringOne On The Road - Europe
The Cloud Foundry bootcamp talk from SpringOne On The Road - EuropeThe Cloud Foundry bootcamp talk from SpringOne On The Road - Europe
The Cloud Foundry bootcamp talk from SpringOne On The Road - EuropeJoshua Long
 
(SACON 2020) Adventures In SDN Security
(SACON 2020) Adventures In SDN Security(SACON 2020) Adventures In SDN Security
(SACON 2020) Adventures In SDN SecurityPriyanka Aash
 

Similar to Auditing Mobile Apps (20)

Stranger Things: The Forces that Disrupt Netflix
Stranger Things: The Forces that Disrupt NetflixStranger Things: The Forces that Disrupt Netflix
Stranger Things: The Forces that Disrupt Netflix
 
Functional legacy - how to incorporate ZIO in your legacy services
Functional legacy - how to incorporate ZIO in your legacy servicesFunctional legacy - how to incorporate ZIO in your legacy services
Functional legacy - how to incorporate ZIO in your legacy services
 
Networking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey FedorovNetworking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
 
Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)
 
Kubernetes Networking
Kubernetes NetworkingKubernetes Networking
Kubernetes Networking
 
Networking in Kubernetes
Networking in KubernetesNetworking in Kubernetes
Networking in Kubernetes
 
Best practices for using VPNs for easy network-to-network protection
Best practices for using VPNs for easy network-to-network protectionBest practices for using VPNs for easy network-to-network protection
Best practices for using VPNs for easy network-to-network protection
 
Consul Connect - EPAM SEC - 22nd september 2018
Consul Connect - EPAM SEC - 22nd september 2018Consul Connect - EPAM SEC - 22nd september 2018
Consul Connect - EPAM SEC - 22nd september 2018
 
Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...
Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...
Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...
 
VPC and DX PoP @ HKG
VPC and DX PoP @ HKGVPC and DX PoP @ HKG
VPC and DX PoP @ HKG
 
AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018
AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018
AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018
 
(NET405) Build a Remote Access VPN Solution on AWS
(NET405) Build a Remote Access VPN Solution on AWS(NET405) Build a Remote Access VPN Solution on AWS
(NET405) Build a Remote Access VPN Solution on AWS
 
利用AWS建立企業全球化網路
利用AWS建立企業全球化網路利用AWS建立企業全球化網路
利用AWS建立企業全球化網路
 
Serverless Design Patterns (London Dev Community)
Serverless Design Patterns (London Dev Community)Serverless Design Patterns (London Dev Community)
Serverless Design Patterns (London Dev Community)
 
Best Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network AttackBest Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network Attack
 
AWS SSA Webinar 10 - Getting Started on AWS: Networking
AWS SSA Webinar 10 - Getting Started on AWS: NetworkingAWS SSA Webinar 10 - Getting Started on AWS: Networking
AWS SSA Webinar 10 - Getting Started on AWS: Networking
 
Managing microservices with istio on OpenShift - Meetup
Managing microservices with istio on OpenShift - MeetupManaging microservices with istio on OpenShift - Meetup
Managing microservices with istio on OpenShift - Meetup
 
Serveless design patterns
Serveless design patternsServeless design patterns
Serveless design patterns
 
The Cloud Foundry bootcamp talk from SpringOne On The Road - Europe
The Cloud Foundry bootcamp talk from SpringOne On The Road - EuropeThe Cloud Foundry bootcamp talk from SpringOne On The Road - Europe
The Cloud Foundry bootcamp talk from SpringOne On The Road - Europe
 
(SACON 2020) Adventures In SDN Security
(SACON 2020) Adventures In SDN Security(SACON 2020) Adventures In SDN Security
(SACON 2020) Adventures In SDN Security
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Auditing Mobile Apps

  • 1. *[ AUDITING MOBILE APPLICATIONS ] Author: Jose Selvi Date: 30/Jun/2011
  • 2. $ WHOIS JSELVI Jose Selvi http://twitter.com/JoseSelvi jselvi@s21sec.com jselvi@pentester.es http://www.s21sec.com http://www.pentester.es
  • 3. INDEX Apps Revolution Divide & Conquer (D&C) Mobile Networking Server Side Client Side What’s Up with WhatsApp
  • 4. APPS REVOLUTION Pág. 5
  • 16. DIVIDE & CONQUER (D&C) AND MORE Pág. 5
  • 18. MOBILE LAB CLIENT
  • 19. MOBILE LAB SERVER CLIENT
  • 20. MOBILE LAB SERVER CLIENT
  • 21. MOBILE LAB NETWORK CLIENT SERVER Phone full control Some ways We CAN’T change the server SW full control We’re able to control the We CAN’T have a network look to the We’re able to software change config and software Sometimes hard and expensive Black Box Testing
  • 22. JAILBREAK / ROOTING Sometimes emulator r00lz! • Android Emulator (SDK) • iOS Simulator (SDK) But sometimes not... We don’t have full built-in control Maybe we should... • iOS Jailbreak • Android Rooting
  • 23. MOBILE NETWORKING Pág. 5
  • 26. MAN-IN-THE-MIDDLE msf auxiliary(fakedns) > [*] DNS bypass domain api.facebook.com resolved 66.220.146.36 [*] DNS bypass domain iphone.facebook.com resolved 66.220.153.30 [*] DNS bypass domain m.facebook.com resolved 66.220.158.26
  • 27. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 28. “FAKE” DNS ¿whois www.google.com? IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 29. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 ¿whois www.google.com? 20.20.20.20 DNS SERVER
  • 30. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 ¿whois www.google.com? 20.20.20.20 DNS SERVER
  • 31. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 www.google.com = 74.125.39.104 20.20.20.20 DNS SERVER
  • 32. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 www.google.com = 74.125.39.104 20.20.20.20 DNS SERVER
  • 33. “FAKE” DNS www.google.com = 74.125.39.104 IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 34. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 35. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 36. “FAKE” DNS ¿whois api.facebook.com? IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 37. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 ¿whois api.facebook.com? 20.20.20.20 DNS SERVER
  • 38. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 api.facebook.com = 20.20.20.20 20.20.20.20 DNS SERVER
  • 39. “FAKE” DNS api.facebook.com = 20.20.20.20 IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 40. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 41. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 PROXY 20.20.20.20 DNS SERVER
  • 42. REDIRECT TRICK IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 20.20.20.20 GW: 20.20.20.20 DNS: 8.8.8.8 PROXY
  • 43. REDIRECT TRICK IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 20.20.20.20 GW: 20.20.20.20 DNS: 8.8.8.8 PROXY
  • 44. REDIRECT TRICK IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 20.20.20.20 GW: 20.20.20.20 DNS: 8.8.8.8 PROXY
  • 45. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 10.10.10.10 GW: 20.20.20.20 DNS: 8.8.8.8
  • 46. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 CERT 10.10.10.10 GW: 20.20.20.20 DNS: 8.8.8.8
  • 47. PKI: Public Key Infraestructure SERVER PUB PRIV CA PUB PRIV CLIENT PUB PUB PUB PUB CA1
  • 48. PKI: Public Key Infraestructure SERVER CA PUB PRIV PUB PRIV INFO CERT CLIENT PUB PUB PUB PUB CA1
  • 49. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT PUB PUB PUB PUB CA1
  • 50. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT PUB PUB PUB PUB CA1
  • 51. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT DIGEST PUB PUB PUB PUB CA1
  • 52. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV DIGEST INFO CERT PUB CLIENT DIGEST PUB PUB PUB PUB CA1
  • 53. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV SIGNED DIGEST INFO CERT PUB CLIENT DIGEST PUB PUB PUB PUB CA1
  • 54. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT DIGEST SIGNED DIGEST PUB PUB PUB PUB CA1
  • 55. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT DIGEST SIGNED DIGEST PUB PUB PUB PUB CA1
  • 56. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT PUB PUB PUB PUB DIGEST CA1 SIGNED DIGEST
  • 57. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT PUB PUB PUB PUB DIGEST CA1 DIGEST’
  • 58. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT PUB PUB PUB PUB DIGEST CA1 DIGEST’
  • 60. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 10.10.10.10 GW: 20.20.20.20 DNS: 8.8.8.8
  • 61. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 CERT 10.10.10.10 GW: 20.20.20.20 DNS: 8.8.8.8
  • 62. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 FAKE CERT 10.10.10.10 CERT GW: 20.20.20.20 DNS: 8.8.8.8 FAKE CA
  • 63. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 FAKE CERT 10.10.10.10 CERT GW: 20.20.20.20 DNS: 8.8.8.8
  • 64. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 FAKE CERT 10.10.10.10 CERT GW: 20.20.20.20 DNS: 8.8.8.8
  • 65. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 FAKE CERT 10.10.10.10 CERT GW: 20.20.20.20 DNS: 8.8.8.8
  • 66. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 FAKE CERT 10.10.10.10 CERT GW: 20.20.20.20 DNS: 8.8.8.8
  • 67. IMPORT CERTIFICATES iPhone / iPad • Export from proxy (Burp, ...) o built (openssl, ...). • iPhone Configuration Utility Android • Only VPN certs, not Web. • Hard... • Still Working...
  • 69. SERVER SIDE Pág. 5
  • 70. AS USUAL... Browser Nessus Qualys SQLMap Metasploit Backtrack ... Of course, your brain!
  • 71. CLIENT SIDE Pág. 5
  • 80. ANDROID BINARY FORMAT App.java App.class App.dex
  • 81. ANDROID BINARY FORMAT App.java App.class App.dex
  • 82. ANDROID BINARY FORMAT App.java App.class App.dex
  • 84. Man-in-the- CRACKING VERIFYCERT certificados como válidos), algo que evidentemente no podrá hacer un atacante que no tuviera previo control de la máquina pero que nos situa en la posición de un intruso que haya comprometido previamente el NOC de Good. En esta ocasión, dado que no se ha conseguido vulnerar los certificados SSL, NO bastaría con el compromiso de algunos de los routers internmedios, como SI ocurría en el caso anterior. www.s21sec.c
  • 85. WHAT’S UP WITH WHATSAPP? Pág. 5
  • 86. WHAT’S UP WITH WHATSAPP? Pág. 5
  • 87. KNOWN WHATSAPP ISSUES Unencrypted Traffic • But using 443 tcp port... Storing ALL conversation FOREVER Storing GPS position! • WTF!! • Why??!! Much more... Great research from SecurityByDefault guys!
  • 89. ALERT! SPAM! SEC-560: Network Penetration Testing and Ethical Hacking
  • 90. THANKS! QUESTIONS? Jose Selvi http://twitter.com/JoseSelvi jselvi@s21sec.com jselvi@pentester.es http://www.s21sec.com http://www.pentester.es
  • 91. *[ THANKS! SEE YOU! ] Pág. 7