SlideShare a Scribd company logo
ANDROID APPLICATION
HACKING 101
DEMO
MYSELF
LET ME INTRODUCE
INTRODUCTION
STEPHANIE VANROELEN
▸ Work as an IT security consultant for Toreon
▸ Core team BruCON
▸ Organize HAK4KIDZ Europe
▸ Volunteer for OWASP Mobile Testing guide
▸ SANS 504 (GCIH) certified
OVERVIEW
QUICK OVERVIEW OF THE NEXT 30 MINUTES
▸ SantaGram app from SANS Holiday Challenge 2016.
▸ What do you need to get started?
▸ Demo
▸ Extract credentials
▸ Extract sensitive data (audio file)
▸ Next steps
SANS HOLIDAY
HACK CHALLENGE?
WHAT IS THE
CHALLENGE
TWO CHALLENGES
▸ 3) What username and password
are embedded in the APK file?
▸ 4) What is the name of the audible
component (audio file) in the
SantaGram APK file?
TOOLS
WHAT TOOLS DO WE NEED TO GET STARTED?
▸ ADB
▸ APKTOOL
▸ shell tools: strings, grep, find, …
▸ jadx-gui
DEMO TIME
NEXT STEPS - LINKS
SO YOU WOULD LIKE TO CONTINUE HACKING ANDROID APPS?
▸ Practice makes perfect
▸ Read, read some more and then read a lot more.
▸ Toreon Mobile trainings
▸ SANS 575
▸ OWASP Mobile security testing guide
NEXT STEPS - LINKS
MORE LINKS
▸ http://stephanie.vanroelen.be/android-application-
pentesting-for-beginners/
▸ Infosec institute blog
▸ http://stephanie.vanroelen.be/android-application-pen-
testing-install-android-vm/
QUESTIONS?

More Related Content

Viewers also liked

Starting with mobile application pen testing
Starting with mobile application pen testingStarting with mobile application pen testing
Starting with mobile application pen testing
Stephanie Vanroelen
 
Mau ghe nail 2017 dep gia re bao hanh 5 nam
Mau ghe nail 2017 dep gia re bao hanh 5 namMau ghe nail 2017 dep gia re bao hanh 5 nam
Mau ghe nail 2017 dep gia re bao hanh 5 nam
Noithat_hcm
 
3Com 10/100BASE-TX
3Com 10/100BASE-TX3Com 10/100BASE-TX
3Com 10/100BASE-TX
savomir
 
La evolución
La evoluciónLa evolución
Tech talent hunting
Tech talent huntingTech talent hunting
Tech talent hunting
Thibault Genaitay
 
Laboratorio di Internazionalizzazione d’Impresa
Laboratorio di Internazionalizzazione d’ImpresaLaboratorio di Internazionalizzazione d’Impresa
Laboratorio di Internazionalizzazione d’Impresa
Octagona Srl
 
Business is a game & the best team wins
Business is a game & the best team winsBusiness is a game & the best team wins
Business is a game & the best team wins
Growthwise
 
Boletim 2017
Boletim 2017Boletim 2017
Guia extraescolares 17-18
Guia extraescolares 17-18Guia extraescolares 17-18
Guia extraescolares 17-18
Educo Servicios y Proyectos Educativos
 
Presentación1
Presentación1Presentación1
Presentación1
jesus rodriguez garcia
 
Ecosistemas eii
Ecosistemas eiiEcosistemas eii
Ecosistemas eii
26844369
 
Excel funciones básicas
Excel funciones básicasExcel funciones básicas
Excel funciones básicas
Carlos Eduardo Camargo Bedoya
 
Ashley manchester
Ashley manchesterAshley manchester
Ashley manchester
Ashley Manchester
 
El origen de_la_vida
El origen de_la_vidaEl origen de_la_vida
El origen de_la_vida
diana-OVIEDO
 
La realidad de mi centro i
La realidad de mi centro iLa realidad de mi centro i
La realidad de mi centro i
emangasl
 
YO
YOYO
Sea power 3.2 session 1 pax britannica
Sea power 3.2 session 1  pax britannicaSea power 3.2 session 1  pax britannica
Sea power 3.2 session 1 pax britannica
Jim Powers
 
презентація досвіду роботи
презентація досвіду роботипрезентація досвіду роботи
презентація досвіду роботи
Олефіренко Володимир
 

Viewers also liked (18)

Starting with mobile application pen testing
Starting with mobile application pen testingStarting with mobile application pen testing
Starting with mobile application pen testing
 
Mau ghe nail 2017 dep gia re bao hanh 5 nam
Mau ghe nail 2017 dep gia re bao hanh 5 namMau ghe nail 2017 dep gia re bao hanh 5 nam
Mau ghe nail 2017 dep gia re bao hanh 5 nam
 
3Com 10/100BASE-TX
3Com 10/100BASE-TX3Com 10/100BASE-TX
3Com 10/100BASE-TX
 
La evolución
La evoluciónLa evolución
La evolución
 
Tech talent hunting
Tech talent huntingTech talent hunting
Tech talent hunting
 
Laboratorio di Internazionalizzazione d’Impresa
Laboratorio di Internazionalizzazione d’ImpresaLaboratorio di Internazionalizzazione d’Impresa
Laboratorio di Internazionalizzazione d’Impresa
 
Business is a game & the best team wins
Business is a game & the best team winsBusiness is a game & the best team wins
Business is a game & the best team wins
 
Boletim 2017
Boletim 2017Boletim 2017
Boletim 2017
 
Guia extraescolares 17-18
Guia extraescolares 17-18Guia extraescolares 17-18
Guia extraescolares 17-18
 
Presentación1
Presentación1Presentación1
Presentación1
 
Ecosistemas eii
Ecosistemas eiiEcosistemas eii
Ecosistemas eii
 
Excel funciones básicas
Excel funciones básicasExcel funciones básicas
Excel funciones básicas
 
Ashley manchester
Ashley manchesterAshley manchester
Ashley manchester
 
El origen de_la_vida
El origen de_la_vidaEl origen de_la_vida
El origen de_la_vida
 
La realidad de mi centro i
La realidad de mi centro iLa realidad de mi centro i
La realidad de mi centro i
 
YO
YOYO
YO
 
Sea power 3.2 session 1 pax britannica
Sea power 3.2 session 1  pax britannicaSea power 3.2 session 1  pax britannica
Sea power 3.2 session 1 pax britannica
 
презентація досвіду роботи
презентація досвіду роботипрезентація досвіду роботи
презентація досвіду роботи
 

Similar to Android infosecurity

Getting started with hacking android & i os apps tools, techniques and re...
Getting started with hacking android & i os apps tools, techniques and re...Getting started with hacking android & i os apps tools, techniques and re...
Getting started with hacking android & i os apps tools, techniques and re...
n|u - The Open Security Community
 
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
OWASP Delhi
 
DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...
DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...
DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...
DevOpsDays Tel Aviv
 
Reversing & malware analysis training part 7 unpacking upx
Reversing & malware analysis training part 7   unpacking upxReversing & malware analysis training part 7   unpacking upx
Reversing & malware analysis training part 7 unpacking upx
Abdulrahman Bassam
 
Ethical Hacking from inside – Step 1: Code Review
Ethical Hacking from inside – Step 1: Code ReviewEthical Hacking from inside – Step 1: Code Review
Ethical Hacking from inside – Step 1: Code Review
Sandro Zaccarini
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
Diana Frolova
 
A Journey of Android Engineer in Start-up Culture
A Journey of Android Engineer in Start-up CultureA Journey of Android Engineer in Start-up Culture
A Journey of Android Engineer in Start-up Culture
Fatima Azzahro
 
Smartphone Security Assessment.LGiles2015
Smartphone Security Assessment.LGiles2015Smartphone Security Assessment.LGiles2015
Smartphone Security Assessment.LGiles2015
Lance Giles
 
Reversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future RoadmapReversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future Roadmap
securityxploded
 
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
John Kinsella
 
How to Incorporate a Security-First Approach to Your Products by spiderSlik C...
How to Incorporate a Security-First Approach to Your Products by spiderSlik C...How to Incorporate a Security-First Approach to Your Products by spiderSlik C...
How to Incorporate a Security-First Approach to Your Products by spiderSlik C...
Product School
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINT
centralohioissa
 
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics MethodsSplunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk
 
Hakin9 05 2013
Hakin9 05 2013Hakin9 05 2013
Hakin9 05 2013
Rodrigo Gomes Pires
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
Moti Sagey מוטי שגיא
 
Security Testing
Security TestingSecurity Testing
Security Testing
BJ Edward Taduran
 
Car Infotainment Hacking Methodology and Attack Surface Scenarios
Car Infotainment Hacking Methodology and Attack Surface ScenariosCar Infotainment Hacking Methodology and Attack Surface Scenarios
Car Infotainment Hacking Methodology and Attack Surface Scenarios
Jay Turla
 
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
Splunk
 
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known VulnerabilitiesUnderstanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Anant Shrivastava
 
Application security testing in the age of Agile development - by Julio Cesar...
Application security testing in the age of Agile development - by Julio Cesar...Application security testing in the age of Agile development - by Julio Cesar...
Application security testing in the age of Agile development - by Julio Cesar...
Blaze Information Security
 

Similar to Android infosecurity (20)

Getting started with hacking android & i os apps tools, techniques and re...
Getting started with hacking android & i os apps tools, techniques and re...Getting started with hacking android & i os apps tools, techniques and re...
Getting started with hacking android & i os apps tools, techniques and re...
 
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
 
DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...
DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...
DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...
 
Reversing & malware analysis training part 7 unpacking upx
Reversing & malware analysis training part 7   unpacking upxReversing & malware analysis training part 7   unpacking upx
Reversing & malware analysis training part 7 unpacking upx
 
Ethical Hacking from inside – Step 1: Code Review
Ethical Hacking from inside – Step 1: Code ReviewEthical Hacking from inside – Step 1: Code Review
Ethical Hacking from inside – Step 1: Code Review
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
 
A Journey of Android Engineer in Start-up Culture
A Journey of Android Engineer in Start-up CultureA Journey of Android Engineer in Start-up Culture
A Journey of Android Engineer in Start-up Culture
 
Smartphone Security Assessment.LGiles2015
Smartphone Security Assessment.LGiles2015Smartphone Security Assessment.LGiles2015
Smartphone Security Assessment.LGiles2015
 
Reversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future RoadmapReversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future Roadmap
 
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
 
How to Incorporate a Security-First Approach to Your Products by spiderSlik C...
How to Incorporate a Security-First Approach to Your Products by spiderSlik C...How to Incorporate a Security-First Approach to Your Products by spiderSlik C...
How to Incorporate a Security-First Approach to Your Products by spiderSlik C...
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINT
 
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics MethodsSplunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
 
Hakin9 05 2013
Hakin9 05 2013Hakin9 05 2013
Hakin9 05 2013
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
Car Infotainment Hacking Methodology and Attack Surface Scenarios
Car Infotainment Hacking Methodology and Attack Surface ScenariosCar Infotainment Hacking Methodology and Attack Surface Scenarios
Car Infotainment Hacking Methodology and Attack Surface Scenarios
 
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
 
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known VulnerabilitiesUnderstanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
 
Application security testing in the age of Agile development - by Julio Cesar...
Application security testing in the age of Agile development - by Julio Cesar...Application security testing in the age of Agile development - by Julio Cesar...
Application security testing in the age of Agile development - by Julio Cesar...
 

Android infosecurity

  • 3. INTRODUCTION STEPHANIE VANROELEN ▸ Work as an IT security consultant for Toreon ▸ Core team BruCON ▸ Organize HAK4KIDZ Europe ▸ Volunteer for OWASP Mobile Testing guide ▸ SANS 504 (GCIH) certified
  • 4. OVERVIEW QUICK OVERVIEW OF THE NEXT 30 MINUTES ▸ SantaGram app from SANS Holiday Challenge 2016. ▸ What do you need to get started? ▸ Demo ▸ Extract credentials ▸ Extract sensitive data (audio file) ▸ Next steps
  • 6. CHALLENGE TWO CHALLENGES ▸ 3) What username and password are embedded in the APK file? ▸ 4) What is the name of the audible component (audio file) in the SantaGram APK file?
  • 7. TOOLS WHAT TOOLS DO WE NEED TO GET STARTED? ▸ ADB ▸ APKTOOL ▸ shell tools: strings, grep, find, … ▸ jadx-gui
  • 9. NEXT STEPS - LINKS SO YOU WOULD LIKE TO CONTINUE HACKING ANDROID APPS? ▸ Practice makes perfect ▸ Read, read some more and then read a lot more. ▸ Toreon Mobile trainings ▸ SANS 575 ▸ OWASP Mobile security testing guide
  • 10. NEXT STEPS - LINKS MORE LINKS ▸ http://stephanie.vanroelen.be/android-application- pentesting-for-beginners/ ▸ Infosec institute blog ▸ http://stephanie.vanroelen.be/android-application-pen- testing-install-android-vm/