SlideShare a Scribd company logo
Android 
Security 
By – Ravi Rai
Google Android 
 Linux + Java + Google’s Magic = Android 
 Open distribution model 
 Android Market, Amazon Appstore, Verizon 
V Cast 
 Application capabilities are granted by 
permission 
 User settings to enable/disable installation 
from untrusted source 
 Rooting
Key Terms 
 DVM – All application run’s under a virtual 
environment is called davalik virtual 
environment 
 DVM executes files in format is called .dex 
 You Could use utility provided by SDK itself 
called adb
Basics Commands 
 # adb devices ( List down all connected 
devices ) 
 # adb shell ( shell interaction) 
 # ps ( List out all process’s)
File System 
Binaries as Command 
 /system/bin 
 /system/xbin 
Application data 
/data/app 
App need to buy 
/data/app-private /
Android package (.apk) 
 Default extension of android application . 
 It is archived file contains all necessary 
files and folders 
 Files and folders can be extracted using 
7zip or winrar
Apk File structure 
APK 
Classes.dex 
Androidmanif 
est.xml 
Resources.ar 
sc 
Lib Res Assets 
Meta-inf
Screen Lock /Pattern Lock 
Cracking 
 Location of pattern lock and screen lock 
(/data/system) 
# cd /data/system 
#ls 
Gesture. Key 
Password .Key 
#rm gesture.key 
(Note – phone should be rooted)
Auditing android 
application
Content Provider leakage 
 Content Provider – All application use 
content provider to store data within 
application . 
 Unless restriction has been there any 
content provider can access with 
permission by using defined content 
provider 
 All providers have unique resource 
identifier (URI) in order to identify query
Content Provider leakage 
(Cont.) 
 All content provider tool need to be registered in 
andoidmanifest.xml 
 Use apktool to decompile androidmanifest.xml file
Testing for content provider 
leakage 
Step 1 
 # apktool d appname.apk (It will list out all 
files of android application) 
Step 2 
 # grep –R ‘content://’ android manifest 
(Check into manifest file and use grep 
command to search for key words of 
content providers
Testing for content provider 
leakage (Cont) 
 Step 3 
 #adb install vulnerable-app.apk 
 adb shell content query -uri 
 Install application in emulator in order to 
query and confirm vulnerability
Dozer for Automatic testing of 
content leakage 
 # Dozer console connect 
 Dz> run app.provided.finduri 
 ( It will search for content provider in 
android manifest file)
Countermeasure 
Configuration of android manifest.xml is 
Android:exported =false
Insecure File storage 
 No correct permissions leads to this issue 
 Many application store very sensitive 
information in application file 
 Generally game scores and credit points 
store in local memory 
 Loosely configured permission can allow 
other application’s to read data
Steps 
 #adb shells 
 #cd /data/data 
 #ls –l ( to see all file permissions) 
 #Ls –l 
/data/data/com.ravi.example/file’s/useri 
nfo.xml 
 #Grep ‘password 
‘/data/data/com.ravi.example/file’s/useri 
nfo.xml
Countermeasure 
 Provide proper permission and properly 
hash and salt values
Path Traversal Vulnerability 
A directory traversal (or path traversal) 
consists in exploiting insufficient security 
validation / sanitization of user-supplied 
input file names, so that characters 
representing "traverse to parent directory" 
are passed through to the file APIs.
Tools 
 Tool – Dozer 
 dz> run app.provider.finduri 
 Dz> run app.provider.read:content 
Check for android file system and possible 
search inside base system
21 
Client Side Injection 
• Apps using browser libraries 
• Pure web apps 
• Hybrid web/native apps 
• Some familiar faces 
• XSS and HTML Injection 
• SQL Injection 
• New and exciting twists 
• Abusing phone dialer + SMS 
• Abusing in-app payments 
Impact 
• Device 
compromise 
• Toll fraud 
• Privilege 
escalation
22 
M4- Client Side Injection 
 Garden Variety XSS…. With access 
to:
Testing Injection 
 Dz> run app.provider.query (URI) 
projection “* from sqlite_master where 
type = ‘table’ ; --
Thank you 
Question ?????????????

More Related Content

Similar to Android security by ravi-rai

Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
Null Dubai Humla_Romansh_Yadav_Android_app_pentestingNull Dubai Humla_Romansh_Yadav_Android_app_pentesting
Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
Romansh Yadav
 
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat DasNull Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
nullowaspmumbai
 
Android pen test basics
Android pen test basicsAndroid pen test basics
Android pen test basics
OWASPKerala
 
Getting started with Android pentesting
Getting started with Android pentestingGetting started with Android pentesting
Getting started with Android pentesting
Minali Arora
 
Getting started with android
Getting started with androidGetting started with android
Getting started with android
Vandana Verma
 
Reverse engineering android apps
Reverse engineering android appsReverse engineering android apps
Reverse engineering android apps
Pranay Airan
 
Android security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaAndroid security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh Ojha
Yogesh Ojha
 
Securing android applications
Securing android applicationsSecuring android applications
Securing android applications
Jose Manuel Ortega Candel
 
Dissecting Android APK
Dissecting Android APKDissecting Android APK
Dissecting Android APK
Cysinfo Cyber Security Community
 
Thick Application Penetration Testing: Crash Course
Thick Application Penetration Testing: Crash CourseThick Application Penetration Testing: Crash Course
Thick Application Penetration Testing: Crash Course
Scott Sutherland
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security model
Pragati Rai
 
Null mumbai-Android-Insecure-Data-Storage-Exploitation
Null mumbai-Android-Insecure-Data-Storage-ExploitationNull mumbai-Android-Insecure-Data-Storage-Exploitation
Null mumbai-Android-Insecure-Data-Storage-Exploitation
Nitesh Malviya
 
Android For Java Developers
Android For Java DevelopersAndroid For Java Developers
Android For Java Developers
Mike Wolfson
 
Manish Chasta - Securing Android Applications
Manish Chasta - Securing Android ApplicationsManish Chasta - Securing Android Applications
Manish Chasta - Securing Android Applications
Positive Hack Days
 
Artem Сhaykin. Android Application Security.
Artem Сhaykin. Android Application Security.Artem Сhaykin. Android Application Security.
Artem Сhaykin. Android Application Security.
Positive Hack Days
 
Android_Malware_IOAsis_2014_Analysis.pdf
Android_Malware_IOAsis_2014_Analysis.pdfAndroid_Malware_IOAsis_2014_Analysis.pdf
Android_Malware_IOAsis_2014_Analysis.pdf
jjb117343
 
Android application development fundamentals
Android application development fundamentalsAndroid application development fundamentals
Android application development fundamentals
indiangarg
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
Shubhneet Goel
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Ishan Girdhar
 
03 android application structure
03 android application structure03 android application structure
03 android application structure
Sokngim Sa
 

Similar to Android security by ravi-rai (20)

Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
Null Dubai Humla_Romansh_Yadav_Android_app_pentestingNull Dubai Humla_Romansh_Yadav_Android_app_pentesting
Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
 
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat DasNull Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
 
Android pen test basics
Android pen test basicsAndroid pen test basics
Android pen test basics
 
Getting started with Android pentesting
Getting started with Android pentestingGetting started with Android pentesting
Getting started with Android pentesting
 
Getting started with android
Getting started with androidGetting started with android
Getting started with android
 
Reverse engineering android apps
Reverse engineering android appsReverse engineering android apps
Reverse engineering android apps
 
Android security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaAndroid security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh Ojha
 
Securing android applications
Securing android applicationsSecuring android applications
Securing android applications
 
Dissecting Android APK
Dissecting Android APKDissecting Android APK
Dissecting Android APK
 
Thick Application Penetration Testing: Crash Course
Thick Application Penetration Testing: Crash CourseThick Application Penetration Testing: Crash Course
Thick Application Penetration Testing: Crash Course
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security model
 
Null mumbai-Android-Insecure-Data-Storage-Exploitation
Null mumbai-Android-Insecure-Data-Storage-ExploitationNull mumbai-Android-Insecure-Data-Storage-Exploitation
Null mumbai-Android-Insecure-Data-Storage-Exploitation
 
Android For Java Developers
Android For Java DevelopersAndroid For Java Developers
Android For Java Developers
 
Manish Chasta - Securing Android Applications
Manish Chasta - Securing Android ApplicationsManish Chasta - Securing Android Applications
Manish Chasta - Securing Android Applications
 
Artem Сhaykin. Android Application Security.
Artem Сhaykin. Android Application Security.Artem Сhaykin. Android Application Security.
Artem Сhaykin. Android Application Security.
 
Android_Malware_IOAsis_2014_Analysis.pdf
Android_Malware_IOAsis_2014_Analysis.pdfAndroid_Malware_IOAsis_2014_Analysis.pdf
Android_Malware_IOAsis_2014_Analysis.pdf
 
Android application development fundamentals
Android application development fundamentalsAndroid application development fundamentals
Android application development fundamentals
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
03 android application structure
03 android application structure03 android application structure
03 android application structure
 

Recently uploaded

DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
Kamal Acharya
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
CVCSOfficial
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
edwin408357
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
PIMR BHOPAL
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 

Recently uploaded (20)

DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 

Android security by ravi-rai

  • 1. Android Security By – Ravi Rai
  • 2. Google Android  Linux + Java + Google’s Magic = Android  Open distribution model  Android Market, Amazon Appstore, Verizon V Cast  Application capabilities are granted by permission  User settings to enable/disable installation from untrusted source  Rooting
  • 3. Key Terms  DVM – All application run’s under a virtual environment is called davalik virtual environment  DVM executes files in format is called .dex  You Could use utility provided by SDK itself called adb
  • 4. Basics Commands  # adb devices ( List down all connected devices )  # adb shell ( shell interaction)  # ps ( List out all process’s)
  • 5. File System Binaries as Command  /system/bin  /system/xbin Application data /data/app App need to buy /data/app-private /
  • 6. Android package (.apk)  Default extension of android application .  It is archived file contains all necessary files and folders  Files and folders can be extracted using 7zip or winrar
  • 7. Apk File structure APK Classes.dex Androidmanif est.xml Resources.ar sc Lib Res Assets Meta-inf
  • 8. Screen Lock /Pattern Lock Cracking  Location of pattern lock and screen lock (/data/system) # cd /data/system #ls Gesture. Key Password .Key #rm gesture.key (Note – phone should be rooted)
  • 10. Content Provider leakage  Content Provider – All application use content provider to store data within application .  Unless restriction has been there any content provider can access with permission by using defined content provider  All providers have unique resource identifier (URI) in order to identify query
  • 11. Content Provider leakage (Cont.)  All content provider tool need to be registered in andoidmanifest.xml  Use apktool to decompile androidmanifest.xml file
  • 12. Testing for content provider leakage Step 1  # apktool d appname.apk (It will list out all files of android application) Step 2  # grep –R ‘content://’ android manifest (Check into manifest file and use grep command to search for key words of content providers
  • 13. Testing for content provider leakage (Cont)  Step 3  #adb install vulnerable-app.apk  adb shell content query -uri  Install application in emulator in order to query and confirm vulnerability
  • 14. Dozer for Automatic testing of content leakage  # Dozer console connect  Dz> run app.provided.finduri  ( It will search for content provider in android manifest file)
  • 15. Countermeasure Configuration of android manifest.xml is Android:exported =false
  • 16. Insecure File storage  No correct permissions leads to this issue  Many application store very sensitive information in application file  Generally game scores and credit points store in local memory  Loosely configured permission can allow other application’s to read data
  • 17. Steps  #adb shells  #cd /data/data  #ls –l ( to see all file permissions)  #Ls –l /data/data/com.ravi.example/file’s/useri nfo.xml  #Grep ‘password ‘/data/data/com.ravi.example/file’s/useri nfo.xml
  • 18. Countermeasure  Provide proper permission and properly hash and salt values
  • 19. Path Traversal Vulnerability A directory traversal (or path traversal) consists in exploiting insufficient security validation / sanitization of user-supplied input file names, so that characters representing "traverse to parent directory" are passed through to the file APIs.
  • 20. Tools  Tool – Dozer  dz> run app.provider.finduri  Dz> run app.provider.read:content Check for android file system and possible search inside base system
  • 21. 21 Client Side Injection • Apps using browser libraries • Pure web apps • Hybrid web/native apps • Some familiar faces • XSS and HTML Injection • SQL Injection • New and exciting twists • Abusing phone dialer + SMS • Abusing in-app payments Impact • Device compromise • Toll fraud • Privilege escalation
  • 22. 22 M4- Client Side Injection  Garden Variety XSS…. With access to:
  • 23. Testing Injection  Dz> run app.provider.query (URI) projection “* from sqlite_master where type = ‘table’ ; --
  • 24. Thank you Question ?????????????