SlideShare a Scribd company logo
Mobil Malware Analiz Süreçlerini 
Otomatikleştirme 
İbrahim BALİÇ 
ibrahim@balicbilisim.com
Ajanda 
• Ben Kimim 
• Malware Analiz 
• Süreçler 
• Otomasyon 
• Örnek 
• Sorular
Ben Kimim? 
• Security Researcher @ BalichIT 
• Online Projeler 
Android Sandbox – http://www.androidsandbox.net 
Android Remote Admin/Access Tool – https://github.com/ibrahimbalic/AndroidRAT 
• Devameden Projeler 
iOS Sandbox – http://www.iossandbox.com 
Approwler – http://www.approwler.com 
• Offline Projeler 
Online Mobile App Builder – http://uygu.la 
MalTrack – http://maltrack.balicbilisim.com 
• Apple, Facebook, Opera, Google vs. @ Whitehat Hacker 
• Links 
SQLMap CSRF Bypass – http://www.exploit-db.com/wp-content/themes/exploit/docs/34193.pdf 
Software Vulnerabilities – http://www.exploit-db.com/wp-content/themes/exploit/docs/29139.pdf 
Mobil Forensics 1 – http://www.bilgiguvenligi.gov.tr/adli-analiz/mobile-forensics-bolum-1.html 
Mobil Forensics 2 – http://www.bilgiguvenligi.gov.tr/adli-analiz/mobile-forensics-bolum-2.html 
Android Internals – http://www.bilgiguvenligi.gov.tr/mobil-cihaz-guvenligi/android-internals-part-i.html 
Bilgi Güvenliğine Giriş – http://www.bilgiguvenligi.gov.tr/veri-gizliligi/bilgi-guvenligine-giris.html
Malware Analiz 
“Malware, kullanıcı veya hedef sistemlere zarar veren her 
türlü uygulama için kullanılan “Zararlı Uygulama” kavramının 
genel adıdır.”
Malware Analiz 
Uygulama Nedir? 
“Elektronik araçların Önceden belirlenmiş standartları çerçevesinde 
bir araya getirilmiş görevler/işlemler zinciridir.”
Malware Analiz 
Standartlar Nedir? 
• İşlemci Mimarisi (CPU) 
• İşletim Sistemi (OS) 
• Framework (library) 
.... 
... 
.
Malware Analiz 
+ Diğer donanımlar = 
+ OS (Operating System)
Malware Analiz 
Standartlar Nedir?
Malware Analiz 
main ( int arc, char **argv ) { 
return 0; 
} 
x64 Mips
Malware Analiz 
#include <stdio.h> 
main ( int arc, char **argv ) { 
return 0; 
} 
int ibrahimbalic(int a) { 
return 0; 
} 
./nm –A istsecII
Malware Analiz 
#include <stdio.h> 
main ( int arc, char **argv ) { 
return 0; 
} 
int ibrahimbalic(int a) { 
return 0; 
} 
./objdump -t istsecII
Malware Analiz 
#include <stdio.h> 
main ( int arc, char **argv ) { 
return 0; 
} 
int ibrahimbalic(int a) { 
return 0; 
} 
IDA
Malware Analiz 
int main(int argc, char *argv[]) 
{ 
char mesaj[] = "IstSECn"; 
struct sockaddr_in dest; 
struct sockaddr_in serv; 
int istsecport; 
socklen_t socksize = sizeof(struct sockaddr_in); 
memset(&serv, 0, sizeof(serv)); 
serv.sin_family = AF_INET; 
serv.sin_addr.s_addr = htonl(INADDR_ANY); 
serv.sin_port = htons(PORTNUM); 
istsecport = socket(AF_INET, SOCK_STREAM, 0); 
bind(istsecport, (struct sockaddr *)&serv, sizeof(struct sockaddr)); 
listen(istsecport, 1); 
int gelenbag = accept(istsecport, (struct sockaddr *)&dest, &socksize); 
while(gelenbag) 
{ 
printf("Mesaj gonderildi. %sn", inet_ntoa(dest.sin_addr)); 
send(gelenbag, mesaj, strlen(mesaj), 0); 
gelenbag = accept(istsecport, (struct sockaddr *)&dest, &socksize); 
} 
close(gelenbag); 
close(istsecport); 
return 0; 
} 
./nm –A istsecIII
Malware Analiz
Malware Analiz 
• Statik Malware Analiz 
• Dinamik Malware Analiz
Süreçler 
.APK Analiz 
Strings 
Disassemble codes 
Decompilling 
Network Activiteleri 
strace (), ltrace() 
…
Süreçler 
.APK 
Analiz 
Strings 
aapt d --values strings test.apk 
String pool of 20 unique UTF-8 non-sorted strings, 20 entries and 0 styles using 828 bytes: 
String #0: res/drawable/elite_background.png 
String #1: res/drawable/elite_logo.png 
String #2: res/layout/activity_main.xml 
String #3: res/layout/lock_screen.xml 
String #4: res/layout/main_uninstall_admin_device.xml 
String #5: res/anim/fadein.xml 
String #6: res/anim/fadeout.xml 
String #7: res/xml/device_admin_sample.xml 
String #8: res/menu/main.xml 
String #9: res/drawable-mdpi/ic_launcher.png 
String #10: res/drawable-hdpi/ic_launcher.png 
String #11: res/drawable-xhdpi/ic_launcher.png 
String #12: res/drawable-xxhdpi/ic_launcher.png 
String #13: Angry Bird Transformers 
String #14: Settings 
String #15: Angry Bird Transformers: A parent's care for child. 
String #16: To ensure the correct installation of Angry Bird Transformers, you must press the "ACTIVATE" button below. 
String #17: Device admin setting activated successfully. 
String #18: Elite has hacked you.Obey or be hacked. 
String #19: com.hellboy
Süreçler 
.APK 
Analiz 
disassemble code 
dexdump –d classes.dex 
Processing 'classes.dex'... 
Opened 'classes.dex', DEX version '035' 
Class #0 - 
Class descriptor : 'Landroid/support/annotation/AnimRes;' 
Access flags : 0x2601 (PUBLIC INTERFACE ABSTRACT ANNOTATION) 
Superclass : 'Ljava/lang/Object;' 
Interfaces - 
#0 : 'Ljava/lang/annotation/Annotation;' 
Static fields - 
Instance fields - 
Direct methods - 
Virtual methods - 
source_file_idx : 466 (AnimRes.java)
Süreçler 
.APK 
Analiz 
Decompilling 
dex2jar classes.dex 
private void startService() 
{ 
timer.scheduleAtFixedRate(new mainTask(null), 0L, 500L); 
this.context = this; 
} 
public IBinder onBind(Intent paramIntent) 
{ 
return null; 
} 
public void onCreate() 
{ 
super.onCreate(); 
startService(); 
}
Süreçler 
.APK 
Analiz 
Network Activiteleri 
emulator -avd "test" -tcpdump "test.pcap"
Süreçler 
.APK 
Analiz 
strace (), ltrace() 
adb shell strace -p PID -f 
[pid 447] getpid() = 447 
[pid 447] getuid32() = 10003 
[pid 447] epoll_pwait(39, {{EPOLLIN, {u32=64, u64=64}}, {EPOLLIN, {u32=32, u64=32}}}, 16, 0, NULL) = 2 
[pid 447] read(32, "W", 16) = 1 
[pid 447] recvfrom(64, "nysv0000020*3507000/#000000", 2400, MSG_DONTWAIT, NULL, NULL) = 24 
[pid 447] recvfrom(64, 0xbef14a68, 2400, 64, 0, 0) = -1 EAGAIN (Try again) 
[pid 447] clock_gettime(CLOCK_MONOTONIC, {240, 143333618}) = 0 
[pid 447] clock_gettime(CLOCK_MONOTONIC, {240, 145650900}) = 0 
[pid 447] clock_gettime(CLOCK_MONOTONIC, {240, 147686380}) = 0 
[pid 447] writev(3, [{"4", 1}, {"Choreographer0", 14}, {"Skipped 38 frames! The applicat"..., 83}], 3) = 98 
[pid 447] clock_gettime(CLOCK_MONOTONIC, {240, 152925603}) = 0 
[pid 447] clock_gettime(CLOCK_MONOTONIC, {240, 154903354}) = 0 
[pid 447] clock_gettime(CLOCK_MONOTONIC, {240, 156899920}) = 0 
[pid 447] recvfrom(64, 0xbef14bd8, 2400, 64, 0, 0) = -1 EAGAIN (Try again) 
[pid 447] ioctl(9, 0xc0186201, 0xbef153d0) = 0 
[pid 447] clock_gettime(CLOCK_MONOTONIC, {240, 162224240}) = 0
Otomasyon
Otomasyon 
• Android SDK(software development kit) 
• aapt (android asset packaging tool) 
• dexdump 
• emulator 
• adb (android debug bridge) 
• dex2jar 
• jad 
• cproxy(basit bir proxy yazdık) 
• phpword library
Otomasyon 
Emulator Çalıştır 
Emulator Oluştur Emulator’ü 
-http-proxy ile çalıştır 
cproxy istekleri kayıt et. 
Emulator’ü 
–tcpdump ile çalıştır 
.pcap olarak dosya adı ver. 
adb 
adb install .apk dosyasını 
yükle. 
adb shell strace pid dosya 
aktivitilerini takip et 
adb shell monkey -v -p 
apkpackname 1000 
shell screencap ekran 
görüntüsünü al 
Apk bilgileri Oluştur 
Dexdump ile disassemble codelarını 
görüntüle.. 
aapt dump ile permissionlar, 
launchable-activity,servisler gibi 
bilgileri al. 
dex2jar ile dex dosyasını jar’a çevir. 
Ve sonrasında jar dosyasını jad 
yardımı ile class haline çevir. 
Launch activity bul ve çalıştır.
Otomasyon 
Emulator Oluştur Emulator Çalıştır adb 
android create avd -n androidemulator -t TARGETID 
emulator -sdcard sdcard.img -avd androidemulator -no-window -no-boot-anim -noaudio -nojni -netfast -wipe-data -verbose - 
tcpdump networkaktivitileri.pcap -http-proxy http://127.0.0.1:1988 
1.adb install test.apk 
2.adb shell am start -a android.intent.action.VIEW -c adroid.intent.category.DEFAULT -n com.elite/com.elite.MainActivity 
3.adb shell strace -p PID -f -s 256 -e open,access 
4. adb shell monkey -v -p apkpackname 1000 
5. adb shell screencap -p /sdcard/screen.png 
6. adb pull /sdcard/screen.png
Otomasyon 
.bash script veya 
python veya 
php veya 
executable bir 
dosya oluşturarak. 
ornek.py test.apk 
word 
pdf 
db 
pdf
Otomasyon 
ornek.py test.apk 
word 
pdf 
.bash script veya 
python veya 
php veya 
executable bir 
dosya oluşturarak.
Örnek
Sorusu olan varmı? 
? 
? 
?
Ibrahim BALİÇ 
ibrahim@balicbilisim.com 
Teşekkürler. 
(:

More Related Content

What's hot

DLL Hijacking on OS X
DLL Hijacking on OS XDLL Hijacking on OS X
DLL Hijacking on OS X
Synack
 
AST - the only true tool for building JavaScript
AST - the only true tool for building JavaScriptAST - the only true tool for building JavaScript
AST - the only true tool for building JavaScriptIngvar Stepanyan
 
Synack at AppSec California with Patrick Wardle
Synack at AppSec California with Patrick WardleSynack at AppSec California with Patrick Wardle
Synack at AppSec California with Patrick Wardle
Synack
 
Don't Be Afraid of Abstract Syntax Trees
Don't Be Afraid of Abstract Syntax TreesDon't Be Afraid of Abstract Syntax Trees
Don't Be Afraid of Abstract Syntax Trees
Jamund Ferguson
 
Integrating icinga2 and the HashiCorp suite
Integrating icinga2 and the HashiCorp suiteIntegrating icinga2 and the HashiCorp suite
Integrating icinga2 and the HashiCorp suite
Bram Vogelaar
 
JavaScript on the GPU
JavaScript on the GPUJavaScript on the GPU
JavaScript on the GPU
Jarred Nicholls
 
Apache Spark SQL- Installing Spark
Apache Spark SQL- Installing SparkApache Spark SQL- Installing Spark
Apache Spark SQL- Installing Spark
Experfy
 
Deep Dive into Zone.JS
Deep Dive into Zone.JSDeep Dive into Zone.JS
Deep Dive into Zone.JS
Ilia Idakiev
 
ARCでめちゃモテiOSプログラマー
ARCでめちゃモテiOSプログラマーARCでめちゃモテiOSプログラマー
ARCでめちゃモテiOSプログラマーSatoshi Asano
 
Your code is not a string
Your code is not a stringYour code is not a string
Your code is not a string
Ingvar Stepanyan
 
The Mouse is mightier than the sword
The Mouse is mightier than the swordThe Mouse is mightier than the sword
The Mouse is mightier than the sword
Priyanka Aash
 
10 Excellent Ways to Secure Your Spring Boot Application - Devoxx Morocco 2019
10 Excellent Ways to Secure Your Spring Boot Application - Devoxx Morocco 201910 Excellent Ways to Secure Your Spring Boot Application - Devoxx Morocco 2019
10 Excellent Ways to Secure Your Spring Boot Application - Devoxx Morocco 2019
Matt Raible
 
Innovation and Security in Ruby on Rails
Innovation and Security in Ruby on RailsInnovation and Security in Ruby on Rails
Innovation and Security in Ruby on Railstielefeld
 
Why is My Spark Job Failing? by Sandy Ryza of Cloudera
Why is My Spark Job Failing? by Sandy Ryza of ClouderaWhy is My Spark Job Failing? by Sandy Ryza of Cloudera
Why is My Spark Job Failing? by Sandy Ryza of Cloudera
Data Con LA
 
Build resource server &amp; client for OCF Cloud (2018.8.30)
Build resource server &amp; client for OCF Cloud (2018.8.30)Build resource server &amp; client for OCF Cloud (2018.8.30)
Build resource server &amp; client for OCF Cloud (2018.8.30)
남균 김
 
Test Driven Documentation with Spring Rest Docs JEEConf2017
Test Driven Documentation with Spring Rest Docs JEEConf2017Test Driven Documentation with Spring Rest Docs JEEConf2017
Test Driven Documentation with Spring Rest Docs JEEConf2017
Roman Tsypuk
 
ROS2勉強会@別府 第7章Pythonクライアントライブラリrclpy
ROS2勉強会@別府 第7章PythonクライアントライブラリrclpyROS2勉強会@別府 第7章Pythonクライアントライブラリrclpy
ROS2勉強会@別府 第7章Pythonクライアントライブラリrclpy
Atsuki Yokota
 
Esprima - What is that
Esprima - What is thatEsprima - What is that
Esprima - What is that
Abhijeet Pawar
 
Django - 次の一歩 gumiStudy#3
Django - 次の一歩 gumiStudy#3Django - 次の一歩 gumiStudy#3
Django - 次の一歩 gumiStudy#3
makoto tsuyuki
 
AMIRA: Automated Malware Incident Response and Analysis for macOS (Black Hat ...
AMIRA: Automated Malware Incident Response and Analysis for macOS (Black Hat ...AMIRA: Automated Malware Incident Response and Analysis for macOS (Black Hat ...
AMIRA: Automated Malware Incident Response and Analysis for macOS (Black Hat ...
Jakub "Kuba" Sendor
 

What's hot (20)

DLL Hijacking on OS X
DLL Hijacking on OS XDLL Hijacking on OS X
DLL Hijacking on OS X
 
AST - the only true tool for building JavaScript
AST - the only true tool for building JavaScriptAST - the only true tool for building JavaScript
AST - the only true tool for building JavaScript
 
Synack at AppSec California with Patrick Wardle
Synack at AppSec California with Patrick WardleSynack at AppSec California with Patrick Wardle
Synack at AppSec California with Patrick Wardle
 
Don't Be Afraid of Abstract Syntax Trees
Don't Be Afraid of Abstract Syntax TreesDon't Be Afraid of Abstract Syntax Trees
Don't Be Afraid of Abstract Syntax Trees
 
Integrating icinga2 and the HashiCorp suite
Integrating icinga2 and the HashiCorp suiteIntegrating icinga2 and the HashiCorp suite
Integrating icinga2 and the HashiCorp suite
 
JavaScript on the GPU
JavaScript on the GPUJavaScript on the GPU
JavaScript on the GPU
 
Apache Spark SQL- Installing Spark
Apache Spark SQL- Installing SparkApache Spark SQL- Installing Spark
Apache Spark SQL- Installing Spark
 
Deep Dive into Zone.JS
Deep Dive into Zone.JSDeep Dive into Zone.JS
Deep Dive into Zone.JS
 
ARCでめちゃモテiOSプログラマー
ARCでめちゃモテiOSプログラマーARCでめちゃモテiOSプログラマー
ARCでめちゃモテiOSプログラマー
 
Your code is not a string
Your code is not a stringYour code is not a string
Your code is not a string
 
The Mouse is mightier than the sword
The Mouse is mightier than the swordThe Mouse is mightier than the sword
The Mouse is mightier than the sword
 
10 Excellent Ways to Secure Your Spring Boot Application - Devoxx Morocco 2019
10 Excellent Ways to Secure Your Spring Boot Application - Devoxx Morocco 201910 Excellent Ways to Secure Your Spring Boot Application - Devoxx Morocco 2019
10 Excellent Ways to Secure Your Spring Boot Application - Devoxx Morocco 2019
 
Innovation and Security in Ruby on Rails
Innovation and Security in Ruby on RailsInnovation and Security in Ruby on Rails
Innovation and Security in Ruby on Rails
 
Why is My Spark Job Failing? by Sandy Ryza of Cloudera
Why is My Spark Job Failing? by Sandy Ryza of ClouderaWhy is My Spark Job Failing? by Sandy Ryza of Cloudera
Why is My Spark Job Failing? by Sandy Ryza of Cloudera
 
Build resource server &amp; client for OCF Cloud (2018.8.30)
Build resource server &amp; client for OCF Cloud (2018.8.30)Build resource server &amp; client for OCF Cloud (2018.8.30)
Build resource server &amp; client for OCF Cloud (2018.8.30)
 
Test Driven Documentation with Spring Rest Docs JEEConf2017
Test Driven Documentation with Spring Rest Docs JEEConf2017Test Driven Documentation with Spring Rest Docs JEEConf2017
Test Driven Documentation with Spring Rest Docs JEEConf2017
 
ROS2勉強会@別府 第7章Pythonクライアントライブラリrclpy
ROS2勉強会@別府 第7章PythonクライアントライブラリrclpyROS2勉強会@別府 第7章Pythonクライアントライブラリrclpy
ROS2勉強会@別府 第7章Pythonクライアントライブラリrclpy
 
Esprima - What is that
Esprima - What is thatEsprima - What is that
Esprima - What is that
 
Django - 次の一歩 gumiStudy#3
Django - 次の一歩 gumiStudy#3Django - 次の一歩 gumiStudy#3
Django - 次の一歩 gumiStudy#3
 
AMIRA: Automated Malware Incident Response and Analysis for macOS (Black Hat ...
AMIRA: Automated Malware Incident Response and Analysis for macOS (Black Hat ...AMIRA: Automated Malware Incident Response and Analysis for macOS (Black Hat ...
AMIRA: Automated Malware Incident Response and Analysis for macOS (Black Hat ...
 

Viewers also liked

Ibrahim balic cyber-weapons
Ibrahim balic cyber-weaponsIbrahim balic cyber-weapons
Ibrahim balic cyber-weapons
Ibrahim Baliç
 
Beyazsapkalihackeregitimikitap 140409071714-phpapp02
Beyazsapkalihackeregitimikitap 140409071714-phpapp02Beyazsapkalihackeregitimikitap 140409071714-phpapp02
Beyazsapkalihackeregitimikitap 140409071714-phpapp02
Öncü Furkan
 
Gömülü Cihaz Güvenliği ve Zollard Botnet Analizi
Gömülü Cihaz Güvenliği ve Zollard Botnet AnaliziGömülü Cihaz Güvenliği ve Zollard Botnet Analizi
Gömülü Cihaz Güvenliği ve Zollard Botnet Analizi
Ibrahim Baliç
 
Cyber Weapons
Cyber WeaponsCyber Weapons
Cyber Weapons
Ibrahim Baliç
 
Siber İstihbarat ve Ödül Avcılığı
Siber İstihbarat ve Ödül AvcılığıSiber İstihbarat ve Ödül Avcılığı
Siber İstihbarat ve Ödül Avcılığı
Osman Doğan
 
Siber Güvenlik
Siber GüvenlikSiber Güvenlik
Siber Güvenlik
Tarık Savaş Öpöz
 
Some’lerden Beklenen Adli bilişim Yetkinlikleri
Some’lerden Beklenen Adli bilişim YetkinlikleriSome’lerden Beklenen Adli bilişim Yetkinlikleri
Some’lerden Beklenen Adli bilişim Yetkinlikleri
Adeo Security
 
Temel Ağ Sızma Testine Giriş Dökümanı
Temel Ağ Sızma Testine Giriş DökümanıTemel Ağ Sızma Testine Giriş Dökümanı
Temel Ağ Sızma Testine Giriş Dökümanı
Ahmet Gürel
 
Kritik Altyapılarda Siber Güvenlik
Kritik Altyapılarda Siber GüvenlikKritik Altyapılarda Siber Güvenlik
Kritik Altyapılarda Siber Güvenlik
Alper Başaran
 
GDA Kazilan Kuyular 2007
GDA Kazilan Kuyular 2007GDA Kazilan Kuyular 2007
GDA Kazilan Kuyular 2007
Dr.Zeynep Elif Yildizel
 
Yasamımız elektrik
Yasamımız elektrikYasamımız elektrik
Yasamımız elektrik
glcnpaus
 
Global Perspective for Oil and Gas in Energy Policies
Global Perspective for Oil and Gas in Energy PoliciesGlobal Perspective for Oil and Gas in Energy Policies
Global Perspective for Oil and Gas in Energy Policies
Dr.Zeynep Elif Yildizel
 
Basics for LNG 2011
Basics for LNG 2011Basics for LNG 2011
Basics for LNG 2011
Dr.Zeynep Elif Yildizel
 
Kerkuk 2012
Kerkuk 2012Kerkuk 2012
Irak Refinery Status 2011
Irak Refinery Status 2011Irak Refinery Status 2011
Irak Refinery Status 2011
Dr.Zeynep Elif Yildizel
 
6491 Yeni Petrol Kanunu
6491 Yeni Petrol Kanunu6491 Yeni Petrol Kanunu
6491 Yeni Petrol Kanunu
Dr.Zeynep Elif Yildizel
 
Git ile versiyon kontrolü
Git ile versiyon kontrolüGit ile versiyon kontrolü
Git ile versiyon kontrolü
Ilhan Çetin
 
Git Sürüm Takip Sistemi
Git Sürüm Takip SistemiGit Sürüm Takip Sistemi
Git Sürüm Takip Sistemi
özge Barbaros
 

Viewers also liked (20)

Ibrahim balic cyber-weapons
Ibrahim balic cyber-weaponsIbrahim balic cyber-weapons
Ibrahim balic cyber-weapons
 
Beyazsapkalihackeregitimikitap 140409071714-phpapp02
Beyazsapkalihackeregitimikitap 140409071714-phpapp02Beyazsapkalihackeregitimikitap 140409071714-phpapp02
Beyazsapkalihackeregitimikitap 140409071714-phpapp02
 
Gömülü Cihaz Güvenliği ve Zollard Botnet Analizi
Gömülü Cihaz Güvenliği ve Zollard Botnet AnaliziGömülü Cihaz Güvenliği ve Zollard Botnet Analizi
Gömülü Cihaz Güvenliği ve Zollard Botnet Analizi
 
Cyber Weapons
Cyber WeaponsCyber Weapons
Cyber Weapons
 
Siber İstihbarat ve Ödül Avcılığı
Siber İstihbarat ve Ödül AvcılığıSiber İstihbarat ve Ödül Avcılığı
Siber İstihbarat ve Ödül Avcılığı
 
Siber Güvenlik
Siber GüvenlikSiber Güvenlik
Siber Güvenlik
 
Some’lerden Beklenen Adli bilişim Yetkinlikleri
Some’lerden Beklenen Adli bilişim YetkinlikleriSome’lerden Beklenen Adli bilişim Yetkinlikleri
Some’lerden Beklenen Adli bilişim Yetkinlikleri
 
Temel Ağ Sızma Testine Giriş Dökümanı
Temel Ağ Sızma Testine Giriş DökümanıTemel Ağ Sızma Testine Giriş Dökümanı
Temel Ağ Sızma Testine Giriş Dökümanı
 
Kritik Altyapılarda Siber Güvenlik
Kritik Altyapılarda Siber GüvenlikKritik Altyapılarda Siber Güvenlik
Kritik Altyapılarda Siber Güvenlik
 
Network Dersleri2
Network Dersleri2Network Dersleri2
Network Dersleri2
 
GDA Kazilan Kuyular 2007
GDA Kazilan Kuyular 2007GDA Kazilan Kuyular 2007
GDA Kazilan Kuyular 2007
 
Yasamımız elektrik
Yasamımız elektrikYasamımız elektrik
Yasamımız elektrik
 
Global Perspective for Oil and Gas in Energy Policies
Global Perspective for Oil and Gas in Energy PoliciesGlobal Perspective for Oil and Gas in Energy Policies
Global Perspective for Oil and Gas in Energy Policies
 
Basics for LNG 2011
Basics for LNG 2011Basics for LNG 2011
Basics for LNG 2011
 
Kerkuk 2012
Kerkuk 2012Kerkuk 2012
Kerkuk 2012
 
Irak Refinery Status 2011
Irak Refinery Status 2011Irak Refinery Status 2011
Irak Refinery Status 2011
 
6491 Yeni Petrol Kanunu
6491 Yeni Petrol Kanunu6491 Yeni Petrol Kanunu
6491 Yeni Petrol Kanunu
 
Kenya afrika
Kenya afrikaKenya afrika
Kenya afrika
 
Git ile versiyon kontrolü
Git ile versiyon kontrolüGit ile versiyon kontrolü
Git ile versiyon kontrolü
 
Git Sürüm Takip Sistemi
Git Sürüm Takip SistemiGit Sürüm Takip Sistemi
Git Sürüm Takip Sistemi
 

Similar to Automated malware analysis

IstSec'14 - İbrahim BALİÇ - Automated Malware Analysis
IstSec'14 - İbrahim BALİÇ -  Automated Malware AnalysisIstSec'14 - İbrahim BALİÇ -  Automated Malware Analysis
IstSec'14 - İbrahim BALİÇ - Automated Malware Analysis
BGA Cyber Security
 
Virus Bulletin 2015: Exposing Gatekeeper
Virus Bulletin 2015: Exposing GatekeeperVirus Bulletin 2015: Exposing Gatekeeper
Virus Bulletin 2015: Exposing Gatekeeper
Synack
 
Steelcon 2015 Reverse-Engineering Obfuscated Android Applications
Steelcon 2015 Reverse-Engineering Obfuscated Android ApplicationsSteelcon 2015 Reverse-Engineering Obfuscated Android Applications
Steelcon 2015 Reverse-Engineering Obfuscated Android Applications
Tom Keetch
 
Inspecting iOS App Traffic with JavaScript - JSOxford - Jan 2018
Inspecting iOS App Traffic with JavaScript - JSOxford - Jan 2018Inspecting iOS App Traffic with JavaScript - JSOxford - Jan 2018
Inspecting iOS App Traffic with JavaScript - JSOxford - Jan 2018
Andy Davies
 
Event-driven IO server-side JavaScript environment based on V8 Engine
Event-driven IO server-side JavaScript environment based on V8 EngineEvent-driven IO server-side JavaScript environment based on V8 Engine
Event-driven IO server-side JavaScript environment based on V8 Engine
Ricardo Silva
 
OSXCollector: Automated forensic evidence collection & analysis for OS X (Bru...
OSXCollector: Automated forensic evidence collection & analysis for OS X (Bru...OSXCollector: Automated forensic evidence collection & analysis for OS X (Bru...
OSXCollector: Automated forensic evidence collection & analysis for OS X (Bru...
Jakub "Kuba" Sendor
 
Us 17-krug-hacking-severless-runtimes
Us 17-krug-hacking-severless-runtimesUs 17-krug-hacking-severless-runtimes
Us 17-krug-hacking-severless-runtimes
Ravishankar Somasundaram
 
Node js introduction
Node js introductionNode js introduction
Node js introductionAlex Su
 
How Secure Are Docker Containers?
How Secure Are Docker Containers?How Secure Are Docker Containers?
How Secure Are Docker Containers?
Ben Hall
 
OWASP ZAP Workshop for QA Testers
OWASP ZAP Workshop for QA TestersOWASP ZAP Workshop for QA Testers
OWASP ZAP Workshop for QA Testers
Javan Rasokat
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by default
Slawomir Jasek
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by default
SecuRing
 
Microservices Application Tracing Standards and Simulators - Adrians at OSCON
Microservices Application Tracing Standards and Simulators - Adrians at OSCONMicroservices Application Tracing Standards and Simulators - Adrians at OSCON
Microservices Application Tracing Standards and Simulators - Adrians at OSCON
Adrian Cockcroft
 
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-raysPositive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-raysqqlan
 
Node Interactive: Node.js Performance and Highly Scalable Micro-Services
Node Interactive: Node.js Performance and Highly Scalable Micro-ServicesNode Interactive: Node.js Performance and Highly Scalable Micro-Services
Node Interactive: Node.js Performance and Highly Scalable Micro-Services
Chris Bailey
 
Android Development w/ ArcGIS Server - Esri Dev Meetup - Charlotte, NC
Android Development w/ ArcGIS Server - Esri Dev Meetup - Charlotte, NCAndroid Development w/ ArcGIS Server - Esri Dev Meetup - Charlotte, NC
Android Development w/ ArcGIS Server - Esri Dev Meetup - Charlotte, NCJim Tochterman
 
CouchDB on Android
CouchDB on AndroidCouchDB on Android
CouchDB on AndroidSven Haiges
 
[Coscup 2012] JavascriptMVC
[Coscup 2012] JavascriptMVC[Coscup 2012] JavascriptMVC
[Coscup 2012] JavascriptMVC
Alive Kuo
 
Learning Dtrace
Learning DtraceLearning Dtrace
Learning Dtrace
JeongHun Byeon
 
IBM Cloud University: Build, Deploy and Scale Node.js Microservices
IBM Cloud University: Build, Deploy and Scale Node.js MicroservicesIBM Cloud University: Build, Deploy and Scale Node.js Microservices
IBM Cloud University: Build, Deploy and Scale Node.js Microservices
Chris Bailey
 

Similar to Automated malware analysis (20)

IstSec'14 - İbrahim BALİÇ - Automated Malware Analysis
IstSec'14 - İbrahim BALİÇ -  Automated Malware AnalysisIstSec'14 - İbrahim BALİÇ -  Automated Malware Analysis
IstSec'14 - İbrahim BALİÇ - Automated Malware Analysis
 
Virus Bulletin 2015: Exposing Gatekeeper
Virus Bulletin 2015: Exposing GatekeeperVirus Bulletin 2015: Exposing Gatekeeper
Virus Bulletin 2015: Exposing Gatekeeper
 
Steelcon 2015 Reverse-Engineering Obfuscated Android Applications
Steelcon 2015 Reverse-Engineering Obfuscated Android ApplicationsSteelcon 2015 Reverse-Engineering Obfuscated Android Applications
Steelcon 2015 Reverse-Engineering Obfuscated Android Applications
 
Inspecting iOS App Traffic with JavaScript - JSOxford - Jan 2018
Inspecting iOS App Traffic with JavaScript - JSOxford - Jan 2018Inspecting iOS App Traffic with JavaScript - JSOxford - Jan 2018
Inspecting iOS App Traffic with JavaScript - JSOxford - Jan 2018
 
Event-driven IO server-side JavaScript environment based on V8 Engine
Event-driven IO server-side JavaScript environment based on V8 EngineEvent-driven IO server-side JavaScript environment based on V8 Engine
Event-driven IO server-side JavaScript environment based on V8 Engine
 
OSXCollector: Automated forensic evidence collection & analysis for OS X (Bru...
OSXCollector: Automated forensic evidence collection & analysis for OS X (Bru...OSXCollector: Automated forensic evidence collection & analysis for OS X (Bru...
OSXCollector: Automated forensic evidence collection & analysis for OS X (Bru...
 
Us 17-krug-hacking-severless-runtimes
Us 17-krug-hacking-severless-runtimesUs 17-krug-hacking-severless-runtimes
Us 17-krug-hacking-severless-runtimes
 
Node js introduction
Node js introductionNode js introduction
Node js introduction
 
How Secure Are Docker Containers?
How Secure Are Docker Containers?How Secure Are Docker Containers?
How Secure Are Docker Containers?
 
OWASP ZAP Workshop for QA Testers
OWASP ZAP Workshop for QA TestersOWASP ZAP Workshop for QA Testers
OWASP ZAP Workshop for QA Testers
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by default
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by default
 
Microservices Application Tracing Standards and Simulators - Adrians at OSCON
Microservices Application Tracing Standards and Simulators - Adrians at OSCONMicroservices Application Tracing Standards and Simulators - Adrians at OSCON
Microservices Application Tracing Standards and Simulators - Adrians at OSCON
 
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-raysPositive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-rays
 
Node Interactive: Node.js Performance and Highly Scalable Micro-Services
Node Interactive: Node.js Performance and Highly Scalable Micro-ServicesNode Interactive: Node.js Performance and Highly Scalable Micro-Services
Node Interactive: Node.js Performance and Highly Scalable Micro-Services
 
Android Development w/ ArcGIS Server - Esri Dev Meetup - Charlotte, NC
Android Development w/ ArcGIS Server - Esri Dev Meetup - Charlotte, NCAndroid Development w/ ArcGIS Server - Esri Dev Meetup - Charlotte, NC
Android Development w/ ArcGIS Server - Esri Dev Meetup - Charlotte, NC
 
CouchDB on Android
CouchDB on AndroidCouchDB on Android
CouchDB on Android
 
[Coscup 2012] JavascriptMVC
[Coscup 2012] JavascriptMVC[Coscup 2012] JavascriptMVC
[Coscup 2012] JavascriptMVC
 
Learning Dtrace
Learning DtraceLearning Dtrace
Learning Dtrace
 
IBM Cloud University: Build, Deploy and Scale Node.js Microservices
IBM Cloud University: Build, Deploy and Scale Node.js MicroservicesIBM Cloud University: Build, Deploy and Scale Node.js Microservices
IBM Cloud University: Build, Deploy and Scale Node.js Microservices
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Automated malware analysis

  • 1. Mobil Malware Analiz Süreçlerini Otomatikleştirme İbrahim BALİÇ ibrahim@balicbilisim.com
  • 2. Ajanda • Ben Kimim • Malware Analiz • Süreçler • Otomasyon • Örnek • Sorular
  • 3. Ben Kimim? • Security Researcher @ BalichIT • Online Projeler Android Sandbox – http://www.androidsandbox.net Android Remote Admin/Access Tool – https://github.com/ibrahimbalic/AndroidRAT • Devameden Projeler iOS Sandbox – http://www.iossandbox.com Approwler – http://www.approwler.com • Offline Projeler Online Mobile App Builder – http://uygu.la MalTrack – http://maltrack.balicbilisim.com • Apple, Facebook, Opera, Google vs. @ Whitehat Hacker • Links SQLMap CSRF Bypass – http://www.exploit-db.com/wp-content/themes/exploit/docs/34193.pdf Software Vulnerabilities – http://www.exploit-db.com/wp-content/themes/exploit/docs/29139.pdf Mobil Forensics 1 – http://www.bilgiguvenligi.gov.tr/adli-analiz/mobile-forensics-bolum-1.html Mobil Forensics 2 – http://www.bilgiguvenligi.gov.tr/adli-analiz/mobile-forensics-bolum-2.html Android Internals – http://www.bilgiguvenligi.gov.tr/mobil-cihaz-guvenligi/android-internals-part-i.html Bilgi Güvenliğine Giriş – http://www.bilgiguvenligi.gov.tr/veri-gizliligi/bilgi-guvenligine-giris.html
  • 4. Malware Analiz “Malware, kullanıcı veya hedef sistemlere zarar veren her türlü uygulama için kullanılan “Zararlı Uygulama” kavramının genel adıdır.”
  • 5. Malware Analiz Uygulama Nedir? “Elektronik araçların Önceden belirlenmiş standartları çerçevesinde bir araya getirilmiş görevler/işlemler zinciridir.”
  • 6. Malware Analiz Standartlar Nedir? • İşlemci Mimarisi (CPU) • İşletim Sistemi (OS) • Framework (library) .... ... .
  • 7. Malware Analiz + Diğer donanımlar = + OS (Operating System)
  • 9. Malware Analiz main ( int arc, char **argv ) { return 0; } x64 Mips
  • 10. Malware Analiz #include <stdio.h> main ( int arc, char **argv ) { return 0; } int ibrahimbalic(int a) { return 0; } ./nm –A istsecII
  • 11. Malware Analiz #include <stdio.h> main ( int arc, char **argv ) { return 0; } int ibrahimbalic(int a) { return 0; } ./objdump -t istsecII
  • 12. Malware Analiz #include <stdio.h> main ( int arc, char **argv ) { return 0; } int ibrahimbalic(int a) { return 0; } IDA
  • 13. Malware Analiz int main(int argc, char *argv[]) { char mesaj[] = "IstSECn"; struct sockaddr_in dest; struct sockaddr_in serv; int istsecport; socklen_t socksize = sizeof(struct sockaddr_in); memset(&serv, 0, sizeof(serv)); serv.sin_family = AF_INET; serv.sin_addr.s_addr = htonl(INADDR_ANY); serv.sin_port = htons(PORTNUM); istsecport = socket(AF_INET, SOCK_STREAM, 0); bind(istsecport, (struct sockaddr *)&serv, sizeof(struct sockaddr)); listen(istsecport, 1); int gelenbag = accept(istsecport, (struct sockaddr *)&dest, &socksize); while(gelenbag) { printf("Mesaj gonderildi. %sn", inet_ntoa(dest.sin_addr)); send(gelenbag, mesaj, strlen(mesaj), 0); gelenbag = accept(istsecport, (struct sockaddr *)&dest, &socksize); } close(gelenbag); close(istsecport); return 0; } ./nm –A istsecIII
  • 15. Malware Analiz • Statik Malware Analiz • Dinamik Malware Analiz
  • 16. Süreçler .APK Analiz Strings Disassemble codes Decompilling Network Activiteleri strace (), ltrace() …
  • 17. Süreçler .APK Analiz Strings aapt d --values strings test.apk String pool of 20 unique UTF-8 non-sorted strings, 20 entries and 0 styles using 828 bytes: String #0: res/drawable/elite_background.png String #1: res/drawable/elite_logo.png String #2: res/layout/activity_main.xml String #3: res/layout/lock_screen.xml String #4: res/layout/main_uninstall_admin_device.xml String #5: res/anim/fadein.xml String #6: res/anim/fadeout.xml String #7: res/xml/device_admin_sample.xml String #8: res/menu/main.xml String #9: res/drawable-mdpi/ic_launcher.png String #10: res/drawable-hdpi/ic_launcher.png String #11: res/drawable-xhdpi/ic_launcher.png String #12: res/drawable-xxhdpi/ic_launcher.png String #13: Angry Bird Transformers String #14: Settings String #15: Angry Bird Transformers: A parent's care for child. String #16: To ensure the correct installation of Angry Bird Transformers, you must press the "ACTIVATE" button below. String #17: Device admin setting activated successfully. String #18: Elite has hacked you.Obey or be hacked. String #19: com.hellboy
  • 18. Süreçler .APK Analiz disassemble code dexdump –d classes.dex Processing 'classes.dex'... Opened 'classes.dex', DEX version '035' Class #0 - Class descriptor : 'Landroid/support/annotation/AnimRes;' Access flags : 0x2601 (PUBLIC INTERFACE ABSTRACT ANNOTATION) Superclass : 'Ljava/lang/Object;' Interfaces - #0 : 'Ljava/lang/annotation/Annotation;' Static fields - Instance fields - Direct methods - Virtual methods - source_file_idx : 466 (AnimRes.java)
  • 19. Süreçler .APK Analiz Decompilling dex2jar classes.dex private void startService() { timer.scheduleAtFixedRate(new mainTask(null), 0L, 500L); this.context = this; } public IBinder onBind(Intent paramIntent) { return null; } public void onCreate() { super.onCreate(); startService(); }
  • 20. Süreçler .APK Analiz Network Activiteleri emulator -avd "test" -tcpdump "test.pcap"
  • 21. Süreçler .APK Analiz strace (), ltrace() adb shell strace -p PID -f [pid 447] getpid() = 447 [pid 447] getuid32() = 10003 [pid 447] epoll_pwait(39, {{EPOLLIN, {u32=64, u64=64}}, {EPOLLIN, {u32=32, u64=32}}}, 16, 0, NULL) = 2 [pid 447] read(32, "W", 16) = 1 [pid 447] recvfrom(64, "nysv0000020*3507000/#000000", 2400, MSG_DONTWAIT, NULL, NULL) = 24 [pid 447] recvfrom(64, 0xbef14a68, 2400, 64, 0, 0) = -1 EAGAIN (Try again) [pid 447] clock_gettime(CLOCK_MONOTONIC, {240, 143333618}) = 0 [pid 447] clock_gettime(CLOCK_MONOTONIC, {240, 145650900}) = 0 [pid 447] clock_gettime(CLOCK_MONOTONIC, {240, 147686380}) = 0 [pid 447] writev(3, [{"4", 1}, {"Choreographer0", 14}, {"Skipped 38 frames! The applicat"..., 83}], 3) = 98 [pid 447] clock_gettime(CLOCK_MONOTONIC, {240, 152925603}) = 0 [pid 447] clock_gettime(CLOCK_MONOTONIC, {240, 154903354}) = 0 [pid 447] clock_gettime(CLOCK_MONOTONIC, {240, 156899920}) = 0 [pid 447] recvfrom(64, 0xbef14bd8, 2400, 64, 0, 0) = -1 EAGAIN (Try again) [pid 447] ioctl(9, 0xc0186201, 0xbef153d0) = 0 [pid 447] clock_gettime(CLOCK_MONOTONIC, {240, 162224240}) = 0
  • 23. Otomasyon • Android SDK(software development kit) • aapt (android asset packaging tool) • dexdump • emulator • adb (android debug bridge) • dex2jar • jad • cproxy(basit bir proxy yazdık) • phpword library
  • 24. Otomasyon Emulator Çalıştır Emulator Oluştur Emulator’ü -http-proxy ile çalıştır cproxy istekleri kayıt et. Emulator’ü –tcpdump ile çalıştır .pcap olarak dosya adı ver. adb adb install .apk dosyasını yükle. adb shell strace pid dosya aktivitilerini takip et adb shell monkey -v -p apkpackname 1000 shell screencap ekran görüntüsünü al Apk bilgileri Oluştur Dexdump ile disassemble codelarını görüntüle.. aapt dump ile permissionlar, launchable-activity,servisler gibi bilgileri al. dex2jar ile dex dosyasını jar’a çevir. Ve sonrasında jar dosyasını jad yardımı ile class haline çevir. Launch activity bul ve çalıştır.
  • 25. Otomasyon Emulator Oluştur Emulator Çalıştır adb android create avd -n androidemulator -t TARGETID emulator -sdcard sdcard.img -avd androidemulator -no-window -no-boot-anim -noaudio -nojni -netfast -wipe-data -verbose - tcpdump networkaktivitileri.pcap -http-proxy http://127.0.0.1:1988 1.adb install test.apk 2.adb shell am start -a android.intent.action.VIEW -c adroid.intent.category.DEFAULT -n com.elite/com.elite.MainActivity 3.adb shell strace -p PID -f -s 256 -e open,access 4. adb shell monkey -v -p apkpackname 1000 5. adb shell screencap -p /sdcard/screen.png 6. adb pull /sdcard/screen.png
  • 26. Otomasyon .bash script veya python veya php veya executable bir dosya oluşturarak. ornek.py test.apk word pdf db pdf
  • 27. Otomasyon ornek.py test.apk word pdf .bash script veya python veya php veya executable bir dosya oluşturarak.