SlideShare a Scribd company logo
1 of 36
Download to read offline
1
soFrida
Dynamic Analysis Tool for Mobile Apps
with Cloud Backend
@DEFCON 27 DEMO LABS
Hyunjun Park
Korea Univ. / Samsung SDS
Soyeon Kim
Samsung SDS
Seungjoo Kim*
Korea Univ.
and Yeongjin Jang
Oregon State Univ.
* Corresponding Author
2
H y u n J u n P a r k
K o r e a U n i v e r s i t y
&
S a m s u n g S D S
j u n e _ p a r k @ k o r e a . a c . k r
j u n e 5 0 7 9 @ g m a i l . c o m
Hyunjun Park is a senior engineer of Samsung SDS in South Korea and a
graduate student of Korea University. His daily job is pentesting a broad range of
Samsung products including smart phone, smart TV, wearable devices, etc. He
also serves as a main staff of Kimchicon Security Conference in South Korea.
3
S o y e o n K i m
S a m s u n g S D S
s s o y o u n k @ g m a i l . c o m
Soyeon Kim is a security researcher of Samsung SDS in South Korea. She mainly
doing a security assessment of Samsung IoT products. She is interested in
analyzing Android apps and IOS apps using Frida.
4
S e u n g j o o ( G a b r i e l ) K i m
K o r e a U n i v e r s i t y
s k i m 7 1 @ k o r e a . a c . k r
Seungjoo (Gabriel) Kim is a professor of Graduate School of Information Security at Korea
University from 2011. For the past 7 years he was an associate professor of Sungkyunkwan
University and have 5 years of back ground of team leader of Cryptographic Technology
Team and also IT Security Evaluation Team of KISA(Korea Internet & Security Agency). In
addition to being a professor, he is positioning a director of CHAOS(Center for High-
Assurance Operating Systems), a head of SANE(Security Analysis aNd Evaluation) Lab, an
adviser of hacking club ‘CyKor(two-times champion of DEF CON CTF 2015 & 2018)’ of
Korea University, and a founder/advisory director of an international security & hacking
conference ‘SECUINSIDE’.
• Corresponding Author
• This work was supported by Institute for Information & communications
Technology Promotion(IITP) grant funded by the Korea government(MSIP)
(IITP-2017-0-00184, Self-Learning Cyber Immune Technology Development)
5
TOPICS
B a c k g r o u n d
E x p l a i n w h y c l o u d d a t a l e a k
E x p e r i m e n t
S h a r e h o w I g o t
m o t i v a t e d
A t t a c k Ve c t o r s
E x p l a i n d e t a i l e d v e c t o r s
To a t t a c k c l o u d r e s o u r c e
M i t i g a t i o n s
R e c o m m e n d a t i o n t o m i t i g a t e
v u l n e r a b i l i t i e s
Understand how to collect Android Apps and
Find Cloud Vulnerabilities though SDK
6
“What if
you can directly extract
AWS access keys from
mobile apps?”
7
RESULT OF RESEARCH
s o F r i d a I n t r o d u c t i o n
We ' v e i n s p e c t 4 m i l l i o n s o f A n d r o i d a p p s a n d f o u n d c r i t i c a l v u l n e r a b i l i t i e s o n m u l t i p l e a p p s .
We ' v e p u b l i s i s h e d d e t a i l s o f s t a t i s t i c s d a t a o f o u r r e s e a r c h o n h t t p s : / / s o f r i d a . g i t h u b . i o
253
A p p s a r e C l a s s i f i e d
a s V u l n e r a b l e
2700
A p p s a r e
p o t e n t i a l l y v u l n e r a b l e
( U s i n g A W S S D K )
53
A p p s h a s c r i t i c a l l y
v u l n e r a b l e
( D a t a c a n b e l e a k e d )
But only 3 developers responded us
8
June, 8, 2019
• We sent a notification to
each developer of the
vulnerable apps, and
also notified that we
would release the list of
vulnerable apps through
this site after 2 weeks.
TIMELINE
s o F r i d a I n t r o d u c t i o n
June, 6, 2019
• We had identified 2,700+
android apps which were
potentially vulnerable.
• We began in-depth
analysis of these 2700+
apps, and classified 236
apps as “actually risky”.
June, 19, 2019
• We reported the
vulnerability details and
the list of vulnerable
Korean apps to
KISA(Korea Internet &
Security Agency),
NSR(National Security
Research Institute) and
FSI(Financial Security
Institute).
June, 21, 2019
• Among the developers we
contacted, only 3
developers contacted us
again.
• We contacted to security
team of AWS, and asked
them to help each app
developer take an action.
June, 25, 2019
• As CSP’s request, we
sent them the entire list
of vulnerable apps,
which were classfied as
actually risky by soFrida.
June, 27, 2019
• CSP asked us to hold
publishing the list of
vulernable apps.
• As their request, we
finally decided to delay
publishing the list until
they took enough action.
9
U b e r D a t a L e a k
( 2 0 1 6 )
T i m e W a r n e r C a b l e
( 2 0 1 7 )
F e d E x
( 2 0 1 8 )
AWS Account Hacked
Personal Information
of 57 Million users
4 Million Customer Records
Exposed Via AWS S3
119,000 US Citizen’s
Personal Information
Leaked
DATA LEAK HISTORY
B A C K G R O U N D
Unfortunately, oftentimes developers grant public access permission to the AWS Service.
W h a t ’ s
N e x t ?
10
WHY IT HAPPENS
B A C K G R O U D N D
T h e r e a r e 3 r e a s o n s f o r c l o u d d a t a l e a k a g e
Root key used / All users have same keys / Key Values are hardcoded
K e y M a n a g e m e n t F a i l u r e
READ/WRITE permission to everyone, Users are not seperate
C l o u d P e r m i s s i o n F a i l u r e
No Cloudtrail, No Logging, No Alerting
N o M o n i t o r i n g , N o R e s p o n s e
11
Open S3 Bucket WriteAble To Any Aws User
(https://hackerone.com/reports/209223)
S3 Resouces are publicly accessible and writable to anonymous users.
! Cloud misconfiguration (No Key, No Permission Setting)
B A C K G R O U N D
CLOUD MISCONFIG
Cloud resources are publicly accessible or writable
All Permissions are granted to users
Root-Key given
12
DJI BugBounty ($30,000)
AWS AccessKeyId and SecretKeyId are found at Github
http://www.digitalmunition.com/WhyIWalkedFrom3k.pdf
! Key Values are hardcoded
B A C K G R O U N D
KEY EXPOSED
AWS Key-Pairs are exposed to public
(github, src codes)
13
“AWS S3 has own bucket name
But I don’t know what it is”
“But what if I can guess and
check Bucket name?"
14
AWS S3
Bruteforce
with Wordlists
E x p e r i m e n t
You can simply send requests and figure out whether bucket exist or not.
I used word combinations with target name and wordlists based on
Bug bounty experience.
S3 Address looks like this:
BUCKET.s3.amazonaws.com
s3.amazonaws.com/BUCKET
s3.ap-northeast-2.amazonaws.com/BUCKET (Region Info Added)
Fedex-bucket.s3.amazonaws.com
15
“But, It is not enough
Because…"
Too much efforts to find just one bucket.
It doesn’t guarantee that bucket is publicly accessible even you found bucket name
(Mostly “ACCESS DENIED”)
Not Efficient
This attack depends on luck
Even though you find public opend bucket, you can’t recognize who owns the bucket.
(Anyone can register bucket with non-used bucket name)
Not Reliable
16
Let’s move on
to the
Access keys
17
WHAT IT MEANS YOU HAVE ACCESS KEYS
A T T A C K V E C T O R S
Like a user name and password, you must use both the access key ID and secret access key together to
authenticate your requests. Manage your access keys as securely as you do your user name and password.
Key-pairs should not be open to users.
If access keys are exposed to public
Attacker can use them to access
to cloud resource
U N V E I L A C C E S S K E Y S
Access keys only works for the designated one.
If you have them, you can specify
the owner of services.
S P E C I F Y TA R G E T
You can authorize to the cloud
resource
with access keys
A C C E S S G R A N T E D
18
AWS Mobile
SDK
Architecture
A T T A C K V E C T O R S
You can SECURELY(?) access to the
Cloud resources using AWS mobile SDK
(SDK is Integrated in mobile apps)
19
AWS SDK INTEGRATED
WITH MOBILE APPS
A T T A C K V E C T O R S
You can simply check if mobile apps includes AWS SDK by searching
“com.amazonaws”
If SDK included, the app may connect to “own cloud resources” using “Access Keys”
20
soFrida ATTACK DIAGRAM
A T T A C K V E C T O R S
A c o m p a n y i s a n a s s o c i a t i o n o r c o l l e c t i o n o f i n d i v i d u a l s , w h e t h e r n a t u r a l p e r s o n s , l e g a l p e r s o n s , o r a
m i x t u r e o f b o t h . C o m p a n y m e m b e r s s h a r e a c o m m o n p u r p o s e a n d u n i t e i n o r d e r t o f o c u s .
A company is an association or
collection of individuals, whether
C o l l e c t i n g
A p p s
A company is an association or
collection of individuals, whether
C h e c k
M o b i l e S D K
A company is an association or
collection of individuals, whether
K E Y
E x t r a c t i o n
A company is an association or
collection of individuals, whether
E x p l o i t
C l o u d R e s .
21
AUTOMATED ANALYSIS WITH SOFRIDA
Using “soFrida”, you can check app is secure for key extraction and cloud is configured properly.
Download : https://github.com/june5079/soFrida
Tutorials : https://www.youtube.com/watch?v=l8B3vrJg7zk
https://www.youtube.com/watch?v=l8B3vrJg7zk
* Download APK from Google Play
* Get Detail Information of App
* Manage Your Own App
* AWS Key Extraction by Dynamic Analysis
* AWS Misconfiguration Check
* Pull APK Files from Own Device
22
A T T A C K V E C T O R S
KEY EXTRACTION
AWS Access Keys will be used while cloud authentication with SDK.
Decompile apk file and find target class and method to extract keys.
Hooking point
23
A T T A C K V E C T O R S
KEY EXTRACTION
AWS Access Keys will be used while cloud authentication with SDK.
Decompile apk file and find target class and method to extract keys.
All Access Keys Extracted
24
CASE ONE
When app launches, It authenticate to cloud server
using mobile SDK.
Access keys can be extracted by hooking
com.amazonaws classes
CASE TWO
App does not authenticate to cloud server
When app launches.
You need “trigger”
to wake up cloud authentication.
25
Time to
Open the door
26
D E M O
S E C T I O N
AWS S3 Exploitaion
27
A N O T H E R M I S T A K E S
Some apps include AWS Access Keys in APK.
Which means you literally got the keys to the cloud.
Access keys in
APK
Access keys should be designated to only one service.
But some apps are sharing access keys so that attacker can exploit multiple cloud resource.
Key shared
For different
services
28
Mitigations
29
Check whether cloud resources
Has too much permission.
S E C U R E C O N F I G
Do not access to cloud directly.
Use API gateway for relaying
Request/response data.
S E C U R E A R C H I T E C T U R E
For abusing detection,
Set up logging and monitoring
BUG BOUNTY PROGRAM!!!
M O N I T O R I N G
30
USE REST API
M I T I G A T I O N S
Do not access cloud resource from client-side.
Rest API will prevent exposure of access keys.
Build own Rest API
Instead of using
Aws SDK
31
COLLECTING APPS FROM PLAYSTORE
A T T A C K V E C T O R S
Collecting apk files is really painful and time consuming work.
I collected android apps as many as possible for testing
+ 160 Countries
+ 60 Categories
And…
Not loading at once
(Scroll down required)
32
COLLECTING APPS FROM PLAYSTORE
A T T A C K V E C T O R S
Ideas from “InstaPy” which automates social media interaction using Sellenium module.
Crawling pakage_name of apps and downloaded using GpAPI (https://github.com/NoMore201/googleplay-api)
33
CHECK MOBILE SDK
A T T A C K V E C T O R S
With simple greping, you can find which apps include mobile sdk.
Thousands of android apps found.
“aws-android-sdk”
…
“windowsazure”
34
A T T A C K V E C T O R S
KEY EXTRACTION
AWS Access Keys will be used while cloud authentication with SDK.
Decompile apk file and find target class and method to extract keys.
35
GET IN TOUCH
We welcom any feedback or questions about soFrida
H y u n j u n P a r k
j u n e 5 0 7 9 @ g m a i l . c o m
j u n e _ p a r k @ k o r e a . a c . k r
F. B / Tw i t : j u n e 5 0 7 9
36
Thank you

More Related Content

What's hot

Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...National Chengchi University
 
Leveraging Campaigns to Untangle the Threat Group Ship of Theseus
Leveraging Campaigns to Untangle the Threat Group Ship of TheseusLeveraging Campaigns to Untangle the Threat Group Ship of Theseus
Leveraging Campaigns to Untangle the Threat Group Ship of TheseusAdam Pennington
 
When Security Tools Fail You
When Security Tools Fail YouWhen Security Tools Fail You
When Security Tools Fail YouMichael Gough
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMIftikhar Ali Iqbal
 
Baggage Tracking
Baggage TrackingBaggage Tracking
Baggage TrackingPARUSH GARG
 
Intelligent approach for smart car parking reservation and security maintenan...
Intelligent approach for smart car parking reservation and security maintenan...Intelligent approach for smart car parking reservation and security maintenan...
Intelligent approach for smart car parking reservation and security maintenan...eSAT Journals
 
Internet of vehicles, vehicular social networks and cybersecurity
Internet of vehicles, vehicular social networks and cybersecurityInternet of vehicles, vehicular social networks and cybersecurity
Internet of vehicles, vehicular social networks and cybersecurityShambhu Ram
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorCamilo Fandiño Gómez
 
Fnal year project on iot accident detection and tracking system 26-may 21'
 Fnal year project on iot accident detection and tracking system  26-may 21' Fnal year project on iot accident detection and tracking system  26-may 21'
Fnal year project on iot accident detection and tracking system 26-may 21'ankitadeokate
 
Cloud-Native Security
Cloud-Native SecurityCloud-Native Security
Cloud-Native SecurityVMware Tanzu
 
Siber Güvenlik Kış Kampı'18 Soruları
Siber Güvenlik Kış Kampı'18 SorularıSiber Güvenlik Kış Kampı'18 Soruları
Siber Güvenlik Kış Kampı'18 SorularıBGA Cyber Security
 
API Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAPI Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAaronLieberman5
 
20 common security vulnerabilities and misconfiguration in Azure
20 common security vulnerabilities and misconfiguration in Azure20 common security vulnerabilities and misconfiguration in Azure
20 common security vulnerabilities and misconfiguration in AzureCheah Eng Soon
 
Vehicle access control using anpr
Vehicle access control using anprVehicle access control using anpr
Vehicle access control using anprtechlead-india
 
WEBSOCKET Protokolünün Derinlemesine İncelenmesi
WEBSOCKET Protokolünün Derinlemesine İncelenmesiWEBSOCKET Protokolünün Derinlemesine İncelenmesi
WEBSOCKET Protokolünün Derinlemesine İncelenmesiBGA Cyber Security
 
Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Linaro
 
Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Priyanka Aash
 
IOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFIDIOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFIDMaheshMoses
 

What's hot (20)

Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
 
Leveraging Campaigns to Untangle the Threat Group Ship of Theseus
Leveraging Campaigns to Untangle the Threat Group Ship of TheseusLeveraging Campaigns to Untangle the Threat Group Ship of Theseus
Leveraging Campaigns to Untangle the Threat Group Ship of Theseus
 
When Security Tools Fail You
When Security Tools Fail YouWhen Security Tools Fail You
When Security Tools Fail You
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
Baggage Tracking
Baggage TrackingBaggage Tracking
Baggage Tracking
 
Intelligent approach for smart car parking reservation and security maintenan...
Intelligent approach for smart car parking reservation and security maintenan...Intelligent approach for smart car parking reservation and security maintenan...
Intelligent approach for smart car parking reservation and security maintenan...
 
Internet of vehicles, vehicular social networks and cybersecurity
Internet of vehicles, vehicular social networks and cybersecurityInternet of vehicles, vehicular social networks and cybersecurity
Internet of vehicles, vehicular social networks and cybersecurity
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity Monitor
 
Fnal year project on iot accident detection and tracking system 26-may 21'
 Fnal year project on iot accident detection and tracking system  26-may 21' Fnal year project on iot accident detection and tracking system  26-may 21'
Fnal year project on iot accident detection and tracking system 26-may 21'
 
Cloud-Native Security
Cloud-Native SecurityCloud-Native Security
Cloud-Native Security
 
Siber Güvenlik Kış Kampı'18 Soruları
Siber Güvenlik Kış Kampı'18 SorularıSiber Güvenlik Kış Kampı'18 Soruları
Siber Güvenlik Kış Kampı'18 Soruları
 
Cyber Security Threat Modeling
Cyber Security Threat ModelingCyber Security Threat Modeling
Cyber Security Threat Modeling
 
API Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAPI Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIs
 
20 common security vulnerabilities and misconfiguration in Azure
20 common security vulnerabilities and misconfiguration in Azure20 common security vulnerabilities and misconfiguration in Azure
20 common security vulnerabilities and misconfiguration in Azure
 
Vehicle access control using anpr
Vehicle access control using anprVehicle access control using anpr
Vehicle access control using anpr
 
WEBSOCKET Protokolünün Derinlemesine İncelenmesi
WEBSOCKET Protokolünün Derinlemesine İncelenmesiWEBSOCKET Protokolünün Derinlemesine İncelenmesi
WEBSOCKET Protokolünün Derinlemesine İncelenmesi
 
Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_
 
DroneSAR - Search and rescue
DroneSAR - Search and rescueDroneSAR - Search and rescue
DroneSAR - Search and rescue
 
Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)
 
IOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFIDIOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFID
 

Similar to Dynamic Mobile App Analysis Tool Reveals Cloud Security Risks

New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0Dinis Cruz
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeNowSecure
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...lior mazor
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf
 
PROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYSylvain Martinez
 
App sec and quality london - may 2016 - v0.5
App sec and quality   london -  may 2016 - v0.5App sec and quality   london -  may 2016 - v0.5
App sec and quality london - may 2016 - v0.5Dinis Cruz
 
Improving Mobile Authentication for Public Safety and First Responders
Improving Mobile Authentication for Public Safety and First RespondersImproving Mobile Authentication for Public Safety and First Responders
Improving Mobile Authentication for Public Safety and First RespondersPriyanka Aash
 
Applications Development
Applications DevelopmentApplications Development
Applications DevelopmentThe Sapper UAE
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Black Duck by Synopsys
 
Asset management for cybersecurity
Asset management for cybersecurityAsset management for cybersecurity
Asset management for cybersecuritynathan-axonius
 
Security Monitoring (SPaaS)
Security Monitoring (SPaaS)Security Monitoring (SPaaS)
Security Monitoring (SPaaS)cyberware AI
 
Samsung knox and android for work
Samsung knox and android for workSamsung knox and android for work
Samsung knox and android for workJavier Gonzalez
 
42crunch-API-security-workshop
42crunch-API-security-workshop42crunch-API-security-workshop
42crunch-API-security-workshop42Crunch
 
DIY guide to runbooks, incident reports, and incident response
DIY guide to runbooks, incident reports, and incident responseDIY guide to runbooks, incident reports, and incident response
DIY guide to runbooks, incident reports, and incident responseNathan Case
 
Resume-Kunwar Abhishek
Resume-Kunwar AbhishekResume-Kunwar Abhishek
Resume-Kunwar AbhishekAbuagrabaa
 
UNICORN PROJECT - PAGE BROCHURE
UNICORN PROJECT - PAGE BROCHUREUNICORN PROJECT - PAGE BROCHURE
UNICORN PROJECT - PAGE BROCHUREUNICORN
 

Similar to Dynamic Mobile App Analysis Tool Reveals Cloud Security Risks (20)

Is my app secure?
Is my app secure?Is my app secure?
Is my app secure?
 
Is My App Secure ?
 Is My App Secure ? Is My App Secure ?
Is My App Secure ?
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
 
PROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITY
 
App sec and quality london - may 2016 - v0.5
App sec and quality   london -  may 2016 - v0.5App sec and quality   london -  may 2016 - v0.5
App sec and quality london - may 2016 - v0.5
 
Improving Mobile Authentication for Public Safety and First Responders
Improving Mobile Authentication for Public Safety and First RespondersImproving Mobile Authentication for Public Safety and First Responders
Improving Mobile Authentication for Public Safety and First Responders
 
Applications Development
Applications DevelopmentApplications Development
Applications Development
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Asset management for cybersecurity
Asset management for cybersecurityAsset management for cybersecurity
Asset management for cybersecurity
 
Security Monitoring (SPaaS)
Security Monitoring (SPaaS)Security Monitoring (SPaaS)
Security Monitoring (SPaaS)
 
Samsung knox and android for work
Samsung knox and android for workSamsung knox and android for work
Samsung knox and android for work
 
Cloud comoputing
Cloud comoputingCloud comoputing
Cloud comoputing
 
42crunch-API-security-workshop
42crunch-API-security-workshop42crunch-API-security-workshop
42crunch-API-security-workshop
 
DIY guide to runbooks, incident reports, and incident response
DIY guide to runbooks, incident reports, and incident responseDIY guide to runbooks, incident reports, and incident response
DIY guide to runbooks, incident reports, and incident response
 
Ug soar 22sep21
Ug soar 22sep21Ug soar 22sep21
Ug soar 22sep21
 
Resume-Kunwar Abhishek
Resume-Kunwar AbhishekResume-Kunwar Abhishek
Resume-Kunwar Abhishek
 
UNICORN PROJECT - PAGE BROCHURE
UNICORN PROJECT - PAGE BROCHUREUNICORN PROJECT - PAGE BROCHURE
UNICORN PROJECT - PAGE BROCHURE
 

Recently uploaded

Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 

Recently uploaded (20)

Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 

Dynamic Mobile App Analysis Tool Reveals Cloud Security Risks

  • 1. 1 soFrida Dynamic Analysis Tool for Mobile Apps with Cloud Backend @DEFCON 27 DEMO LABS Hyunjun Park Korea Univ. / Samsung SDS Soyeon Kim Samsung SDS Seungjoo Kim* Korea Univ. and Yeongjin Jang Oregon State Univ. * Corresponding Author
  • 2. 2 H y u n J u n P a r k K o r e a U n i v e r s i t y & S a m s u n g S D S j u n e _ p a r k @ k o r e a . a c . k r j u n e 5 0 7 9 @ g m a i l . c o m Hyunjun Park is a senior engineer of Samsung SDS in South Korea and a graduate student of Korea University. His daily job is pentesting a broad range of Samsung products including smart phone, smart TV, wearable devices, etc. He also serves as a main staff of Kimchicon Security Conference in South Korea.
  • 3. 3 S o y e o n K i m S a m s u n g S D S s s o y o u n k @ g m a i l . c o m Soyeon Kim is a security researcher of Samsung SDS in South Korea. She mainly doing a security assessment of Samsung IoT products. She is interested in analyzing Android apps and IOS apps using Frida.
  • 4. 4 S e u n g j o o ( G a b r i e l ) K i m K o r e a U n i v e r s i t y s k i m 7 1 @ k o r e a . a c . k r Seungjoo (Gabriel) Kim is a professor of Graduate School of Information Security at Korea University from 2011. For the past 7 years he was an associate professor of Sungkyunkwan University and have 5 years of back ground of team leader of Cryptographic Technology Team and also IT Security Evaluation Team of KISA(Korea Internet & Security Agency). In addition to being a professor, he is positioning a director of CHAOS(Center for High- Assurance Operating Systems), a head of SANE(Security Analysis aNd Evaluation) Lab, an adviser of hacking club ‘CyKor(two-times champion of DEF CON CTF 2015 & 2018)’ of Korea University, and a founder/advisory director of an international security & hacking conference ‘SECUINSIDE’. • Corresponding Author • This work was supported by Institute for Information & communications Technology Promotion(IITP) grant funded by the Korea government(MSIP) (IITP-2017-0-00184, Self-Learning Cyber Immune Technology Development)
  • 5. 5 TOPICS B a c k g r o u n d E x p l a i n w h y c l o u d d a t a l e a k E x p e r i m e n t S h a r e h o w I g o t m o t i v a t e d A t t a c k Ve c t o r s E x p l a i n d e t a i l e d v e c t o r s To a t t a c k c l o u d r e s o u r c e M i t i g a t i o n s R e c o m m e n d a t i o n t o m i t i g a t e v u l n e r a b i l i t i e s Understand how to collect Android Apps and Find Cloud Vulnerabilities though SDK
  • 6. 6 “What if you can directly extract AWS access keys from mobile apps?”
  • 7. 7 RESULT OF RESEARCH s o F r i d a I n t r o d u c t i o n We ' v e i n s p e c t 4 m i l l i o n s o f A n d r o i d a p p s a n d f o u n d c r i t i c a l v u l n e r a b i l i t i e s o n m u l t i p l e a p p s . We ' v e p u b l i s i s h e d d e t a i l s o f s t a t i s t i c s d a t a o f o u r r e s e a r c h o n h t t p s : / / s o f r i d a . g i t h u b . i o 253 A p p s a r e C l a s s i f i e d a s V u l n e r a b l e 2700 A p p s a r e p o t e n t i a l l y v u l n e r a b l e ( U s i n g A W S S D K ) 53 A p p s h a s c r i t i c a l l y v u l n e r a b l e ( D a t a c a n b e l e a k e d ) But only 3 developers responded us
  • 8. 8 June, 8, 2019 • We sent a notification to each developer of the vulnerable apps, and also notified that we would release the list of vulnerable apps through this site after 2 weeks. TIMELINE s o F r i d a I n t r o d u c t i o n June, 6, 2019 • We had identified 2,700+ android apps which were potentially vulnerable. • We began in-depth analysis of these 2700+ apps, and classified 236 apps as “actually risky”. June, 19, 2019 • We reported the vulnerability details and the list of vulnerable Korean apps to KISA(Korea Internet & Security Agency), NSR(National Security Research Institute) and FSI(Financial Security Institute). June, 21, 2019 • Among the developers we contacted, only 3 developers contacted us again. • We contacted to security team of AWS, and asked them to help each app developer take an action. June, 25, 2019 • As CSP’s request, we sent them the entire list of vulnerable apps, which were classfied as actually risky by soFrida. June, 27, 2019 • CSP asked us to hold publishing the list of vulernable apps. • As their request, we finally decided to delay publishing the list until they took enough action.
  • 9. 9 U b e r D a t a L e a k ( 2 0 1 6 ) T i m e W a r n e r C a b l e ( 2 0 1 7 ) F e d E x ( 2 0 1 8 ) AWS Account Hacked Personal Information of 57 Million users 4 Million Customer Records Exposed Via AWS S3 119,000 US Citizen’s Personal Information Leaked DATA LEAK HISTORY B A C K G R O U N D Unfortunately, oftentimes developers grant public access permission to the AWS Service. W h a t ’ s N e x t ?
  • 10. 10 WHY IT HAPPENS B A C K G R O U D N D T h e r e a r e 3 r e a s o n s f o r c l o u d d a t a l e a k a g e Root key used / All users have same keys / Key Values are hardcoded K e y M a n a g e m e n t F a i l u r e READ/WRITE permission to everyone, Users are not seperate C l o u d P e r m i s s i o n F a i l u r e No Cloudtrail, No Logging, No Alerting N o M o n i t o r i n g , N o R e s p o n s e
  • 11. 11 Open S3 Bucket WriteAble To Any Aws User (https://hackerone.com/reports/209223) S3 Resouces are publicly accessible and writable to anonymous users. ! Cloud misconfiguration (No Key, No Permission Setting) B A C K G R O U N D CLOUD MISCONFIG Cloud resources are publicly accessible or writable All Permissions are granted to users Root-Key given
  • 12. 12 DJI BugBounty ($30,000) AWS AccessKeyId and SecretKeyId are found at Github http://www.digitalmunition.com/WhyIWalkedFrom3k.pdf ! Key Values are hardcoded B A C K G R O U N D KEY EXPOSED AWS Key-Pairs are exposed to public (github, src codes)
  • 13. 13 “AWS S3 has own bucket name But I don’t know what it is” “But what if I can guess and check Bucket name?"
  • 14. 14 AWS S3 Bruteforce with Wordlists E x p e r i m e n t You can simply send requests and figure out whether bucket exist or not. I used word combinations with target name and wordlists based on Bug bounty experience. S3 Address looks like this: BUCKET.s3.amazonaws.com s3.amazonaws.com/BUCKET s3.ap-northeast-2.amazonaws.com/BUCKET (Region Info Added) Fedex-bucket.s3.amazonaws.com
  • 15. 15 “But, It is not enough Because…" Too much efforts to find just one bucket. It doesn’t guarantee that bucket is publicly accessible even you found bucket name (Mostly “ACCESS DENIED”) Not Efficient This attack depends on luck Even though you find public opend bucket, you can’t recognize who owns the bucket. (Anyone can register bucket with non-used bucket name) Not Reliable
  • 16. 16 Let’s move on to the Access keys
  • 17. 17 WHAT IT MEANS YOU HAVE ACCESS KEYS A T T A C K V E C T O R S Like a user name and password, you must use both the access key ID and secret access key together to authenticate your requests. Manage your access keys as securely as you do your user name and password. Key-pairs should not be open to users. If access keys are exposed to public Attacker can use them to access to cloud resource U N V E I L A C C E S S K E Y S Access keys only works for the designated one. If you have them, you can specify the owner of services. S P E C I F Y TA R G E T You can authorize to the cloud resource with access keys A C C E S S G R A N T E D
  • 18. 18 AWS Mobile SDK Architecture A T T A C K V E C T O R S You can SECURELY(?) access to the Cloud resources using AWS mobile SDK (SDK is Integrated in mobile apps)
  • 19. 19 AWS SDK INTEGRATED WITH MOBILE APPS A T T A C K V E C T O R S You can simply check if mobile apps includes AWS SDK by searching “com.amazonaws” If SDK included, the app may connect to “own cloud resources” using “Access Keys”
  • 20. 20 soFrida ATTACK DIAGRAM A T T A C K V E C T O R S A c o m p a n y i s a n a s s o c i a t i o n o r c o l l e c t i o n o f i n d i v i d u a l s , w h e t h e r n a t u r a l p e r s o n s , l e g a l p e r s o n s , o r a m i x t u r e o f b o t h . C o m p a n y m e m b e r s s h a r e a c o m m o n p u r p o s e a n d u n i t e i n o r d e r t o f o c u s . A company is an association or collection of individuals, whether C o l l e c t i n g A p p s A company is an association or collection of individuals, whether C h e c k M o b i l e S D K A company is an association or collection of individuals, whether K E Y E x t r a c t i o n A company is an association or collection of individuals, whether E x p l o i t C l o u d R e s .
  • 21. 21 AUTOMATED ANALYSIS WITH SOFRIDA Using “soFrida”, you can check app is secure for key extraction and cloud is configured properly. Download : https://github.com/june5079/soFrida Tutorials : https://www.youtube.com/watch?v=l8B3vrJg7zk https://www.youtube.com/watch?v=l8B3vrJg7zk * Download APK from Google Play * Get Detail Information of App * Manage Your Own App * AWS Key Extraction by Dynamic Analysis * AWS Misconfiguration Check * Pull APK Files from Own Device
  • 22. 22 A T T A C K V E C T O R S KEY EXTRACTION AWS Access Keys will be used while cloud authentication with SDK. Decompile apk file and find target class and method to extract keys. Hooking point
  • 23. 23 A T T A C K V E C T O R S KEY EXTRACTION AWS Access Keys will be used while cloud authentication with SDK. Decompile apk file and find target class and method to extract keys. All Access Keys Extracted
  • 24. 24 CASE ONE When app launches, It authenticate to cloud server using mobile SDK. Access keys can be extracted by hooking com.amazonaws classes CASE TWO App does not authenticate to cloud server When app launches. You need “trigger” to wake up cloud authentication.
  • 26. 26 D E M O S E C T I O N AWS S3 Exploitaion
  • 27. 27 A N O T H E R M I S T A K E S Some apps include AWS Access Keys in APK. Which means you literally got the keys to the cloud. Access keys in APK Access keys should be designated to only one service. But some apps are sharing access keys so that attacker can exploit multiple cloud resource. Key shared For different services
  • 29. 29 Check whether cloud resources Has too much permission. S E C U R E C O N F I G Do not access to cloud directly. Use API gateway for relaying Request/response data. S E C U R E A R C H I T E C T U R E For abusing detection, Set up logging and monitoring BUG BOUNTY PROGRAM!!! M O N I T O R I N G
  • 30. 30 USE REST API M I T I G A T I O N S Do not access cloud resource from client-side. Rest API will prevent exposure of access keys. Build own Rest API Instead of using Aws SDK
  • 31. 31 COLLECTING APPS FROM PLAYSTORE A T T A C K V E C T O R S Collecting apk files is really painful and time consuming work. I collected android apps as many as possible for testing + 160 Countries + 60 Categories And… Not loading at once (Scroll down required)
  • 32. 32 COLLECTING APPS FROM PLAYSTORE A T T A C K V E C T O R S Ideas from “InstaPy” which automates social media interaction using Sellenium module. Crawling pakage_name of apps and downloaded using GpAPI (https://github.com/NoMore201/googleplay-api)
  • 33. 33 CHECK MOBILE SDK A T T A C K V E C T O R S With simple greping, you can find which apps include mobile sdk. Thousands of android apps found. “aws-android-sdk” … “windowsazure”
  • 34. 34 A T T A C K V E C T O R S KEY EXTRACTION AWS Access Keys will be used while cloud authentication with SDK. Decompile apk file and find target class and method to extract keys.
  • 35. 35 GET IN TOUCH We welcom any feedback or questions about soFrida H y u n j u n P a r k j u n e 5 0 7 9 @ g m a i l . c o m j u n e _ p a r k @ k o r e a . a c . k r F. B / Tw i t : j u n e 5 0 7 9