This document outlines a project to implement SNMP (Simple Network Management Protocol) on the Android platform. The objectives are to monitor system parameters, improve application performance, and enhance quality of service for users. It describes implementing SNMPv1 to allow Android devices to function as SNMP managers and agents. This allows the devices to send and respond to SNMP requests and traps. The project is evaluated over seven weeks, with tasks including research, requirements gathering, development, testing, and documentation. It concludes that Android network management will be important for future technologies like IoT and sensor networks.
This document provides an overview of stealth technology used in aircraft. It discusses the history of stealth beginning with camouflage tactics in WWI. Key aspects covered include how radar works, methods used in stealth like shape design and radar absorbing materials, and examples of stealth aircraft like the F-117, B-2, and F-22. Advantages of stealth include invisibility to radar and performing spy missions covertly, while disadvantages include reduced payload and high costs. The document concludes that stealth technology is an important future of military aviation.
2015.04.24 Updated > Android Security Development - Part 1: App Development Cheng-Yi Yu
This document discusses various aspects of securing Android app development, including:
- Setting debuggable and backup permissions to false to prevent unauthorized access.
- Clearing the clipboard when leaving an app to avoid content being copied elsewhere.
- Only requesting necessary permissions and removing unneeded ones over time.
- Encrypting databases using SQLCipher or the SQLite Encryption Extension.
- Verifying SSL certificates and encrypting network traffic using HTTPS.
- Performing cryptography in C/C++ via the Android NDK for increased security.
- Generating secure access tokens, passwords, and keys using techniques like hardware IDs and scrambling.
- Validating user input through secure hashing algorithms.
What is compiled Xaml and should I use it in my app?
In this presentation, Matthew Robbins, a Xamarin expert and developer at JobAdder, answers that exact question. Learn about the performance benefits developers gain by applying compiled Xaml to their Xamarin.Forms applications.
You’ve probably heard a lot of time that Xamarin tools generate native applications for iOS and Android, but how does this really work? What is the difference between developing with ObjectiveC/Swift and Java? What are the problems that could arise by using the Xamarin approach? Come and see as we take a look under the hood of the Xamarin frameworks.
The document discusses two common internal network attacks - LLMNR spoofing and SMB relaying. LLMNR spoofing takes advantage of the unauthenticated nature of LLMNR to respond to name resolution requests as the target machine, allowing collection of password hashes. SMB relaying modifies and relays SMB packets to establish an authenticated connection and execute commands. The document provides demonstrations of these attacks and recommendations for mitigations like disabling vulnerable protocols, network segregation, and password security best practices.
A Survey Report on DDOS Attacking Tools, Detection and Prevention MechanismsIRJET Journal
This document summarizes a survey report on DDOS attacking tools, detection mechanisms, and prevention methods. It begins by introducing DDOS attacks and their increasing prevalence. It then describes several common DDOS attacking tools like Trinoo and Shaft in detail, including their mechanisms and a comparison. It discusses two main detection mechanisms - Snort, an open-source intrusion detection system, and time series analysis. Finally, it outlines a DDOS prevention protocol called DLSR that detects attacks and identifies attackers in three phases: detection, identification, and defense.
This document outlines a project to implement SNMP (Simple Network Management Protocol) on the Android platform. The objectives are to monitor system parameters, improve application performance, and enhance quality of service for users. It describes implementing SNMPv1 to allow Android devices to function as SNMP managers and agents. This allows the devices to send and respond to SNMP requests and traps. The project is evaluated over seven weeks, with tasks including research, requirements gathering, development, testing, and documentation. It concludes that Android network management will be important for future technologies like IoT and sensor networks.
This document provides an overview of stealth technology used in aircraft. It discusses the history of stealth beginning with camouflage tactics in WWI. Key aspects covered include how radar works, methods used in stealth like shape design and radar absorbing materials, and examples of stealth aircraft like the F-117, B-2, and F-22. Advantages of stealth include invisibility to radar and performing spy missions covertly, while disadvantages include reduced payload and high costs. The document concludes that stealth technology is an important future of military aviation.
2015.04.24 Updated > Android Security Development - Part 1: App Development Cheng-Yi Yu
This document discusses various aspects of securing Android app development, including:
- Setting debuggable and backup permissions to false to prevent unauthorized access.
- Clearing the clipboard when leaving an app to avoid content being copied elsewhere.
- Only requesting necessary permissions and removing unneeded ones over time.
- Encrypting databases using SQLCipher or the SQLite Encryption Extension.
- Verifying SSL certificates and encrypting network traffic using HTTPS.
- Performing cryptography in C/C++ via the Android NDK for increased security.
- Generating secure access tokens, passwords, and keys using techniques like hardware IDs and scrambling.
- Validating user input through secure hashing algorithms.
What is compiled Xaml and should I use it in my app?
In this presentation, Matthew Robbins, a Xamarin expert and developer at JobAdder, answers that exact question. Learn about the performance benefits developers gain by applying compiled Xaml to their Xamarin.Forms applications.
You’ve probably heard a lot of time that Xamarin tools generate native applications for iOS and Android, but how does this really work? What is the difference between developing with ObjectiveC/Swift and Java? What are the problems that could arise by using the Xamarin approach? Come and see as we take a look under the hood of the Xamarin frameworks.
The document discusses two common internal network attacks - LLMNR spoofing and SMB relaying. LLMNR spoofing takes advantage of the unauthenticated nature of LLMNR to respond to name resolution requests as the target machine, allowing collection of password hashes. SMB relaying modifies and relays SMB packets to establish an authenticated connection and execute commands. The document provides demonstrations of these attacks and recommendations for mitigations like disabling vulnerable protocols, network segregation, and password security best practices.
A Survey Report on DDOS Attacking Tools, Detection and Prevention MechanismsIRJET Journal
This document summarizes a survey report on DDOS attacking tools, detection mechanisms, and prevention methods. It begins by introducing DDOS attacks and their increasing prevalence. It then describes several common DDOS attacking tools like Trinoo and Shaft in detail, including their mechanisms and a comparison. It discusses two main detection mechanisms - Snort, an open-source intrusion detection system, and time series analysis. Finally, it outlines a DDOS prevention protocol called DLSR that detects attacks and identifies attackers in three phases: detection, identification, and defense.
You’ve probably heard a lot of time that Xamarin tools generate native applications for iOS and Android, but how does this really work? What is the difference between developing with ObjectiveC/Swift and Java? What are the problems that could arise by using the Xamarin approach? Come and see as we take a look under the hood of the Xamarin frameworks
Secure 2019 - APT for Everyone - Adversary Simulations based on ATT&CK FrameworkLeszek Mi?
The presentation I gave during SECURE 2019 Conference in Poland - one of the most important IT Security event in the calendar of polish *Cyber Security* conferences.
DEF CON 27 - GRICHTER - reverse engineering 4g hotspots for fun bugs net fina...Felipe Prado
This document discusses reverse engineering 4G hotspots and cellular routers to find security vulnerabilities. It begins with an introduction to the speaker and overview of what will be discussed. It then provides examples of analyzing the ZTE MF910 and Netgear Nighthawk M1 routers, exploring their hardware, software architecture, attack surfaces, and discovering issues like hard-coded passwords and exposed services. The document concludes that more scrutiny is needed on consumer cellular networking gear given the growing number of devices and shared codebases across vendors.
This document discusses using machine learning to detect ransomware through analyzing microbehaviors rather than static signatures. It introduces the concept of using machine learning for cybersecurity and labeling data to help algorithms learn. The document then discusses modeling ransomware behaviors like file system modifications and callbacks. It outlines a plan to take labeled exploit and benign traffic data, extract microbehaviors, use machine learning to detect anomalies, and generate indicators of compromise.
The document provides instructions for a lab on Snort and firewall rules. It describes:
1) Setting up the virtual environment and configuring networking on the CyberOps Workstation VM.
2) Explaining the differences between firewall and IDS rules while noting their similarities, such as both having matching and action components.
3) Having students run commands to start a malware server, use Snort to monitor traffic, and download a file from the server to trigger an alert, observing the alert in the Snort log.
The document discusses the Ploutus.D ATM malware. It describes how Ploutus.D infects ATMs to force the ejection of cash. It has evolved over time to add remote access capabilities. The document outlines the malware's initialization process, activation steps using encryption, and methods for remotely connecting to infected ATMs. It also covers the software obfuscation techniques used by Ploutus.D to evade detection.
Over the past year, Intel Security has actively participated with global law enforcement agencies in take-down operations to shut down cybercrime infrastructure, associated malware and the cybercriminals themselves. This session will deconstruct emerging attack campaigns and techniques, examine pragmatic defense strategies and discuss what to expect in the future.
Automotive Cybersecurity: Test Like a HackerForAllSecure
Learn the techniques used by award-winning hacking teams (as well as in some real-world attacks) to identify and exploit vulnerabilities in OEM components and other automotive software. This presentation covers fundamental principles, as well as how to easily incorporate these techniques into unit or functional test stages - bringing an extra layer of protection to connected automobiles. We'll cover both how to best fit this type of testing into your pipeline to maximize speed and coverage, as well as discuss how to fit this offensive cyber security approach alongside your existing vulnerability scanning programs. Whether you're a vehicle manufacturer, integrator, or OEM - we'll discuss how to leverage hacking-based security techniques to improve protection across the supply chain and keep vehicles and drivers safer. What we'll cover:
- Successful exploits of components and vehicles - what these attacks had in common
- Layering offensive techniques atop existing security programs - what to do and what to avoid
- How to test integrated systems with multiple components from different OEMs working in tandem
- Integrating offensive testing into different stages in software development and component integration
Originally presented at https://www.automotive-iq.com/events-automotive-cybersecurity
OS Security Evolution & Latest Attack Vectors By Jacob TorreyPriyanka Aash
This is part of CISOPlatform 'Best of the World Webcast' webinar series where original/breakthrough information security researchers present to you. So, the CISO can stay ahead of his time, ahead of his threats. Uncover some of the best interesting infosec threats in this sector.
Once you go cloud you never go down - by Enter - festival ICT 2015festival ICT 2016
Come si fa ad essere sempre online? Come si gestiscono i picchi di traffico previsti e imprevisti di un sito, e-commerce, blog o portale di informazione?
Dalla vecchia infrastruttura server ad una soluzione cloud: nel nostro intervento vi mostreremo come creare infrastrutture a supporto di applicazioni web su un cloud OpenStack (Enter Cloud Suite) e vedremo quali sono i vantaggi in termini di sicurezza, di costi di gestione e di performance.
Capiremo come gestire istanze cloud in un sistema europeo multiregion, come impostare snapshot, backup, storage, health check e load balancer e come gestire scalabilità e automazioni.
Il talk è particolarmente indicato per sistemisti, DevOps e full stack developer che vogliono sviluppare soluzioni stabili, flessibili e sicure.
Bettercap is a tool for performing man-in-the-middle (MITM) attacks against networks. It can manipulate HTTP, HTTPS, and TCP traffic in real-time, sniff for credentials, and more. Bettercap uses techniques like ARP spoofing and ICMP redirect spoofing to position itself as the man-in-the-middle. It includes built-in sniffer and proxy modules to extract credentials and modify traffic on the fly. Some key features include HTTP/HTTPS proxying with SSL stripping and HSTS bypass, a modular architecture for customizing traffic manipulation, and support for Linux, macOS, and OpenBSD.
This document discusses techniques for lateral movement that adversaries use to access and control remote systems on a network. It outlines various methods like exploiting vulnerabilities, abusing legitimate Windows features like Windows services, scheduled tasks, WMI, WinRM and DCOM. The document also discusses how blue teams can detect these techniques by monitoring authentication events, system events, object access logs, WMI activity and Windows remote management logs. It describes using tools like Oriana and frequency analysis to hunt for lateral movement indicators in Windows event logs collected via Windows Event Forwarding.
With a surge in the production of internet of things (IoT) devices, embedded development tools are becoming commonplace and the software they run on is often trusted to run in escalated modes. However, some of the embedded development tools on the market contain serious vulnerabilities that put users at risk. In this talk we discuss the various attack vectors that these embedded development tools expose users to, and why users should not blindly trust their tools. This talk will detail a variety reverse engineering, fuzzing, exploit development and protocol analysis techniques that we used to analyze and exploit the security of a common embedded debugger.
All content not indexed by traditional web-based search engines is known as the DeepWeb. Wrongly been associated only with the Onion Routing (TOR), the DeepWeb's ecosystem comprises a number of other anonymous and decentralized networks. The Invisible Internet Project (I2P), FreeNET, and Alternative Domain Names (like Name.Space and OpenNic) are examples of networks leveraged by bad actors to host malware, high-resilient botnets, underground forums and bitcoin-based cashout systems (e.g., for cryptolockers).
We designed and implemented a prototype system called DeWA for the automated collection and analysis of the DeepWeb, with the goal of quickly identifying new threats as soon they appear.
In this talk, we provide concrete examples of how using DeWA to detect, e.g., trading of illicit and counterfeit goods, underground forums, privacy leaks, hidden dropzones, malware hosting and TOR-based botnets.
All content not indexed by traditional web-based search engines is known
as the DeepWeb. Wrongly been associated only with the Onion Routing
(TOR), the DeepWeb's ecosystem comprises a number of other anonymous and
decentralized networks. The Invisible Internet Project (I2P), FreeNET,
and Alternative Domain Names (like Name.Space and OpenNic) are examples
of networks leveraged by bad actors to host malware, high-resilient
botnets, underground forums and bitcoin-based cashout systems (e.g., for
cryptolockers).
We designed and implemented a prototype system called DeWA for the
automated collection and analysis of the DeepWeb, with the goal of
quickly identifying new threats as soon they appear.
In this talk, we provide concrete examples of how using DeWA to detect,
e.g., trading of illicit and counterfeit goods, underground forums,
privacy leaks, hidden dropzones, malware hosting and TOR-based botnets.
[Guest lecturer]
Place: University of Twente
Course: Network Security
Audience: bachelor students of computer science and electrical engineer, master students of computer science and telematics, master students from the 3TU cyber security, and members of ICT labs.
How Hack WiFi through Aircrack-ng in Kali Linux Cyber SecurityAhmad Yar
Aircrack- ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet capture and export of data to text files for further processing by third party tools
Liam Randall of Critical Stack at S4x15 Operation Technology Day. Liam is a Bro guru and describes how it can be used to monitor communications, detect attacks and analyze data.
New features and controls in Xamarin Forms 4.3 and 4.4, including CollectionView, RefreshView, CarouselView, IndicatorView and SwipeView. Associated code is here:
https://github.com/AlecDTucker/MonkeyFestAustralia2020
Enterprise Mobile Security and OWASP ComplianceAlec Tucker
The document discusses the Open Web Application Security Project (OWASP) mobile security standards and guidelines. It summarizes the OWASP Top 10 mobile risks from 2014 and 2016. Some key risks covered include insecure data storage, insecure communication, insecure authentication, and insufficient cryptography. The document provides examples of how to address some of these risks when developing mobile apps, such as checking SSL certificates and blurring screenshots. It emphasizes the importance of following security best practices for areas like authentication, authorization, and secure coding. Overall, the document promotes complying with standards like OWASP and PCI for building secure mobile applications.
More Related Content
Similar to SydMobNet March 2016: Matthew Robbins - Android M Security Policies
You’ve probably heard a lot of time that Xamarin tools generate native applications for iOS and Android, but how does this really work? What is the difference between developing with ObjectiveC/Swift and Java? What are the problems that could arise by using the Xamarin approach? Come and see as we take a look under the hood of the Xamarin frameworks
Secure 2019 - APT for Everyone - Adversary Simulations based on ATT&CK FrameworkLeszek Mi?
The presentation I gave during SECURE 2019 Conference in Poland - one of the most important IT Security event in the calendar of polish *Cyber Security* conferences.
DEF CON 27 - GRICHTER - reverse engineering 4g hotspots for fun bugs net fina...Felipe Prado
This document discusses reverse engineering 4G hotspots and cellular routers to find security vulnerabilities. It begins with an introduction to the speaker and overview of what will be discussed. It then provides examples of analyzing the ZTE MF910 and Netgear Nighthawk M1 routers, exploring their hardware, software architecture, attack surfaces, and discovering issues like hard-coded passwords and exposed services. The document concludes that more scrutiny is needed on consumer cellular networking gear given the growing number of devices and shared codebases across vendors.
This document discusses using machine learning to detect ransomware through analyzing microbehaviors rather than static signatures. It introduces the concept of using machine learning for cybersecurity and labeling data to help algorithms learn. The document then discusses modeling ransomware behaviors like file system modifications and callbacks. It outlines a plan to take labeled exploit and benign traffic data, extract microbehaviors, use machine learning to detect anomalies, and generate indicators of compromise.
The document provides instructions for a lab on Snort and firewall rules. It describes:
1) Setting up the virtual environment and configuring networking on the CyberOps Workstation VM.
2) Explaining the differences between firewall and IDS rules while noting their similarities, such as both having matching and action components.
3) Having students run commands to start a malware server, use Snort to monitor traffic, and download a file from the server to trigger an alert, observing the alert in the Snort log.
The document discusses the Ploutus.D ATM malware. It describes how Ploutus.D infects ATMs to force the ejection of cash. It has evolved over time to add remote access capabilities. The document outlines the malware's initialization process, activation steps using encryption, and methods for remotely connecting to infected ATMs. It also covers the software obfuscation techniques used by Ploutus.D to evade detection.
Over the past year, Intel Security has actively participated with global law enforcement agencies in take-down operations to shut down cybercrime infrastructure, associated malware and the cybercriminals themselves. This session will deconstruct emerging attack campaigns and techniques, examine pragmatic defense strategies and discuss what to expect in the future.
Automotive Cybersecurity: Test Like a HackerForAllSecure
Learn the techniques used by award-winning hacking teams (as well as in some real-world attacks) to identify and exploit vulnerabilities in OEM components and other automotive software. This presentation covers fundamental principles, as well as how to easily incorporate these techniques into unit or functional test stages - bringing an extra layer of protection to connected automobiles. We'll cover both how to best fit this type of testing into your pipeline to maximize speed and coverage, as well as discuss how to fit this offensive cyber security approach alongside your existing vulnerability scanning programs. Whether you're a vehicle manufacturer, integrator, or OEM - we'll discuss how to leverage hacking-based security techniques to improve protection across the supply chain and keep vehicles and drivers safer. What we'll cover:
- Successful exploits of components and vehicles - what these attacks had in common
- Layering offensive techniques atop existing security programs - what to do and what to avoid
- How to test integrated systems with multiple components from different OEMs working in tandem
- Integrating offensive testing into different stages in software development and component integration
Originally presented at https://www.automotive-iq.com/events-automotive-cybersecurity
OS Security Evolution & Latest Attack Vectors By Jacob TorreyPriyanka Aash
This is part of CISOPlatform 'Best of the World Webcast' webinar series where original/breakthrough information security researchers present to you. So, the CISO can stay ahead of his time, ahead of his threats. Uncover some of the best interesting infosec threats in this sector.
Once you go cloud you never go down - by Enter - festival ICT 2015festival ICT 2016
Come si fa ad essere sempre online? Come si gestiscono i picchi di traffico previsti e imprevisti di un sito, e-commerce, blog o portale di informazione?
Dalla vecchia infrastruttura server ad una soluzione cloud: nel nostro intervento vi mostreremo come creare infrastrutture a supporto di applicazioni web su un cloud OpenStack (Enter Cloud Suite) e vedremo quali sono i vantaggi in termini di sicurezza, di costi di gestione e di performance.
Capiremo come gestire istanze cloud in un sistema europeo multiregion, come impostare snapshot, backup, storage, health check e load balancer e come gestire scalabilità e automazioni.
Il talk è particolarmente indicato per sistemisti, DevOps e full stack developer che vogliono sviluppare soluzioni stabili, flessibili e sicure.
Bettercap is a tool for performing man-in-the-middle (MITM) attacks against networks. It can manipulate HTTP, HTTPS, and TCP traffic in real-time, sniff for credentials, and more. Bettercap uses techniques like ARP spoofing and ICMP redirect spoofing to position itself as the man-in-the-middle. It includes built-in sniffer and proxy modules to extract credentials and modify traffic on the fly. Some key features include HTTP/HTTPS proxying with SSL stripping and HSTS bypass, a modular architecture for customizing traffic manipulation, and support for Linux, macOS, and OpenBSD.
This document discusses techniques for lateral movement that adversaries use to access and control remote systems on a network. It outlines various methods like exploiting vulnerabilities, abusing legitimate Windows features like Windows services, scheduled tasks, WMI, WinRM and DCOM. The document also discusses how blue teams can detect these techniques by monitoring authentication events, system events, object access logs, WMI activity and Windows remote management logs. It describes using tools like Oriana and frequency analysis to hunt for lateral movement indicators in Windows event logs collected via Windows Event Forwarding.
With a surge in the production of internet of things (IoT) devices, embedded development tools are becoming commonplace and the software they run on is often trusted to run in escalated modes. However, some of the embedded development tools on the market contain serious vulnerabilities that put users at risk. In this talk we discuss the various attack vectors that these embedded development tools expose users to, and why users should not blindly trust their tools. This talk will detail a variety reverse engineering, fuzzing, exploit development and protocol analysis techniques that we used to analyze and exploit the security of a common embedded debugger.
All content not indexed by traditional web-based search engines is known as the DeepWeb. Wrongly been associated only with the Onion Routing (TOR), the DeepWeb's ecosystem comprises a number of other anonymous and decentralized networks. The Invisible Internet Project (I2P), FreeNET, and Alternative Domain Names (like Name.Space and OpenNic) are examples of networks leveraged by bad actors to host malware, high-resilient botnets, underground forums and bitcoin-based cashout systems (e.g., for cryptolockers).
We designed and implemented a prototype system called DeWA for the automated collection and analysis of the DeepWeb, with the goal of quickly identifying new threats as soon they appear.
In this talk, we provide concrete examples of how using DeWA to detect, e.g., trading of illicit and counterfeit goods, underground forums, privacy leaks, hidden dropzones, malware hosting and TOR-based botnets.
All content not indexed by traditional web-based search engines is known
as the DeepWeb. Wrongly been associated only with the Onion Routing
(TOR), the DeepWeb's ecosystem comprises a number of other anonymous and
decentralized networks. The Invisible Internet Project (I2P), FreeNET,
and Alternative Domain Names (like Name.Space and OpenNic) are examples
of networks leveraged by bad actors to host malware, high-resilient
botnets, underground forums and bitcoin-based cashout systems (e.g., for
cryptolockers).
We designed and implemented a prototype system called DeWA for the
automated collection and analysis of the DeepWeb, with the goal of
quickly identifying new threats as soon they appear.
In this talk, we provide concrete examples of how using DeWA to detect,
e.g., trading of illicit and counterfeit goods, underground forums,
privacy leaks, hidden dropzones, malware hosting and TOR-based botnets.
[Guest lecturer]
Place: University of Twente
Course: Network Security
Audience: bachelor students of computer science and electrical engineer, master students of computer science and telematics, master students from the 3TU cyber security, and members of ICT labs.
How Hack WiFi through Aircrack-ng in Kali Linux Cyber SecurityAhmad Yar
Aircrack- ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet capture and export of data to text files for further processing by third party tools
Liam Randall of Critical Stack at S4x15 Operation Technology Day. Liam is a Bro guru and describes how it can be used to monitor communications, detect attacks and analyze data.
Similar to SydMobNet March 2016: Matthew Robbins - Android M Security Policies (20)
New features and controls in Xamarin Forms 4.3 and 4.4, including CollectionView, RefreshView, CarouselView, IndicatorView and SwipeView. Associated code is here:
https://github.com/AlecDTucker/MonkeyFestAustralia2020
Enterprise Mobile Security and OWASP ComplianceAlec Tucker
The document discusses the Open Web Application Security Project (OWASP) mobile security standards and guidelines. It summarizes the OWASP Top 10 mobile risks from 2014 and 2016. Some key risks covered include insecure data storage, insecure communication, insecure authentication, and insufficient cryptography. The document provides examples of how to address some of these risks when developing mobile apps, such as checking SSL certificates and blurring screenshots. It emphasizes the importance of following security best practices for areas like authentication, authorization, and secure coding. Overall, the document promotes complying with standards like OWASP and PCI for building secure mobile applications.
Addressing the OWASP Mobile Security Threats using XamarinAlec Tucker
You think your mobile app is secure, but is it really? In this session from Xamarin Evolve 2016 in Orlando, Alec will give you the Top 10 mobile threats to be aware of and take an in-depth look at how to mitigate some of these threats using Xamarin and the OWASP Mobile Security Project. A video of the talk is available here: https://youtu.be/rCT9kiA7SE0?list=PLM75ZaNQS_Fb7I6E9MDnMgwW1GGZIijf_
Xamarin.Android applications can leak memory when framework objects like Activities are not properly cleaned up. StrictMode and the Android Debug Bridge (ADB) are useful tools for detecting memory leaks caused by lingering Activity references. Demonstrations showed an obvious leak from a static Activity reference and a less obvious leak from an anonymous delegate closure. Proper cleanup involves disposing of framework peers when no longer needed to allow garbage collection.
Sydney Mobile .Net Developers Group December 2014Alec Tucker
The document summarizes a meetup of the Sydney Mobile .Net Developers group in December 2014. It includes an agenda with news items on Xamarin hack days and Android Lollipop, as well as presentations on Xamarin Forms and by Jordan Knight. The meetup featured food, drinks, and raffle prizes from sponsors including Xamarin, Monkeys, Pluralsight and Oz-Code. Contact details were provided for the group online and for speakers Jordan Knight and Alec Tucker.
SydMobNet September 2014: ReactiveUI, Genymotion, Xamarin.UITest and Xamarin ...Alec Tucker
This document summarizes a meetup of the Sydney Mobile .Net Developers group in September 2014. The agenda included introductions, news updates, presentations on Reactive UI and mobile testing with Xamarin.UITest. The meetup also included lightning talks, food, and raffle prizes from event sponsors. Contact details were provided for speakers and organizers.
SydMobNet August 2014: What's New in iOS8 & Xamarin plus .Net MVC and Xamarin...Alec Tucker
Sydney Mobile .Net Developers August 2014 Meetup
Talks on:
What's New in iOS8 & Xamarin - Alex Blount
.Net MVC and Xamarin.Forms Mashups - Michael Ridland
SydMobNet July 2014: Xamarin 3 & Xamarin FormsAlec Tucker
The document summarizes a meetup event for the Sydney Mobile .Net Developers group focused on Xamarin 3. It includes an agenda with introductions, news on Xamarin and new Lumia devices, presentations on intro to Xamarin 3 features by Alec Tucker and on Xamarin.Forms by Filip Ekberg, as well as time for food, raffle prizes, and networking at a nearby pub. Key new aspects of Xamarin 3 highlighted include the Xamarin Designer for iOS and Android, improvements to code sharing between platforms, and the Xamarin.Forms framework.
SydMobNet May 2014 - Lewis Benge on Wearable TechAlec Tucker
Wearable technology is growing rapidly as an industry and will double in size to $1.6 billion within a year. Advances in smaller, faster, cheaper hardware, data storage solutions, wireless connectivity, and new sensors are enabling wearables to address real-world use cases and feed our curiosity to gather more information. As the technology progresses further between 2013 and 2023, our mobile phones may no longer be the central hub, and new possibilities for wearable devices are emerging to replace phone functions like display, location tracking, and voice interaction.
SydMobNet April 2014 - Nick Randolph's Build 2014 UpdateAlec Tucker
Nick Randolph's update on the Build 2014 announcements relevant to Windows Phone and Windows 8, delivered at the April meetup of the Sydney Mobile .Net Developers Group.
Internet of Things, Mobility & .Net Micro Framework SydMobNet March 2014Alec Tucker
The Internet of Things, Mobility and the .Net Micro Framework, presented by Dave Glover of Microsoft at the Sydney Mobile .Net Developers meeting n March 2014
SydMobDev Feb 2014 - Cross Platform Native App Development with Xamarin and M...Alec Tucker
This document summarizes an inaugural meetup for the Sydney Mobile .Net Developers group. It introduces the group and focus on cross-platform mobile development using .Net and Xamarin. It outlines the planned format, current sponsors, and information on Xamarin University for building native iOS, Android, and Windows apps with C#. The document also summarizes different approaches to cross-platform development including code sharing and the MVVM pattern. It includes details on Android fragmentation and questions for discussion.
2. @matthewrdev | matthew.ch.robbins@gmail.com | 0431 197 349 | mfractor.com
Hi, I’m Matt
➔Making stuff with Xamarin since ‘13
➔Like hanging out on big cliffs
➔The mobile guy at
➔Passionate about improving our trades tooling!
◆ Ask me about MFractor later :)
3. @matthewrdev | matthew.ch.robbins@gmail.com | 0431 197 349 | mfractor.com
Background
➔Why is this important?
◆ Post Assange, Post Snowden
◆ Users expect security
◆ Users expect privacy
◆ It’s trendy!
4. @matthewrdev | matthew.ch.robbins@gmail.com | 0431 197 349 | mfractor.com
Security in Android M
➔Implements 3 mechanisms
◆ ‘usesClearTextTraffic’ within manifest
◆ NetworkSecurityPolicy
◆ StrictMode
➔These are only available in API 23 and higher
5. @matthewrdev | matthew.ch.robbins@gmail.com | 0431 197 349 | mfractor.com
UsesClearTextTraffic
➔Manifest option to flag support of clear text traffic
➔Exposed via NetworkSecurityPolicy
➔What it looks like:
6. @matthewrdev | matthew.ch.robbins@gmail.com | 0431 197 349 | mfractor.com
Network Security Policy
➔Singleton class containing apps traffic policy
➔Does not enforce policy!
◆ Merely exposes it.
➔Expects application components to adhere to it.
◆ But is opt-in!
13. @matthewrdev | matthew.ch.robbins@gmail.com | 0431 197 349 | mfractor.com
StrictMode
➔ Exposes ability to monitor for clear-text traffic
➔Detect and log:
➔Detect and crash:
14. @matthewrdev | matthew.ch.robbins@gmail.com | 0431 197 349 | mfractor.com
Detecting Insecure Traffic
➔ So, how do they do it?
◆ StrictMode.DetectClearText() registers firewall rule
● Within the apps user-space.
◆ Firewall watches for outgoing TLS packets
◆ Flags non-conforming packets
◆ Notifies app process of violation.
◆ Logs or crashes
17. @matthewrdev | matthew.ch.robbins@gmail.com | 0431 197 349 | mfractor.com
StrictMode - Limitations
➔Only detects TLS wrapped traffic.
➔Unknown behaviour for TCP or UDP connections.
◆ Gut feeling is they will cause a violation
➔Should only be used in debug builds.
19. @matthewrdev | matthew.ch.robbins@gmail.com | 0431 197 349 | mfractor.com
Implications
➔ For app developers:
◆ Be aware of new security policies.
● Don’t necessarily need to use it.
◆ Be aware of non-cleartext compliant libraries:
● Nugets
● Xamarin Components
● Etc etc etc
◆ If in doubt, turn on StrictMode
➔For component developers:
◆ Play nice and make libraries cleartext compliant:
20. @matthewrdev | matthew.ch.robbins@gmail.com | 0431 197 349 | mfractor.com
Summary
➔Cleartext traffic is under the microscope
◆ Google -> Network Security Policy
◆ Apple -> App Transport Security
➔Be aware of new policies
◆ Android N will only enforce them more
➔Try to comply with the policies
◆ Using compliant libraries like ModernHttpClient
◆ Checking the NetworkSecurityPolicy
➔Be aware 3rd party libraries may not conform