Early bird registration rate ends on the 30th of September
Every day we see a bunch of new mobile applications being published on the Store, from games, to utilities, to IoT devices clients and so forth, almost every single aspect of our life can be somehow controlled with “an app” like taking a cab ride, buying groceries. We have smart houses, smart fitness devices and smart coffee machines … but is it just smart or is it secure as well? 🙂
The Mobile-Sec Exploitation Breakout training will enable attendees to master various android & iOS application penetration testing techniques and exploitation methods.
The training focuses on practical hands-on exercises on several dedicated vulnerable apps, with the basic theory explained prior to the Do-It- Yourself mind-bending exercises, enabling the attendee to test his acquired skills during the training.
This two day fast paced tightly action packed brain-melting revamped custom tailored flag-ship workshop program will include subjects covered from setting up Android & iOS pentest environment, Identifying and exploiting application vulnerabilities in a variety of mobile application architectures, changes in Android & iOS security features, and complementary subjects viz. Hybrid Mobile Application Pentest.
Students could be familiar with below topics but not mandatory
• Common security concepts or common web security issues
• Basic knowledge of the Linux OS and network security basics
To become Mobile Ninja overnight.
Although this training would considerably lead to a next level in Mobile Security, people willing to learn new things and research further is expected to continue exploration in Mobile Security.
Custom Android Tamer VM modified image containing all new off the shelf tools, runtime, target apps, scripts, fuzzing payloads etc.
Vulnerable apps for iOS & android, tools etc Customized Mobile Security Testing Checklist Access to Continuous Learning Environment
Basic – Intermediate
Module 1: Android Rudiments
Introduction to Android Security
Android Permission Model and Security Architecture File System Overview
Dalvik vs ART runtimes
Android security features
Module 2: Lab setup and in-depth analysis
Lab Environment setup for android pentest
Setting up android emulator
Android Debug Bridge (ADB) basics
Module 3: Rooted vs non rooted
Common exploits for rooting
Types of mobile apps (Web based, Native, Hybrid)
Module 4: Reverse Engineering of Android Application binaries: (static analysis)
Indepth into APK file format Unpacking APKs
The APK file package
Application Components Activity
Intents
Services
Decoding XML/Resource Files
APK extraction – Investigating layout, android manifest, permissions Parsing Dex files
Extracting the content of the classes.dex file
Reverse engineering obfuscated android apps & native libraries Decompilation to java & smali code
Using smali for in-depth analysis
Finding hard coded secrets like geolocation, passwords in code Detecting red flags in Android Manifest file 101.
In-Depth with Smali Analysis
Modifying Android applications to reveal sensitive info
Module 5 : Insecure data storage
Exploring installed application files at the /data/data directory The file system security model
Insecure file system permissions
Insecure storage of sensitive data in files
Searching Inside the SDcard
SQLite Database storage & data dumping Sensitive data in application shared preferences Storage of sensitive data at the server side Hard coded Secrets in source code
Sensitive data leakage via insecure log exposure Identifying vulnerable Broadcast Receivers Attacking & exploiting Broadcast Receivers Identifying and exploiting vulnerable Intents Attacking & exploiting intents
Identifying and exploiting vulnerable Activity Components Attacking & exploiting Activity Components
Identifying and exploiting vulnerable content providers Attacking & exploiting content providers
Identifying and exploiting vulnerable services Attacking & exploiting vulnerable services Detecting developer backdoors
Module 6: Data interception and manipulation (dynamic analysis) Active+Passive
Importing SSL certificates & trusted CA’s
Intercepting proxy chaining– Zed Attack Proxy and Burp Insecure session management
Authorization
Data Interception for SSL applications
Transmission of sensitive information
Exposing insecure traffic
SSL Pinning Bypass & advanced techniques
Module 7 : Analyzing Runtime Analysis
Attacking android Apps from Inside
Memory dumping and analysis
Analysing logs by parsing logcat and ddms Android Hacking 101
Module 8: Exploiting Logic and Code flaws in applications
Local File Inclusion/Path Traversal flaws SQL Injection in Android Application Labs
Module 9: Automated Assessment with Introspy / & Drozer /Mobile Security Framework, Xposed Framework /
Introduction to Drozer and configuration
Post-exploitation using drozer modules
Introduction to Mobile Security Framework (MobSF) and configuration
Automated security assessment using Mobile Security Framework (MobSF)
Hands-on MobSF Framework
Introduction to Xposed Framework & essential modules Hands-on Xposed Framework
Module 10: Android Malware Analysis & Forensics
Introduction to Android Malware Analysis
Android forensics
Extracting hidden strings, messages, logs, and sensitive information
Module 11: Analyze Hybrid HTML5 Applications
Introduction HTML5 Mobile apps
Common Vulnerabilities in HTML5 Android Applications
Module 12: Automatic Analysis for android code review
Tools for trade
Secure coding android guidelines
Defeating Code obfuscation – bypass techniques
Module 14: Pentesting android apps in non –rooted devices
Emulator/VM detection & Root detection 101 & corollary Approach & methodology
Tools of the trade
iOS:
Module 15: iOS Basics Primer – Background
Understanding iOS Architecture iOS Security Features
iOS Application Overview Objective-C vs Swift apps
Swift 4.1 – Wider Aspect
Module 16: iOS Security Model
Code Signing
Sandboxing
Encryption
iOS Simulator vs. Physical iDevice
Module 17: Jailbreaking
What is JailBreaking Cydia
Need for JailBreaking History
Types of JailBreaking Tethered vs Unthered –Semi Common Jailbreak exploits
Security Threats due to JailBreaking
Module 18: Setting up the Environment
Creating a Pentest Lab Environment
Tools of the trade to install
Setting up the iPhone / iPad / Simulator Setting up the Xcode
Module 19: iOS App Analysis – Passive / Static Analysis
IPA (iOS package application) file Architecture Installing apps using itunes
Application Installation Location
Changes in iOS 7/8/9/10
Reverse Engineering iOS Apps
Local Data Storage (SQLite) Plist Storage
Keychain Usage NSUserDefaults Storage
Module 20: Dynamic Analysis/ Data Protection (Transit)
Passive sniffing traffic – inspecting Network traffic
Active sniffing traffic- Proxying traffic interception over HTTP/HTTPS in Simulator and iDevice
Server Communication Public Key Pinning
SSL Pinning
Bypassing SSL Pinning
Module 21: Authentication
Remote Authentication
Module 22: Side Channel Data Leaks
Device Logs Cut-and-Paste Backgrounding Keystroke Logging
Module 23: Injection Flaws
Module 24: Runtime Manipulation
Module 25: Automatic Analysis for Code review
SQL Injection Cross Site Scripting
Tools of the trade
Secure coding guidelines for iOS application iMas
iOS Malwares & forensics
Introduction to iOS malwares & forensics
Module 26: Pentesting using non-jailbreak approach
Jailbreak/piracy detection techniques Common challenges
Tools of trade
Approach & methodology
CTF Time:
Vulnerable application would be given to audit and report findings