Smartphone Insecurity

51
Click to edit the outline text format Second Outline Level Third Outline Level Click to edit the outline text format Second Outline Level Third Outline Level Smartphone Insecurity Georgia Weidman

Transcript of Smartphone Insecurity

Page 1: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Smartphone Insecurity

• Georgia Weidman

Page 2: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Agenda

Smartphone Security Basics

Common Attack Vectors and Examples

Mitigation Strategies

Common vulnerabilities in 3rd party apps

Attack strategies against apps

Secure coding practices for developing apps

Page 3: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

What is a smartphone?

Page 4: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

What is a smartphone?

Page 5: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

What’s on your phone

Personal info

Work info

Location info

Account info

Page 6: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Do We Need Privacy? (SMS examples)

“Hi meet me for lunch”

“Meet me for lunch while my wife is out”

“Here is your bank account credentials”

Page 7: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Attacks on Privacy (Infrastructure)

Cell Network

Page 8: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Attacks on Privacy (Infrastructure)

Cell Network

Encryption??

Page 9: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Is GSM traffic encrypted?

SMSPDU:07914140540510F1040B915117344588F100000121037140044A0AE8329BFD4697D9EC37

Page 10: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Is GSM traffic encrypted?

SMSPDU:07914140540510F1040B915117344588F100000121037140044A0AE8329BFD4697D9EC37

Page 11: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Is GSM traffic encrypted?

Sending Number: 1-571-435-4881 Data: hellohello

Page 12: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

2G(EDGE)

Bad crypto:

Up to the base station

Algorithms breakable

No authentication of base stations

Page 13: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Attacks on Privacy (Infrastructure)

Cell Network

Research by: Chris Pagent

Page 14: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Attacks on Privacy (Infrastructure)

Cell Network

Research by: Chris Pagent

Page 15: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Breaking 2G Crypto

Break session key to get on the network

A5/2 trivial to break

Karsten Nohl broke A5/1 in 2009 in minutes

Page 16: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Attacks on Privacy (Infrastructure)

Cell Network

Research by: Chris Pagent

Page 17: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Who cares about EDGE anyway?

Still deployed

By default phones will drop back to EDGE

Is anyone on EDGE right now?

Page 18: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Mitigation Strategies

Replace 2G

Option to turn off 2G on phones

Encrypt data on phones before sending

Page 19: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Attacks on Privacy (Platform)

=Attackers know how to attack these platforms

Page 20: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Rooting/Jailbreaking

Exploiting kernel/platform flaws

Client side attacks

Gain system level privileges similarly to PC platforms

Page 21: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

JailbreakMe 3.0

iPhone jailbreak

Client side flaw in PDF (Mobile Safari)

Kernel exploit

Research by Comex

Page 22: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Rootstrap

Android app loads kernel exploits

Loads code dynamically

Runs native code

Packaged with interesting app

Research by: Jon Oberheide

Page 23: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

DroidDream

Android app in the market

Rooted phones via kernel exploits

Stole information

Ran up charges

In the Wild

Page 24: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Payload example: SMS botnet

Page 25: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Payload example: SMS botnet

Page 26: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Payload example: SMS botnet

Page 27: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Payload example: SMS botnet

Page 28: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

SMS PDU

SMSPDU:07914140540510F1040B915117344588F100000121037140044A0AE8329BFD4697D9EC37

Page 29: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

How the Botnet Works

1. Bot Receives a Message

1. Bot Decodes User Data

1. Checks for Bot Key

1. Performs Functionality

Page 30: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

How the Botnet Works

1. Bot Receives a Message

1. Bot Decodes User Data

1. Checks for Bot Key

1. Performs Functionality

Page 31: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

How the Botnet Works

1. Bot Receives a Message

1. Bot Decodes User Data

1. Checks for Bot Key

1. Performs Functionality

Page 32: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

How the Botnet Works

1. Bot Receives a Message

1. Bot Decodes User Data

1. Checks for Bot Key (Swallows Message)

1. Performs Functionality

Page 33: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

How the Botnet Works

1. Bot Receives a Message

1. Bot Decodes User Data

1. Checks for Bot Key

1. Performs Functionality

Page 34: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Demo

Demo of Botnet Payload

Page 35: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Mitigations for Platform Attacks

Updating

Better sandboxing

Vigilance from users

Page 36: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

App attacks on privacy

Page 37: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

App Stores

iPhone

Expensive

Closed

Identity verified

Android

Cheap

Self Signed

Open

Anonymous

Page 38: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Android Permission Model

Specifically request permissions

Users must accept at install

Send SMS, Receive SMS, GPS location

Page 39: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

App attacks on privacy

Is this system working? Are users making good decisions about apps?

Page 40: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Top Android App of All Time

Page 41: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Demo

Demo: App Abusing Permissions

Page 42: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

App Attacks Mitigations

Oversight on apps

Analysis of permissions

User awareness

Page 43: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Vulnerabilities in Android Apps

No coding standards for Android apps

Badly coded apps

Data Leak

Permission Leak

Page 44: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Data Leak

Access to sensitive data

Insecure storage

sdcard

World readable

Stored in source code

Page 45: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Return to the Source

Free tools available

Complete source available

Don’t store secrets here

Page 46: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Demo

DEMO: Abusing bad storage practices

Page 47: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Mitigating this risk

Store sensitive data privately

Don’t use the sdcard

Don’t put secrets in source code

Page 48: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Permission leak through components

Other apps can call public components

That’s a reason Android is awesome

If not used safely, this can be dangerous

Page 49: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Demo

DEMO: Stealing permissions from exposed components

Page 50: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Mitigating This Risk

Require permissions to access components

Use custom permissions

Don’t have dangerous functionality accessible without user interaction

Page 51: Smartphone Insecurity

Click to edit the outline text format

Second Outline Level

Third Outline Level Fourth Outline

Level Fifth Outline

Level Sixth

Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelPresenter Title

Click to edit the outline text format

Second Outline Level

Third Outline Level

Fourth Outline Level

Fifth Outline Level

Sixth Outline Level

Seventh Outline Level

Eighth Outline Level

Ninth Outline LevelDate

Contact

Georgia Weidman

Security Consultant, Researcher, Trainer

Website: http://www.georgiaweidman.com

Slides: http://www.slideshare.net/georgiaweidman

Email:[email protected]

Twitter: @georgiaweidman