Transcript
Page 1: Android Hacking + Pentesting

Android Hacking + Pentest

EC Council Malaysia Instructure: Sina Manavi27 March 2014

Page 2: Android Hacking + Pentesting

About Me

My name is Sina Manavi , Master of Computer Security and Digital ForensicsC|EH & C|HFI Certificate holder Contact : [email protected]: sinamanavi.wordpress.com

Page 3: Android Hacking + Pentesting

Agenda:

• Android OS• Android Security Architectures• Malwares• Attacking Android Platform• Hacking with Android

Page 4: Android Hacking + Pentesting

What is Android ?

• Everywhere(TV, Phones, tablets)• Runs on Linux Kernel • Easy to Exploit + open source • Uses SQLite database • Huge Community base • Official market containing over

4,000,000 apps (Google Market)

Page 5: Android Hacking + Pentesting

Android History Version

Page 6: Android Hacking + Pentesting

Android OS

Page 7: Android Hacking + Pentesting

Android Security

• Linux based• Open source• Wide available for everyone • Everyone can develop apps and

malwares

Page 8: Android Hacking + Pentesting

How to have a safe Device

• Install apps from authorized market (Google Play)

• Read the review before downloading

• Read Permission warning before installing the apps.

• Phishing/SMS?• Lock Screen to avoid unauthorized

access

Page 9: Android Hacking + Pentesting

How to have a safe Device cont.

• Using Antivirus• Encrypt your device and data• While using public hotspots such as

Starbucks, use VPN to encrypt your network connection

• Enable Remote Wipe feature

Page 10: Android Hacking + Pentesting

Security layers of Android OS

Page 11: Android Hacking + Pentesting

Android App Installation

Page 12: Android Hacking + Pentesting

Android Permission

• ACESS_COARSE_LOCATION• ACESS_FINE_LOCATION• BRICK• CALL_PHONE• INTERNET• GET ACCOUNTS• PROCESS_OUTGOING_CALLS

Page 13: Android Hacking + Pentesting

Android Permission

• READ_OWNER_DATA• READ_SMS• RECEIVE_SMS• SEND_SMS• USER_CREDNTIALS• WRITE_OWNER_DATA• REORD_AUDIO

Page 14: Android Hacking + Pentesting

Android Vulnerability or User?

Page 15: Android Hacking + Pentesting

Malware

• Anything that breaks the security model (without the users consent)

• Deceptive/hide true intent • bad for user / good for attacker e.g.

surveillance, collecting passwords, etc. • Applications that are detrimental to

the user running the device.

Page 16: Android Hacking + Pentesting

Malware

Harms a user • Financial • Privacy • Personal information – location

(surveillance) , • Stealing resources – cracking,

botnets – processing power Breaks Network policy

Page 17: Android Hacking + Pentesting

Malware Example

• GEO Location ? • IP Address / 3G/4G or on WiFi

network? • Scan for available blue-tooth devices • Egress filtering? ports open, etc.• SMS Receiving, Sending, Fobricating.

Page 18: Android Hacking + Pentesting

Malware Sample Code (Java)

Page 19: Android Hacking + Pentesting

Popular Malware

• Zeus• DroidDream• Geinmi- Android malware with

botnet-like capabilities• Trojan-SMS for Android FakePlayer• iCalendar

acbcad45094de7e877b65db1c28ada2

• SMS_Replicator_Secret.apk

Page 20: Android Hacking + Pentesting

Demo

Hacking Android Phone:– Information stealing– Remote Access – Social Engineering – Malware attack

Hacking with Andorid :– Installing Dsploit for running attack with android

(MITM, XSS, traffic sniffing….etc)– Installing kali linux on android to perform attack


Recommended