20
Android Hacking + Pentest EC Council Malaysia Instructure: Sina Manavi 27 March 2014

Android Hacking + Pentesting

Embed Size (px)

DESCRIPTION

Basic Android OS security mechanism, Basic malware definition Attacking Android platform with Malware, Remote access, File is stealing and Social Engeering attack is methods have been done discussing in the class. Attacking the Android: Installing Kali Linux on android to perform attacks Installing Dsploit for running attack with android (MITM, XSS, traffic sniffing…. Etc.)

Citation preview

Page 1: Android Hacking + Pentesting

Android Hacking + Pentest

EC Council Malaysia Instructure: Sina Manavi27 March 2014

Page 2: Android Hacking + Pentesting

About Me

My name is Sina Manavi , Master of Computer Security and Digital ForensicsC|EH & C|HFI Certificate holder Contact : [email protected]: sinamanavi.wordpress.com

Page 3: Android Hacking + Pentesting

Agenda:

• Android OS• Android Security Architectures• Malwares• Attacking Android Platform• Hacking with Android

Page 4: Android Hacking + Pentesting

What is Android ?

• Everywhere(TV, Phones, tablets)• Runs on Linux Kernel • Easy to Exploit + open source • Uses SQLite database • Huge Community base • Official market containing over

4,000,000 apps (Google Market)

Page 5: Android Hacking + Pentesting

Android History Version

Page 6: Android Hacking + Pentesting

Android OS

Page 7: Android Hacking + Pentesting

Android Security

• Linux based• Open source• Wide available for everyone • Everyone can develop apps and

malwares

Page 8: Android Hacking + Pentesting

How to have a safe Device

• Install apps from authorized market (Google Play)

• Read the review before downloading

• Read Permission warning before installing the apps.

• Phishing/SMS?• Lock Screen to avoid unauthorized

access

Page 9: Android Hacking + Pentesting

How to have a safe Device cont.

• Using Antivirus• Encrypt your device and data• While using public hotspots such as

Starbucks, use VPN to encrypt your network connection

• Enable Remote Wipe feature

Page 10: Android Hacking + Pentesting

Security layers of Android OS

Page 11: Android Hacking + Pentesting

Android App Installation

Page 12: Android Hacking + Pentesting

Android Permission

• ACESS_COARSE_LOCATION• ACESS_FINE_LOCATION• BRICK• CALL_PHONE• INTERNET• GET ACCOUNTS• PROCESS_OUTGOING_CALLS

Page 13: Android Hacking + Pentesting

Android Permission

• READ_OWNER_DATA• READ_SMS• RECEIVE_SMS• SEND_SMS• USER_CREDNTIALS• WRITE_OWNER_DATA• REORD_AUDIO

Page 14: Android Hacking + Pentesting

Android Vulnerability or User?

Page 15: Android Hacking + Pentesting

Malware

• Anything that breaks the security model (without the users consent)

• Deceptive/hide true intent • bad for user / good for attacker e.g.

surveillance, collecting passwords, etc. • Applications that are detrimental to

the user running the device.

Page 16: Android Hacking + Pentesting

Malware

Harms a user • Financial • Privacy • Personal information – location

(surveillance) , • Stealing resources – cracking,

botnets – processing power Breaks Network policy

Page 17: Android Hacking + Pentesting

Malware Example

• GEO Location ? • IP Address / 3G/4G or on WiFi

network? • Scan for available blue-tooth devices • Egress filtering? ports open, etc.• SMS Receiving, Sending, Fobricating.

Page 18: Android Hacking + Pentesting

Malware Sample Code (Java)

Page 19: Android Hacking + Pentesting

Popular Malware

• Zeus• DroidDream• Geinmi- Android malware with

botnet-like capabilities• Trojan-SMS for Android FakePlayer• iCalendar

acbcad45094de7e877b65db1c28ada2

• SMS_Replicator_Secret.apk

Page 20: Android Hacking + Pentesting

Demo

Hacking Android Phone:– Information stealing– Remote Access – Social Engineering – Malware attack

Hacking with Andorid :– Installing Dsploit for running attack with android

(MITM, XSS, traffic sniffing….etc)– Installing kali linux on android to perform attack