Deep Dive Android 2015

c0c0n 2015

19 August 2015

Deep Dive Android 2015

OBJECTIVE

Android is the leading Operating system. It is used not just in Smartphones / Tablet but also is used as base for interactive Television, gaming console and lot more systems. The obvious resultant is that there is a large focus towards developing applications for this platform and to maintain its security. This workshop aims to equip information security professionals with knowledge about Android Operating system and how to ensure that the application are followin best security practices.

Students of this course will learn how to operate and make the best of the Android Tamer Virtual machine environment specifically designed for android penetration testing, from its creator. After taking this course you will be in a position to comfortably assess Android mobile application. You will be able to identify potential security issues as well as suggest possible remediations for issues such as Insecure Data Storage, Insufficient Transport Layer Protection, Unintended Data Leakage, Poor Authorization and Authentication, Broken Cryptography, Client Side Injection, Security Decisions Via Untrusted Inputs, Improper Session Handling, Lack of Binary Protections and more.

COURSE CONTENT

  1. Understand Android
    • Operating System Overview
    • File system Overview
    • Security Model
  2. Understand Android Application
    • Application Components
    • Application Structure
    • The SDK and Android Tools
    • Developing a basic application
  3. Penentration Testing Setup and methodology
    • Introduction to Android Tamer
    • Setting up the environment
    • Penetation testing approach
    • Reverse Engineering basics
    • Rooting basics
    • Manual Pentesting
    • Automated Pentesting via Drozer
    • Dynamic Instrumentation via Xposed Framework
  4. Being secure
    • Writing Secure Code
    • Writing Python Scripts for automating android pentests
    • Checklist for android applications

PRE-REQUISITE

Basic familiarity of Linux usage
Python scripting knowledge is a plus, but not extremely required

PARTICIPANTS REQUIREMENTS/WHAT TO BRING

Windows 7/8 , Ubuntu 12.x +, Macbook (2011 or above model)
Administrative access on your laptop with external USB allowed
Laptop Processor should support Virtualization
Atleast 20+ GB free hard disk space
4 GB or more RAM
Genymotion installed (Downloadable from https://genymotion.com)

DURATION

1 day

WHAT TO EXPECT

Getting started with Android Security
Reversing and Auditing of Android applications
Finding vulnerabilities and exploiting them
Hands-on with different Android components from security perspective

WHAT NOT TO EXPECT

To be an Android Hacking Expert/Ninja in a matter of 1 Day. Even though this training would take you to a considerably high level in Android Security/Exploitation, and impart you with all the necessary skills needed, you need to work on your own and use the skills learnt in the training class to continue your Android Security explorations.

WHO SHOULD ATTEND

Security Professionals
Web Application Pentesters
Application Developers
People interested to start into Android security

Ref: https://is-ra.org/c0c0n/2015/workshops#Anant_Shrivastava

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This comprehensive one-day workshop at c0c0n 2015 provides an end-to-end deep dive into Android security, covering the Android operating system architecture, application development fundamentals, penetration testing setup and methodology, the complete OWASP Mobile Top 10, hands-on exploitation techniques, automated testing with Drozer, dynamic instrumentation via Xposed Framework, and secure coding practices. Using Android Tamer as the primary testing environment, the workshop progresses from foundational knowledge to advanced exploitation techniques.

Key Topics Covered

Actionable Takeaways

  1. Set up Android Tamer as a comprehensive testing environment for Android security assessments — it provides the most extensive collection of tools in a single VM with apt-get updateability.
  2. Follow a systematic pentesting approach: analyze data at rest, intercept data in transit, identify entry points through intents and broadcasts, and test for logic flaws.
  3. Master the reverse engineering toolchain (apktool → dex2jar → JD-GUI) as Android’s Java-based nature makes partial whitebox testing possible even in blackbox engagements.
  4. Use Drozer for automated attack surface analysis and content provider exploitation, and complement it with Xposed Framework modules for dynamic instrumentation and SSL pinning bypass.
  5. Always run automated scans (Drozer, static analyzers) and act on results before publishing applications — treat this as a minimum security gate in the release process.
  6. Test applications across multiple Android versions and device configurations, as security behaviors and vulnerability exposure can vary significantly across the fragmented Android ecosystem.

Social chatter