Who am I
- Next Generation problem Solver
- Researcher & Reader in free time
-
Speaker at Null & OWASP Community
- Facilitator at Weekend Testing
- Bug bounty Hunter (eX .Crowd Tester)
- Reported Security Vulnerabilities for 50+ unique customers all over the world including Apple, yahoo, Outlook, adobe & etc.
- Love to develop nasty code & Hack it :)
-
Works as Security Researcher at Accenture Digital Mobility
- Certified Ethical Hacker AKA. Bug Wrangler
Disclaimer
-
This Presentation is intended for educational purposes only
and I cannot be held liable for any kind of damages done whatsoever to your
machine, or other damages.
- Please - Don't try this attack on any others system without having context knowledge or permission, this may harm to someone directly or indirectly.
- Feel free to use this presentation for practice or education
purpose.
- It's no way related to my employer - its my own research and ideas.
^ I hope - You gotcha ^
Humla
Means 'attack' in Hindi
Social Media feed
Hashtag for this session
#NullHumla, #MobileSecurity
: Twitter handle for feedback :
@null0x00 @Abhinav_Sejpal
~ We aren't going to do this ~
So, feel free to stop when you have a doubt!
Are you Ready to Rock ???
The Mobile market is fragmented, stakeholders want their better cheaper faster mobile app - Correct?
What is if it's has Vulnerable code? WOW :D
Development Plan
Android Architecture
Our Arsenal
Prerequisites Checks
- Genymotion Emulator
- Appie / Android Tamer
- Copy of Shared APK
Drozer Framework
Introduction
- Drozer Server
- Drozer Agent
Self-Practice Session
Challenge 1 – By Pass authorization for the whisper
Challenge 2 - By pass Authorization for the Lock
Can we replicate this issue for the LinkedIn / Hike App ?
Linkedin Insecure data stroage
Demo on Missing Root Detection
Demo on Reverse the APK
Fix : Use the Dex Guard not pro guard for Java
Demo on rebuild the APK
Demo on weak Binary
Security is not taken seriously
So your IP is at risk !!
~ Game done ~