drozer - an android application security tool

11
n|u MUMBAI September,17,2016 Drozer - An Android Application Security Tool

Upload: nullowaspmumbai

Post on 12-Apr-2017

113 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Drozer - An Android Application Security Tool

n|u MUMBAI September,17,2016 Drozer - An Android Application Security Tool

Page 2: Drozer - An Android Application Security Tool

@c3p70r

#WHOAMI

▪ Vivek Mahajan @c3p70r▪ InfoSec Enthusiast & Learner▪ Senior Information Security Analyst @niiconsulting

Page 3: Drozer - An Android Application Security Tool

@c3p70r

#Agenda

▪ Drozer Basics▪ Leaking Content Providers▪ Attacking Broadcast Receivers▪ Abusing Android application permissions▪ Breaking and Building Drozer as per need of pentest

Page 4: Drozer - An Android Application Security Tool

@c3p70r

Before We Dig Drozer

▪ Android Applications are made up of:– Activities– Services – Content Providers– Broadcast Receivers– Intents*

Page 5: Drozer - An Android Application Security Tool

@c3p70r

Drozer Basics

▪ Framework for Android application assessment written by MWR InfoSecurity

▪ Written on iPython▪ Extensive list of inbuilt modules such as leaking content

provider, scanning, application permission-list, broadcast receivers etc.

▪ Drozer works on client-server architecture.▪ Setting up a Drozer Environment▪ Basics usage and handy commands (Sieve Demo)

Page 6: Drozer - An Android Application Security Tool

@c3p70r

Leaking Content Providers

▪ Vulnerable application used – Catch ▪ Task:– Reverse the application using apktool– Find out the Content providers – Query the content provide– Vulnerability Discovered by Aditya Gupta (@adi)https://www.youtube.com/watch?v=knNQe27blVc

Page 7: Drozer - An Android Application Security Tool

@c3p70r

Attacking Broadcast Receivers

▪ Vulnerable application used – Fourgoats.▪ Task: – Reverse the application using apktool– Find the broadcast receiver code– Figure out the broadcast receiver inputs.– Exploit the vulnerable broadcast receiver using Drozer

Page 8: Drozer - An Android Application Security Tool

@c3p70r

Abusing Android Application Permissions

▪ Vulnerable application used: Adobe Reader▪ Vulnerable to leaking content provider▪ Path traversal vulnerability▪ Attacker can exploit Adobe Reader’s permissions to

read any arbitrary file from SDCARD.▪ Discovered by Sebastian Guerro

(http://blog.seguesec.com/2012/09/path-traversal-vulnerability-on-adobe-readerandroid-application/)

Page 9: Drozer - An Android Application Security Tool

@c3p70r

Drozer-KungFu

▪ Vulnerable application used: CSIP_Simple▪ Not directly vulnerable.▪ Custom permissions are there to protect the application

(but lack in protection)▪ Vulnerability discovered by Joshua J. Drake (@jduck)▪ Reference AHH (Android hackers handbook)

Page 10: Drozer - An Android Application Security Tool

@c3p70r

Demo Time

Page 11: Drozer - An Android Application Security Tool

@c3p70r

<--Question--->