SlideShare a Scribd company logo
1 of 91
Download to read offline
*[ AUDITING MOBILE APPLICATIONS ]




Author: Jose Selvi
Date: 30/Jun/2011
$ WHOIS JSELVI



                 Jose Selvi
         http://twitter.com/JoseSelvi

   jselvi@s21sec.com     jselvi@pentester.es
http://www.s21sec.com http://www.pentester.es
INDEX

        Apps Revolution

        Divide & Conquer (D&C)

        Mobile Networking

        Server Side

        Client Side

        What’s Up with WhatsApp
APPS REVOLUTION




                  Pág. 5
“OLD SCHOOL” APPS
“OLD SCHOOL” APPS
WEBSITE FEVER
WEBSITE FEVER
WEBSITE FEVER
MOBILE FEVER
MOBILE FEVER
MOBILE FEVER
MOBILE FEVER
MOBILE FEVER
APPLICATIONS EVOLUTION 2010
DIVIDE & CONQUER (D&C)

AND MORE




                         Pág. 5
MOBILE LAB
MOBILE LAB




     CLIENT
MOBILE LAB




              SERVER


     CLIENT
MOBILE LAB




              SERVER


     CLIENT
MOBILE LAB

                           NETWORK
          CLIENT                          SERVER




  Phone full control   Some ways        We CAN’T change
                                        the server
  SW full control      We’re able to
                       control the      We CAN’T have a
                       network          look to the
  We’re able to
                                        software
  change config and
  software             Sometimes hard
                       and expensive    Black Box Testing
JAILBREAK / ROOTING

 Sometimes emulator r00lz!
 • Android Emulator (SDK)
 • iOS Simulator (SDK)

 But sometimes not...

 We don’t have full built-in control
 Maybe we should...
 • iOS Jailbreak
 • Android Rooting
MOBILE NETWORKING




                    Pág. 5
MULTI-CHANNEL!
MOBILE LAB
MAN-IN-THE-MIDDLE

  msf auxiliary(fakedns) >
     [*] DNS bypass domain api.facebook.com resolved 66.220.146.36
     [*] DNS bypass domain iphone.facebook.com resolved 66.220.153.30
     [*] DNS bypass domain m.facebook.com resolved 66.220.158.26
“FAKE” DNS




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                       20.20.20.20   DNS SERVER
“FAKE” DNS




                 ¿whois www.google.com?


 IP: 20.20.20.10                                        10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                                          20.20.20.20   DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                                10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20



                       ¿whois www.google.com?




                        20.20.20.20             DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                           10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20



                                     ¿whois www.google.com?




                       20.20.20.20        DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                               10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20



                                     www.google.com = 74.125.39.104




                       20.20.20.20            DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                                        10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20



                       www.google.com = 74.125.39.104




                         20.20.20.20                    DNS SERVER
“FAKE” DNS




                 www.google.com = 74.125.39.104


 IP: 20.20.20.10                                         10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                                           20.20.20.20   DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                       20.20.20.20   DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                       20.20.20.20   DNS SERVER
“FAKE” DNS




                 ¿whois api.facebook.com?


 IP: 20.20.20.10                                          10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                                            20.20.20.20   DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                                  10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20



                       ¿whois api.facebook.com?




                        20.20.20.20               DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                                        10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20



                       api.facebook.com = 20.20.20.20




                       20.20.20.20                      DNS SERVER
“FAKE” DNS




                 api.facebook.com = 20.20.20.20


 IP: 20.20.20.10                                           10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                                             20.20.20.20   DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20




                       20.20.20.20   DNS SERVER
“FAKE” DNS




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0
 GW: 20.20.20.1
 DNS: 20.20.20.20


                       PROXY



                       20.20.20.20   DNS SERVER
REDIRECT TRICK




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0   20.20.20.20
 GW: 20.20.20.20
 DNS: 8.8.8.8




                       PROXY
REDIRECT TRICK




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0   20.20.20.20
 GW: 20.20.20.20
 DNS: 8.8.8.8




                       PROXY
REDIRECT TRICK




 IP: 20.20.20.10                     10.10.10.10
 MASK: 255.255.255.0   20.20.20.20
 GW: 20.20.20.20
 DNS: 8.8.8.8




                       PROXY
SSL/HTTPS




                       PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0           10.10.10.10
 GW: 20.20.20.20
 DNS: 8.8.8.8
SSL/HTTPS




                       PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0           CERT
                                 10.10.10.10
 GW: 20.20.20.20
 DNS: 8.8.8.8
PKI: Public Key Infraestructure



                                     SERVER

                                      PUB    PRIV

              CA
        PUB        PRIV




                                  CLIENT
                                   PUB
                                    PUB
                                     PUB
                                       PUB
                                       CA1
PKI: Public Key Infraestructure


                                     SERVER
       CA
 PUB             PRIV                PUB   PRIV
                         INFO CERT




 CLIENT
       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                     SERVER
       CA
 PUB             PRIV                    PRIV
                         INFO CERT




                           PUB


 CLIENT
       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                     SERVER
       CA
 PUB             PRIV                    PRIV
                         INFO CERT




                           PUB


 CLIENT
       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                     SERVER
       CA
 PUB             PRIV                    PRIV
                         INFO CERT




                           PUB


 CLIENT                  DIGEST


       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                        SERVER
       CA
 PUB             PRIV                       PRIV

                   DIGEST   INFO CERT




                              PUB


 CLIENT                     DIGEST


       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                         SERVER
       CA
 PUB          PRIV                           PRIV
             SIGNED DIGEST   INFO CERT




                               PUB


 CLIENT                      DIGEST


       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                        SERVER
       CA
 PUB             PRIV                       PRIV
                          INFO CERT




                             PUB


 CLIENT                    DIGEST

                        SIGNED DIGEST
       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                        SERVER
       CA
 PUB             PRIV                       PRIV
                          INFO CERT




                            PUB


 CLIENT                    DIGEST

                        SIGNED DIGEST
       PUB
        PUB
         PUB
           PUB
           CA1
PKI: Public Key Infraestructure


                                              SERVER
       CA
 PUB             PRIV                             PRIV
                                  INFO CERT




                                    PUB


 CLIENT
       PUB
        PUB
         PUB
           PUB          DIGEST
           CA1
                  SIGNED DIGEST
PKI: Public Key Infraestructure


                                              SERVER
       CA
 PUB             PRIV                             PRIV
                                  INFO CERT




                                    PUB


 CLIENT
       PUB
        PUB
         PUB
           PUB          DIGEST
           CA1
                        DIGEST’
PKI: Public Key Infraestructure


                                              SERVER
       CA
 PUB             PRIV                             PRIV
                                  INFO CERT




                                    PUB


 CLIENT
       PUB
        PUB
         PUB
           PUB          DIGEST
           CA1
                        DIGEST’
Real Certificate Sample
SSL/HTTPS




                       PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0           10.10.10.10
 GW: 20.20.20.20
 DNS: 8.8.8.8
SSL/HTTPS




                       PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0           CERT
                                 10.10.10.10
 GW: 20.20.20.20
 DNS: 8.8.8.8
SSL/HTTPS




                         PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0   FAKE
                                 CERT
                                   10.10.10.10
                       CERT
 GW: 20.20.20.20
 DNS: 8.8.8.8



                       FAKE
                        CA
SSL/HTTPS




                         PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0   FAKE
                                 CERT
                                   10.10.10.10
                       CERT
 GW: 20.20.20.20
 DNS: 8.8.8.8
SSL/HTTPS




                         PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0   FAKE
                                 CERT
                                   10.10.10.10
                       CERT
 GW: 20.20.20.20
 DNS: 8.8.8.8
SSL/HTTPS




                         PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0   FAKE
                                 CERT
                                   10.10.10.10
                       CERT
 GW: 20.20.20.20
 DNS: 8.8.8.8
SSL/HTTPS




                         PROXY
 IP: 20.20.20.10
 MASK: 255.255.255.0   FAKE
                                 CERT
                                   10.10.10.10
                       CERT
 GW: 20.20.20.20
 DNS: 8.8.8.8
IMPORT CERTIFICATES


iPhone / iPad
 • Export from proxy (Burp, ...) o built (openssl, ...).
 • iPhone Configuration Utility



Android
• Only VPN certs, not Web.
• Hard...
• Still Working...
BINGO!
SERVER SIDE




              Pág. 5
AS USUAL...

 Browser
 Nessus
 Qualys
 SQLMap
 Metasploit
 Backtrack
 ...

 Of course, your brain!
CLIENT SIDE




              Pág. 5
iOS BINARY FORMAT
iOS BINARY FORMAT
iOS BINARY FORMAT
iOS BINARY FORMAT
iOS BINARY FORMAT
ANDROID BINARY FORMAT
ANDROID BINARY FORMAT




App.java
ANDROID BINARY FORMAT




App.java   App.class
ANDROID BINARY FORMAT




App.java   App.class    App.dex
ANDROID BINARY FORMAT




App.java   App.class    App.dex
ANDROID BINARY FORMAT




App.java   App.class    App.dex
PUT ALL TOGETHER!
Man-in-the-

     CRACKING VERIFYCERT
certificados como válidos), algo que evidentemente no podrá hacer un atacante que no
tuviera previo control de la máquina pero que nos situa en la posición de un intruso que
haya comprometido previamente el NOC de Good. En esta ocasión, dado que no se ha
conseguido vulnerar los certificados SSL, NO bastaría con el compromiso de algunos de
los routers internmedios, como SI ocurría en el caso anterior.




                                                                              www.s21sec.c
WHAT’S UP WITH WHATSAPP?




                       Pág. 5
WHAT’S UP WITH WHATSAPP?




                       Pág. 5
KNOWN WHATSAPP ISSUES

 Unencrypted Traffic
 • But using 443 tcp port...

 Storing ALL conversation FOREVER

 Storing GPS position!
 • WTF!!
 • Why??!!

 Much more...



 Great research from SecurityByDefault guys!
WHATSAPP HIJACKING
ALERT! SPAM!




               SEC-560:
       Network Penetration Testing
          and Ethical Hacking
THANKS! QUESTIONS?



                Jose Selvi
        http://twitter.com/JoseSelvi

   jselvi@s21sec.com     jselvi@pentester.es
http://www.s21sec.com http://www.pentester.es
*[ THANKS! SEE YOU! ]




            Pág. 7

More Related Content

Similar to Auditing Mobile Applications

From One to Many: Diving Deeper into Evolving VPC Design (ARC310-R2) - AWS re...
From One to Many: Diving Deeper into Evolving VPC Design (ARC310-R2) - AWS re...From One to Many: Diving Deeper into Evolving VPC Design (ARC310-R2) - AWS re...
From One to Many: Diving Deeper into Evolving VPC Design (ARC310-R2) - AWS re...Amazon Web Services
 
(GAM304) How Riot Games re:Invented Their AWS Model | AWS re:Invent 2014
(GAM304) How Riot Games re:Invented Their AWS Model | AWS re:Invent 2014(GAM304) How Riot Games re:Invented Their AWS Model | AWS re:Invent 2014
(GAM304) How Riot Games re:Invented Their AWS Model | AWS re:Invent 2014Amazon Web Services
 
Cloud Native: Designing Change-tolerant Software
Cloud Native: Designing Change-tolerant SoftwareCloud Native: Designing Change-tolerant Software
Cloud Native: Designing Change-tolerant Softwarecornelia davis
 
Stranger Things: The Forces that Disrupt Netflix
Stranger Things: The Forces that Disrupt NetflixStranger Things: The Forces that Disrupt Netflix
Stranger Things: The Forces that Disrupt NetflixC4Media
 
Functional legacy - how to incorporate ZIO in your legacy services
Functional legacy - how to incorporate ZIO in your legacy servicesFunctional legacy - how to incorporate ZIO in your legacy services
Functional legacy - how to incorporate ZIO in your legacy servicesNatan Silnitsky
 
Networking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey FedorovNetworking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey FedorovSergey Fedorov
 
Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)Andreas Taudte
 
Kubernetes Networking
Kubernetes NetworkingKubernetes Networking
Kubernetes NetworkingCJ Cullen
 
Networking in Kubernetes
Networking in KubernetesNetworking in Kubernetes
Networking in KubernetesMinhan Xia
 
Best practices for using VPNs for easy network-to-network protection
Best practices for using VPNs for easy network-to-network protectionBest practices for using VPNs for easy network-to-network protection
Best practices for using VPNs for easy network-to-network protectionWestermo Network Technologies
 
Consul Connect - EPAM SEC - 22nd september 2018
Consul Connect - EPAM SEC - 22nd september 2018Consul Connect - EPAM SEC - 22nd september 2018
Consul Connect - EPAM SEC - 22nd september 2018Peter Souter
 
Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...
Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...
Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...Daniel Oh
 
AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018
AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018
AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018Amazon Web Services Korea
 
(NET405) Build a Remote Access VPN Solution on AWS
(NET405) Build a Remote Access VPN Solution on AWS(NET405) Build a Remote Access VPN Solution on AWS
(NET405) Build a Remote Access VPN Solution on AWSAmazon Web Services
 
利用AWS建立企業全球化網路
利用AWS建立企業全球化網路利用AWS建立企業全球化網路
利用AWS建立企業全球化網路Amazon Web Services
 
Serverless Design Patterns (London Dev Community)
Serverless Design Patterns (London Dev Community)Serverless Design Patterns (London Dev Community)
Serverless Design Patterns (London Dev Community)Yan Cui
 
Best Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network AttackBest Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network AttackAmazon Web Services
 
AWS SSA Webinar 10 - Getting Started on AWS: Networking
AWS SSA Webinar 10 - Getting Started on AWS: NetworkingAWS SSA Webinar 10 - Getting Started on AWS: Networking
AWS SSA Webinar 10 - Getting Started on AWS: NetworkingCobus Bernard
 
Managing microservices with istio on OpenShift - Meetup
Managing microservices with istio on OpenShift - MeetupManaging microservices with istio on OpenShift - Meetup
Managing microservices with istio on OpenShift - MeetupJosé Román Martín Gil
 

Similar to Auditing Mobile Applications (20)

From One to Many: Diving Deeper into Evolving VPC Design (ARC310-R2) - AWS re...
From One to Many: Diving Deeper into Evolving VPC Design (ARC310-R2) - AWS re...From One to Many: Diving Deeper into Evolving VPC Design (ARC310-R2) - AWS re...
From One to Many: Diving Deeper into Evolving VPC Design (ARC310-R2) - AWS re...
 
(GAM304) How Riot Games re:Invented Their AWS Model | AWS re:Invent 2014
(GAM304) How Riot Games re:Invented Their AWS Model | AWS re:Invent 2014(GAM304) How Riot Games re:Invented Their AWS Model | AWS re:Invent 2014
(GAM304) How Riot Games re:Invented Their AWS Model | AWS re:Invent 2014
 
Cloud Native: Designing Change-tolerant Software
Cloud Native: Designing Change-tolerant SoftwareCloud Native: Designing Change-tolerant Software
Cloud Native: Designing Change-tolerant Software
 
Stranger Things: The Forces that Disrupt Netflix
Stranger Things: The Forces that Disrupt NetflixStranger Things: The Forces that Disrupt Netflix
Stranger Things: The Forces that Disrupt Netflix
 
Functional legacy - how to incorporate ZIO in your legacy services
Functional legacy - how to incorporate ZIO in your legacy servicesFunctional legacy - how to incorporate ZIO in your legacy services
Functional legacy - how to incorporate ZIO in your legacy services
 
Networking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey FedorovNetworking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
 
Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)
 
Kubernetes Networking
Kubernetes NetworkingKubernetes Networking
Kubernetes Networking
 
Networking in Kubernetes
Networking in KubernetesNetworking in Kubernetes
Networking in Kubernetes
 
Best practices for using VPNs for easy network-to-network protection
Best practices for using VPNs for easy network-to-network protectionBest practices for using VPNs for easy network-to-network protection
Best practices for using VPNs for easy network-to-network protection
 
Consul Connect - EPAM SEC - 22nd september 2018
Consul Connect - EPAM SEC - 22nd september 2018Consul Connect - EPAM SEC - 22nd september 2018
Consul Connect - EPAM SEC - 22nd september 2018
 
Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...
Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...
Microservice 4.0 Journey - From Spring NetFlix OSS to Istio Service Mesh and ...
 
VPC and DX PoP @ HKG
VPC and DX PoP @ HKGVPC and DX PoP @ HKG
VPC and DX PoP @ HKG
 
AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018
AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018
AWS Serverless 활용 네트워크 보안 아키텍처::함인용 실장, 이성현 매니저, 솔트웨어::AWS Summit Seoul 2018
 
(NET405) Build a Remote Access VPN Solution on AWS
(NET405) Build a Remote Access VPN Solution on AWS(NET405) Build a Remote Access VPN Solution on AWS
(NET405) Build a Remote Access VPN Solution on AWS
 
利用AWS建立企業全球化網路
利用AWS建立企業全球化網路利用AWS建立企業全球化網路
利用AWS建立企業全球化網路
 
Serverless Design Patterns (London Dev Community)
Serverless Design Patterns (London Dev Community)Serverless Design Patterns (London Dev Community)
Serverless Design Patterns (London Dev Community)
 
Best Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network AttackBest Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network Attack
 
AWS SSA Webinar 10 - Getting Started on AWS: Networking
AWS SSA Webinar 10 - Getting Started on AWS: NetworkingAWS SSA Webinar 10 - Getting Started on AWS: Networking
AWS SSA Webinar 10 - Getting Started on AWS: Networking
 
Managing microservices with istio on OpenShift - Meetup
Managing microservices with istio on OpenShift - MeetupManaging microservices with istio on OpenShift - Meetup
Managing microservices with istio on OpenShift - Meetup
 

More from Eventos Creativos

Pentesting con metasploit framework
Pentesting con metasploit frameworkPentesting con metasploit framework
Pentesting con metasploit frameworkEventos Creativos
 
Despliegue empresarial de smartphones mdm
Despliegue empresarial de smartphones   mdmDespliegue empresarial de smartphones   mdm
Despliegue empresarial de smartphones mdmEventos Creativos
 
Atacando iphone a través de wireless y javascript botnet
Atacando iphone a través de wireless y javascript botnetAtacando iphone a través de wireless y javascript botnet
Atacando iphone a través de wireless y javascript botnetEventos Creativos
 
Ataque a redes de datos IPv6 con Evil Foca
Ataque a redes de datos IPv6 con Evil FocaAtaque a redes de datos IPv6 con Evil Foca
Ataque a redes de datos IPv6 con Evil FocaEventos Creativos
 
Análisis forense de dispositivos android 03
Análisis forense de dispositivos android 03Análisis forense de dispositivos android 03
Análisis forense de dispositivos android 03Eventos Creativos
 
Análisis forense de dispositivos android 02
Análisis forense de dispositivos android 02Análisis forense de dispositivos android 02
Análisis forense de dispositivos android 02Eventos Creativos
 
Análisis forense de dispositivos android 01
Análisis forense de dispositivos android 01Análisis forense de dispositivos android 01
Análisis forense de dispositivos android 01Eventos Creativos
 
Análisis forense de dispositivos ios
Análisis forense de dispositivos iosAnálisis forense de dispositivos ios
Análisis forense de dispositivos iosEventos Creativos
 
Arquitectura, aplicaciones y seguridad en ios
Arquitectura, aplicaciones y seguridad en iosArquitectura, aplicaciones y seguridad en ios
Arquitectura, aplicaciones y seguridad en iosEventos Creativos
 
Jailbreak y rooting más allá de los límites del dispositivo
Jailbreak y rooting más allá de los límites del dispositivoJailbreak y rooting más allá de los límites del dispositivo
Jailbreak y rooting más allá de los límites del dispositivoEventos Creativos
 
I os en el entorno corporativo
I os en el entorno corporativoI os en el entorno corporativo
I os en el entorno corporativoEventos Creativos
 
Análisis forense de tarjetas sim, smartcards, etc
Análisis forense de tarjetas sim, smartcards, etcAnálisis forense de tarjetas sim, smartcards, etc
Análisis forense de tarjetas sim, smartcards, etcEventos Creativos
 
Firma digital y biométrica en dispositivos móviles
Firma digital y biométrica en dispositivos móvilesFirma digital y biométrica en dispositivos móviles
Firma digital y biométrica en dispositivos móvilesEventos Creativos
 
Fraude en tecnológias móviles
Fraude en tecnológias móvilesFraude en tecnológias móviles
Fraude en tecnológias móvilesEventos Creativos
 
Malware en dispositivos móviles
Malware en dispositivos móvilesMalware en dispositivos móviles
Malware en dispositivos móvilesEventos Creativos
 

More from Eventos Creativos (20)

Windows server 2012 para it
Windows server 2012 para itWindows server 2012 para it
Windows server 2012 para it
 
Pentesting con metasploit framework
Pentesting con metasploit frameworkPentesting con metasploit framework
Pentesting con metasploit framework
 
Malware en android
Malware en androidMalware en android
Malware en android
 
Despliegue empresarial de smartphones mdm
Despliegue empresarial de smartphones   mdmDespliegue empresarial de smartphones   mdm
Despliegue empresarial de smartphones mdm
 
Atacando iphone a través de wireless y javascript botnet
Atacando iphone a través de wireless y javascript botnetAtacando iphone a través de wireless y javascript botnet
Atacando iphone a través de wireless y javascript botnet
 
Ataque a redes de datos IPv6 con Evil Foca
Ataque a redes de datos IPv6 con Evil FocaAtaque a redes de datos IPv6 con Evil Foca
Ataque a redes de datos IPv6 con Evil Foca
 
Windows 8
Windows 8Windows 8
Windows 8
 
Análisis forense de dispositivos android 03
Análisis forense de dispositivos android 03Análisis forense de dispositivos android 03
Análisis forense de dispositivos android 03
 
Análisis forense de dispositivos android 02
Análisis forense de dispositivos android 02Análisis forense de dispositivos android 02
Análisis forense de dispositivos android 02
 
Análisis forense de dispositivos android 01
Análisis forense de dispositivos android 01Análisis forense de dispositivos android 01
Análisis forense de dispositivos android 01
 
Análisis forense de dispositivos ios
Análisis forense de dispositivos iosAnálisis forense de dispositivos ios
Análisis forense de dispositivos ios
 
Arquitectura, aplicaciones y seguridad en ios
Arquitectura, aplicaciones y seguridad en iosArquitectura, aplicaciones y seguridad en ios
Arquitectura, aplicaciones y seguridad en ios
 
Jailbreak y rooting más allá de los límites del dispositivo
Jailbreak y rooting más allá de los límites del dispositivoJailbreak y rooting más allá de los límites del dispositivo
Jailbreak y rooting más allá de los límites del dispositivo
 
I os en el entorno corporativo
I os en el entorno corporativoI os en el entorno corporativo
I os en el entorno corporativo
 
Análisis forense de tarjetas sim, smartcards, etc
Análisis forense de tarjetas sim, smartcards, etcAnálisis forense de tarjetas sim, smartcards, etc
Análisis forense de tarjetas sim, smartcards, etc
 
Lo que las apps esconden
Lo que las apps escondenLo que las apps esconden
Lo que las apps esconden
 
Firma digital y biométrica en dispositivos móviles
Firma digital y biométrica en dispositivos móvilesFirma digital y biométrica en dispositivos móviles
Firma digital y biométrica en dispositivos móviles
 
Nfc en móviles
Nfc en móvilesNfc en móviles
Nfc en móviles
 
Fraude en tecnológias móviles
Fraude en tecnológias móvilesFraude en tecnológias móviles
Fraude en tecnológias móviles
 
Malware en dispositivos móviles
Malware en dispositivos móvilesMalware en dispositivos móviles
Malware en dispositivos móviles
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Auditing Mobile Applications

  • 1. *[ AUDITING MOBILE APPLICATIONS ] Author: Jose Selvi Date: 30/Jun/2011
  • 2. $ WHOIS JSELVI Jose Selvi http://twitter.com/JoseSelvi jselvi@s21sec.com jselvi@pentester.es http://www.s21sec.com http://www.pentester.es
  • 3. INDEX Apps Revolution Divide & Conquer (D&C) Mobile Networking Server Side Client Side What’s Up with WhatsApp
  • 4. APPS REVOLUTION Pág. 5
  • 16. DIVIDE & CONQUER (D&C) AND MORE Pág. 5
  • 18. MOBILE LAB CLIENT
  • 19. MOBILE LAB SERVER CLIENT
  • 20. MOBILE LAB SERVER CLIENT
  • 21. MOBILE LAB NETWORK CLIENT SERVER Phone full control Some ways We CAN’T change the server SW full control We’re able to control the We CAN’T have a network look to the We’re able to software change config and software Sometimes hard and expensive Black Box Testing
  • 22. JAILBREAK / ROOTING Sometimes emulator r00lz! • Android Emulator (SDK) • iOS Simulator (SDK) But sometimes not... We don’t have full built-in control Maybe we should... • iOS Jailbreak • Android Rooting
  • 23. MOBILE NETWORKING Pág. 5
  • 26. MAN-IN-THE-MIDDLE msf auxiliary(fakedns) > [*] DNS bypass domain api.facebook.com resolved 66.220.146.36 [*] DNS bypass domain iphone.facebook.com resolved 66.220.153.30 [*] DNS bypass domain m.facebook.com resolved 66.220.158.26
  • 27. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 28. “FAKE” DNS ¿whois www.google.com? IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 29. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 ¿whois www.google.com? 20.20.20.20 DNS SERVER
  • 30. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 ¿whois www.google.com? 20.20.20.20 DNS SERVER
  • 31. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 www.google.com = 74.125.39.104 20.20.20.20 DNS SERVER
  • 32. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 www.google.com = 74.125.39.104 20.20.20.20 DNS SERVER
  • 33. “FAKE” DNS www.google.com = 74.125.39.104 IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 34. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 35. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 36. “FAKE” DNS ¿whois api.facebook.com? IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 37. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 ¿whois api.facebook.com? 20.20.20.20 DNS SERVER
  • 38. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 api.facebook.com = 20.20.20.20 20.20.20.20 DNS SERVER
  • 39. “FAKE” DNS api.facebook.com = 20.20.20.20 IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 40. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 20.20.20.20 DNS SERVER
  • 41. “FAKE” DNS IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 GW: 20.20.20.1 DNS: 20.20.20.20 PROXY 20.20.20.20 DNS SERVER
  • 42. REDIRECT TRICK IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 20.20.20.20 GW: 20.20.20.20 DNS: 8.8.8.8 PROXY
  • 43. REDIRECT TRICK IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 20.20.20.20 GW: 20.20.20.20 DNS: 8.8.8.8 PROXY
  • 44. REDIRECT TRICK IP: 20.20.20.10 10.10.10.10 MASK: 255.255.255.0 20.20.20.20 GW: 20.20.20.20 DNS: 8.8.8.8 PROXY
  • 45. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 10.10.10.10 GW: 20.20.20.20 DNS: 8.8.8.8
  • 46. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 CERT 10.10.10.10 GW: 20.20.20.20 DNS: 8.8.8.8
  • 47. PKI: Public Key Infraestructure SERVER PUB PRIV CA PUB PRIV CLIENT PUB PUB PUB PUB CA1
  • 48. PKI: Public Key Infraestructure SERVER CA PUB PRIV PUB PRIV INFO CERT CLIENT PUB PUB PUB PUB CA1
  • 49. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT PUB PUB PUB PUB CA1
  • 50. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT PUB PUB PUB PUB CA1
  • 51. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT DIGEST PUB PUB PUB PUB CA1
  • 52. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV DIGEST INFO CERT PUB CLIENT DIGEST PUB PUB PUB PUB CA1
  • 53. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV SIGNED DIGEST INFO CERT PUB CLIENT DIGEST PUB PUB PUB PUB CA1
  • 54. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT DIGEST SIGNED DIGEST PUB PUB PUB PUB CA1
  • 55. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT DIGEST SIGNED DIGEST PUB PUB PUB PUB CA1
  • 56. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT PUB PUB PUB PUB DIGEST CA1 SIGNED DIGEST
  • 57. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT PUB PUB PUB PUB DIGEST CA1 DIGEST’
  • 58. PKI: Public Key Infraestructure SERVER CA PUB PRIV PRIV INFO CERT PUB CLIENT PUB PUB PUB PUB DIGEST CA1 DIGEST’
  • 60. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 10.10.10.10 GW: 20.20.20.20 DNS: 8.8.8.8
  • 61. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 CERT 10.10.10.10 GW: 20.20.20.20 DNS: 8.8.8.8
  • 62. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 FAKE CERT 10.10.10.10 CERT GW: 20.20.20.20 DNS: 8.8.8.8 FAKE CA
  • 63. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 FAKE CERT 10.10.10.10 CERT GW: 20.20.20.20 DNS: 8.8.8.8
  • 64. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 FAKE CERT 10.10.10.10 CERT GW: 20.20.20.20 DNS: 8.8.8.8
  • 65. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 FAKE CERT 10.10.10.10 CERT GW: 20.20.20.20 DNS: 8.8.8.8
  • 66. SSL/HTTPS PROXY IP: 20.20.20.10 MASK: 255.255.255.0 FAKE CERT 10.10.10.10 CERT GW: 20.20.20.20 DNS: 8.8.8.8
  • 67. IMPORT CERTIFICATES iPhone / iPad • Export from proxy (Burp, ...) o built (openssl, ...). • iPhone Configuration Utility Android • Only VPN certs, not Web. • Hard... • Still Working...
  • 69. SERVER SIDE Pág. 5
  • 70. AS USUAL... Browser Nessus Qualys SQLMap Metasploit Backtrack ... Of course, your brain!
  • 71. CLIENT SIDE Pág. 5
  • 80. ANDROID BINARY FORMAT App.java App.class App.dex
  • 81. ANDROID BINARY FORMAT App.java App.class App.dex
  • 82. ANDROID BINARY FORMAT App.java App.class App.dex
  • 84. Man-in-the- CRACKING VERIFYCERT certificados como válidos), algo que evidentemente no podrá hacer un atacante que no tuviera previo control de la máquina pero que nos situa en la posición de un intruso que haya comprometido previamente el NOC de Good. En esta ocasión, dado que no se ha conseguido vulnerar los certificados SSL, NO bastaría con el compromiso de algunos de los routers internmedios, como SI ocurría en el caso anterior. www.s21sec.c
  • 85. WHAT’S UP WITH WHATSAPP? Pág. 5
  • 86. WHAT’S UP WITH WHATSAPP? Pág. 5
  • 87. KNOWN WHATSAPP ISSUES Unencrypted Traffic • But using 443 tcp port... Storing ALL conversation FOREVER Storing GPS position! • WTF!! • Why??!! Much more... Great research from SecurityByDefault guys!
  • 89. ALERT! SPAM! SEC-560: Network Penetration Testing and Ethical Hacking
  • 90. THANKS! QUESTIONS? Jose Selvi http://twitter.com/JoseSelvi jselvi@s21sec.com jselvi@pentester.es http://www.s21sec.com http://www.pentester.es
  • 91. *[ THANKS! SEE YOU! ] Pág. 7