Top Banner
H@kin9 & vulnerability assessment in android By, J@$h. 13501A1908
38

h@kin9 & vulnerability assessment in android

Jul 28, 2015

Download

Internet

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: h@kin9 & vulnerability assessment in android

H@kin9 & vulnerability assessment in android

By,J@$h.

13501A1908

Page 2: h@kin9 & vulnerability assessment in android

contents

What is hacking Who are hackers Hacker types Practical attacks Phishing attacks Dos attacks Clickjacking attacks Mobile hacking

Page 3: h@kin9 & vulnerability assessment in android

What is computer hacking &

who are hackers Computer hacking Hacking is simply gaining unauthorized access to data in a system or computer Hacker The person who hacks Cracker System intruder/destroyer

Page 4: h@kin9 & vulnerability assessment in android

Who are hackers

Someone who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers

Hacker means cracker nowadays

Page 5: h@kin9 & vulnerability assessment in android

Hacker types

White hat hackers Black hat hackers Grey hat hackers

Page 6: h@kin9 & vulnerability assessment in android

Phishing attacks

Phishing is the illegal attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

Types Deceptive malware

Page 7: h@kin9 & vulnerability assessment in android
Page 8: h@kin9 & vulnerability assessment in android
Page 9: h@kin9 & vulnerability assessment in android
Page 10: h@kin9 & vulnerability assessment in android
Page 11: h@kin9 & vulnerability assessment in android

Clickjacking attacks

 It is a malicious technique of tricking a web user into clicking on something different from what the user perceives they are clicking on web pages

Page 12: h@kin9 & vulnerability assessment in android

Exploit process

Page 13: h@kin9 & vulnerability assessment in android

A Simple example

Page 14: h@kin9 & vulnerability assessment in android

The simple example source code

Page 15: h@kin9 & vulnerability assessment in android

Advanced clickjacking techniques

Page 16: h@kin9 & vulnerability assessment in android

Exploit process for Facebook

Page 17: h@kin9 & vulnerability assessment in android

Likejacking on the wild

Page 18: h@kin9 & vulnerability assessment in android

Mobile hacking

Bypassing android lockscreen

Modifying apk data WhatsApp hacking Modifying apks

Page 19: h@kin9 & vulnerability assessment in android

Bypassing android lockscreen

Page 20: h@kin9 & vulnerability assessment in android

Modifying apk data

Page 21: h@kin9 & vulnerability assessment in android

Modifying apk data

Page 22: h@kin9 & vulnerability assessment in android

WhatsApp cracking

Page 23: h@kin9 & vulnerability assessment in android
Page 24: h@kin9 & vulnerability assessment in android

Modifying apks

Making of the apk

Page 25: h@kin9 & vulnerability assessment in android

Modifying apks

Reversing the apk

Page 26: h@kin9 & vulnerability assessment in android

Getting our hands dirty

Its Demo time !!!

Page 27: h@kin9 & vulnerability assessment in android

Android malwares

Page 28: h@kin9 & vulnerability assessment in android

Memories of the past

Some famous android malwares …

Trojan-SMS .Fakeplayer.a Geinimi Snake DreamDroid GGtracker

Page 29: h@kin9 & vulnerability assessment in android

Trojan-SMS .Fakeplayer.a

simplest malware till date

Sends SMS to premium members

Mainly distrubuted through porn/media apps

Stop watching porn? :0

Page 30: h@kin9 & vulnerability assessment in android

Geinimi

most sophisticated malware till date

Botnet like capabilities Mainly distrubuted through

porn/media apps Suggests infected legimate apps

Page 31: h@kin9 & vulnerability assessment in android

Geinimi(continued)

Botnet command capabilities… Call-call a number Email-send an email Sms record-sends all the sms’ses to

the server Install-install an app Shell-get a shell Suggests infected legimate apps

Page 32: h@kin9 & vulnerability assessment in android
Page 33: h@kin9 & vulnerability assessment in android

Creating our own android malware

Expected time < 5 min

Page 34: h@kin9 & vulnerability assessment in android

Exploit process

Page 35: h@kin9 & vulnerability assessment in android

The game is over :’(

Page 36: h@kin9 & vulnerability assessment in android

The game is over :’(

The game isn't over :)

Can create malwares not detected by the antivirus

Disable the antivirusUse ur own black hat creativity

Page 37: h@kin9 & vulnerability assessment in android

Stored passwords

Browser passwords stored in database called webview.db

Got r00t ?

Page 38: h@kin9 & vulnerability assessment in android

Insecure data storage