SlideShare uma empresa Scribd logo
1 de 43
Baixar para ler offline
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 1/43
Igor Falcomatà
Android e mobile security
(for developers)
ifalcomata@enforcer.it – CTO, Enforcer
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 2/43
• attività professionale:
•analisi delle vulnerabilità e penetration
testing (~15 anni)
•security consulting
•formazione
• altro:
•sikurezza.org
•(F|Er|bz)lug
free advertising >free advertising >
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 3/43
http://en.wikipedia.org/w/index.php?title=File:Android-System-Architecture.svg
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 4/43
• Architetture: ARM, (MIPS, x86, ..)
• Kernel
• Kernel Linux 2.6.x (Android 1, 2 e 3.x)
• Kernel Linux 3.0.x (Android 4.x)
• componenti e driver standard
• FS, processi, permessi, processi
• vulnerabilità standard ;)
• Componenti custom
• binder, ashmem, pmem, logger, wavelocks, OOM, alarm
timers, paranoid network security, gpio, ..
• android e vendor custom hw driver
• nuove vulnerabilità da scoprire ;)
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 5/43
• Sandbox (OS level)
• sandboxing con uid/gid linux + patch kernel (protected API)
• 1 processo = 1 applicazione = 1 VM (+ componenti OS)
• protected API per accesso all'hw: camera, gps, bluetooth,
telefonia, SMS/MMS, connessioni di rete)
• root = root (full access)
• Librerie
• bionic libc (!= gnu libc, !posix)
• udev, WebKit, OpenGL, SQLite, crypto, .. (& bugs)
• Dalvik VM (!= JVM)
• Java Code -> dex bytecode
• custom Java libraries
• può lanciare codice nativo (syscall, ioctls, .. ) -> kernel
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 6/43
• Sandbox (OS level)
• sandboxing con uid/gid linux + patch kernel (protected API)
• 1 processo = 1 applicazione = 1 VM (+ componenti OS)
• protected API per accesso all'hw: camera, gps, bluetooth,
telefonia, SMS/MMS, connessioni di rete)
• root = root (full access)
• Librerie
• bionic libc (!= gnu libc, !posix)
• udev, WebKit, OpenGL, SQLite, crypto, .. (& bugs)
• Dalvik VM (!= JVM)
• Java Code -> dex bytecode
• custom Java libraries
• può lanciare codice nativo (syscall, ioctls, .. ) -> kernel
“Like all security features, the
Application Sandbox is not
unbreakable. However, to break
out of the Application Sandbox
in a properly configured device,
one must compromise the
security of the the Linux
kernel.”
“Like all security features, the
Application Sandbox is not
unbreakable. However, to break
out of the Application Sandbox
in a properly configured device,
one must compromise the
security of the the Linux
kernel.”
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 7/43
hot-spot user
desktop
ext. router
web server app backend db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 8/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
3rd
party
app backend
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 9/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
3rd
party
app backend
• vettori:
• chat
• e-mail
• link su social network
• MiTM / dns spoofing / ..
• exploit:
• sito malicious ->
• app (pwned) ->
• kernel (pwned) ->
• r00t!!
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 10/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
3rd
party
app backend
• classico “client side attack”:
• exploit app/lib
• (webkit, ..)
• exec codice arbitrario
• -> kernel (syscall, ioctls, ..)
• situazione no-win
• “non ci interessa”
• però...:
• root -> controllo completo
• accesso ai dati di ogni app
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 11/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
3rd
party
app backend
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 12/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
3rd
party
app backend
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 13/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
3rd
party
app backend
• root -> controllo completo
• dati personali
posta, documenti,
rubrica,calendario, ..
• intercettazioni
audio, video, messaging,
network, ..
• geolocalizzazione
foto, social network, ..
• credenziali
siti, posta, VPN, .. → cloud
storage
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 14/43
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
Mr. MobileMalicious
app backend
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 15/43
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
Mr. MobileMalicious
app backend
OOB covert channel
(UMTS/GPRS/SMS/..)
Bring Your 0wned Device
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 16/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
servizi in cloud
app backend
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 17/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
servizi in cloud
app backend
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 18/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
servizi in cloud
Mr. WifiMiTM
app backend
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 19/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
servizi in cloud
Mr. WifiMiTM
app backend
no HTTPS (ahi ahi ahi)
MiTM
Hot Spot
Rogue APs
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 20/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
servizi in cloud
Mr. WifiMiTM
app backend
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 21/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
servizi in cloud
Mr. WifiMiTM
app backend
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 22/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
servizi in cloud
Mr. WifiMiTM
app backend
• MiTM (browser)
• no SSL?
• traffic mangling
• SSL?
• utente “continua”?
• game over
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 23/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
servizi in cloud
Mr. WifiMiTM
app backend
• MiTM (app)
• no SSL?
• traffic mangling
• SSL?
• app verifica cert?
• OK!
• app non verifica cert?
• game over
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 24/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
servizi in cloud
Mr. WifiMiTM
app backend
• game over = traffic mangling
• sniffing
• credenziali
• dati
• reverse engineering
• traffico/protocolli
• business logic
• analisi API/URL
• rogue/fake app
• HTML-like c.s. attacks
• injection JS & co.
• client side injection
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 25/43
https://threatpost.com/en_us/blogs/research-shows-serious-problems-android-app-ssl-implementations-101912
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 26/43
https://threatpost.com/en_us/blogs/research-shows-serious-problems-android-app-ssl-implementations-101912
Sì vabbé, nel 2012..
ma ora..
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 27/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
app backend
download .apk
(install app)
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 28/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
app backend
• .apk
• download
• market install
• adb pull
• estrazione
• dex2jar, apk-extractor, ..
• analisi
• risorse, manifest, ..
• decompilazione
• jd-gui, ypjd, ..
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 29/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
app backend
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 30/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
app backend
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 31/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
app backend
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 32/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
app backend
• .apk
• analisi business logic
• broken/no auth
• broken/no session management
• credenziali/certificati
• URL/API “privati”
• HTTP/JSON/XMLRPC/WS/..
• SQL Injections
• Path Traversal
• Broken/no auth/session m.
• ...
• custom/altri protocolli
• reverse engineering
• vedi sopra
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 33/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
app backend
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 34/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
app backend
http://www.example.com/app/privateapi?user=paperino
http://www.example.com/app/privateapi?user=pluto
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 35/43
hot-spot user
desktop
ext. router
web server db server
file server
dep. server
desktop
desktop
firewall
access point
BY0D user
wifi user
3G user
servizi in cloud
Mr. MobileMalicious
app backend
http://www.example.com/app/privateapi?user=paperino&pass=moo
http://www.example.com/app/privateapi?user=pluto'--&pass=boh
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 36/43
https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 37/43
bonus track :)
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 38/43
bonus track :)
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 39/43
http://www.guardian.co.uk/technology/2012/jan/30/android-malware-row
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 40/43
• diffusione e “geopardizzazione” (AUGH!)
• sorgenti (AOSP), docs, SDK, NDK, emulatore, ..
• .apk → decompilazione, reversing, debug
• aggiornamenti OS, app e market alternativi
• permessi delle applicazioni “delegati” agli utenti
• Linux Kernel, ~ Linux userspace e librerie (e bug)
• exploit mitigation techniques (fail) (< 2.3, < 4.0.3)
• OOB “covert” channel (umts/gprs, SMS, ..)
• territori poco explorati: OS/lib custom, hw driver
http://www.enforcer.it/dl/android_security_smau2012.pdf
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 41/43
• dati personali (posta, documenti, rubrica, calendario, ..)
• intercettazioni (audio, video, messaging, network, ..)
• geolocalizzazione (foto, social network, ..)
• credenziali (siti, posta, VPN, ..) → cloud storage
• HTML-like client side attacks
• EvilApp want to eat your soul.. Install? YES!!!
• BY0D (Bring Your 0wned Device)
• banking OTP ($$)
• NFC ($$)
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 42/43
• url e web-services “privati”
• business logic esposta (client-side)
• -> device -> credenziali -> back-end
• -> device -> storage -> back-end
• credenziali e certificati hard-coded (.apk)
• no/lazy input validation
• no/broken authentication & session management
• the good ole web security vulns
Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 43/43
Webografia: http://www.enforcer.it/dl/android_security_smau2012.pdf
Igor Falcomatà
ifalcomata@enforcer.it – CTO, Enforcer
Android e mobile security
(for developers)
Domande?

Mais conteúdo relacionado

Mais procurados

Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...
Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...
Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...Cheng-Yi Yu
 
Jailbreaking iOS
Jailbreaking iOSJailbreaking iOS
Jailbreaking iOSKai Aras
 
Mobile Security Assessment: 101
Mobile Security Assessment: 101Mobile Security Assessment: 101
Mobile Security Assessment: 101wireharbor
 
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...CODE BLUE
 
from Realtime Operating systems to unlocking iPhones in less than 30 slides
from Realtime Operating systems to unlocking iPhones in less than 30 slidesfrom Realtime Operating systems to unlocking iPhones in less than 30 slides
from Realtime Operating systems to unlocking iPhones in less than 30 slidesKai Aras
 

Mais procurados (6)

Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...
Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...
Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...
 
iOS jailbreaking
iOS jailbreakingiOS jailbreaking
iOS jailbreaking
 
Jailbreaking iOS
Jailbreaking iOSJailbreaking iOS
Jailbreaking iOS
 
Mobile Security Assessment: 101
Mobile Security Assessment: 101Mobile Security Assessment: 101
Mobile Security Assessment: 101
 
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
 
from Realtime Operating systems to unlocking iPhones in less than 30 slides
from Realtime Operating systems to unlocking iPhones in less than 30 slidesfrom Realtime Operating systems to unlocking iPhones in less than 30 slides
from Realtime Operating systems to unlocking iPhones in less than 30 slides
 

Semelhante a Android e mobile security - Falcomatà

Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)Security Weekly
 
Mobile Development across Different Platforms @ Immobilienscout24
Mobile Development across Different Platforms @ Immobilienscout24Mobile Development across Different Platforms @ Immobilienscout24
Mobile Development across Different Platforms @ Immobilienscout24Hasan Hosgel
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android SecurityMarakana Inc.
 
Mobile security
Mobile securityMobile security
Mobile securityStefaan
 
Faster safer and 100 user centric application at equifax with docker
Faster safer and 100 user centric application at equifax with dockerFaster safer and 100 user centric application at equifax with docker
Faster safer and 100 user centric application at equifax with dockerDocker, Inc.
 
1.3. (In)security Software
1.3. (In)security Software1.3. (In)security Software
1.3. (In)security Softwaredefconmoscow
 
(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013STO STRATEGY
 
2.1. Dissecting blackberry
2.1. Dissecting blackberry2.1. Dissecting blackberry
2.1. Dissecting blackberrydefconmoscow
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkPriyanka Aash
 
Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...
Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...
Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...Mike Qin
 
Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet NoNameCon
 
Breaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial RobotsBreaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial RobotsSpeck&Tech
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar Santhosh Kumar
 
Droidcon 2011: Gingerbread and honeycomb, Markus Junginger, Greenrobot
Droidcon 2011: Gingerbread and honeycomb, Markus Junginger,  GreenrobotDroidcon 2011: Gingerbread and honeycomb, Markus Junginger,  Greenrobot
Droidcon 2011: Gingerbread and honeycomb, Markus Junginger, GreenrobotDroidcon Berlin
 
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)Toshiharu Harada, Ph.D
 
Android Embedded - Smart Hubs als Schaltzentrale des IoT
Android Embedded - Smart Hubs als Schaltzentrale des IoTAndroid Embedded - Smart Hubs als Schaltzentrale des IoT
Android Embedded - Smart Hubs als Schaltzentrale des IoTinovex GmbH
 

Semelhante a Android e mobile security - Falcomatà (20)

Zerovm backgroud
Zerovm backgroudZerovm backgroud
Zerovm backgroud
 
Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)
 
Mobile Development across Different Platforms @ Immobilienscout24
Mobile Development across Different Platforms @ Immobilienscout24Mobile Development across Different Platforms @ Immobilienscout24
Mobile Development across Different Platforms @ Immobilienscout24
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Faster safer and 100 user centric application at equifax with docker
Faster safer and 100 user centric application at equifax with dockerFaster safer and 100 user centric application at equifax with docker
Faster safer and 100 user centric application at equifax with docker
 
1.3. (In)security Software
1.3. (In)security Software1.3. (In)security Software
1.3. (In)security Software
 
Android system security
Android system securityAndroid system security
Android system security
 
(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013
 
2.1. Dissecting blackberry
2.1. Dissecting blackberry2.1. Dissecting blackberry
2.1. Dissecting blackberry
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT Framework
 
Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...
Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...
Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...
 
Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet
 
Breaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial RobotsBreaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial Robots
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
 
Droidcon 2011: Gingerbread and honeycomb, Markus Junginger, Greenrobot
Droidcon 2011: Gingerbread and honeycomb, Markus Junginger,  GreenrobotDroidcon 2011: Gingerbread and honeycomb, Markus Junginger,  Greenrobot
Droidcon 2011: Gingerbread and honeycomb, Markus Junginger, Greenrobot
 
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
 
Android Embedded - Smart Hubs als Schaltzentrale des IoT
Android Embedded - Smart Hubs als Schaltzentrale des IoTAndroid Embedded - Smart Hubs als Schaltzentrale des IoT
Android Embedded - Smart Hubs als Schaltzentrale des IoT
 
sym
symsym
sym
 

Mais de Codemotion

Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Codemotion
 
Pompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyPompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyCodemotion
 
Pastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaPastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaCodemotion
 
Pennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserPennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserCodemotion
 
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Codemotion
 
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Codemotion
 
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Codemotion
 
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 - Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 - Codemotion
 
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Codemotion
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Codemotion
 
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Codemotion
 
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Codemotion
 
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Codemotion
 
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Codemotion
 
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Codemotion
 
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...Codemotion
 
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Codemotion
 
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Codemotion
 
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Codemotion
 
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Codemotion
 

Mais de Codemotion (20)

Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
 
Pompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyPompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending story
 
Pastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaPastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storia
 
Pennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserPennisi - Essere Richard Altwasser
Pennisi - Essere Richard Altwasser
 
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
 
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
 
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
 
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 - Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
 
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
 
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
 
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
 
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
 
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
 
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
 
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
 
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
 
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
 
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
 
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
 

Último

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Android e mobile security - Falcomatà

  • 1. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 1/43 Igor Falcomatà Android e mobile security (for developers) ifalcomata@enforcer.it – CTO, Enforcer
  • 2. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 2/43 • attività professionale: •analisi delle vulnerabilità e penetration testing (~15 anni) •security consulting •formazione • altro: •sikurezza.org •(F|Er|bz)lug free advertising >free advertising >
  • 3. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 3/43 http://en.wikipedia.org/w/index.php?title=File:Android-System-Architecture.svg
  • 4. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 4/43 • Architetture: ARM, (MIPS, x86, ..) • Kernel • Kernel Linux 2.6.x (Android 1, 2 e 3.x) • Kernel Linux 3.0.x (Android 4.x) • componenti e driver standard • FS, processi, permessi, processi • vulnerabilità standard ;) • Componenti custom • binder, ashmem, pmem, logger, wavelocks, OOM, alarm timers, paranoid network security, gpio, .. • android e vendor custom hw driver • nuove vulnerabilità da scoprire ;)
  • 5. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 5/43 • Sandbox (OS level) • sandboxing con uid/gid linux + patch kernel (protected API) • 1 processo = 1 applicazione = 1 VM (+ componenti OS) • protected API per accesso all'hw: camera, gps, bluetooth, telefonia, SMS/MMS, connessioni di rete) • root = root (full access) • Librerie • bionic libc (!= gnu libc, !posix) • udev, WebKit, OpenGL, SQLite, crypto, .. (& bugs) • Dalvik VM (!= JVM) • Java Code -> dex bytecode • custom Java libraries • può lanciare codice nativo (syscall, ioctls, .. ) -> kernel
  • 6. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 6/43 • Sandbox (OS level) • sandboxing con uid/gid linux + patch kernel (protected API) • 1 processo = 1 applicazione = 1 VM (+ componenti OS) • protected API per accesso all'hw: camera, gps, bluetooth, telefonia, SMS/MMS, connessioni di rete) • root = root (full access) • Librerie • bionic libc (!= gnu libc, !posix) • udev, WebKit, OpenGL, SQLite, crypto, .. (& bugs) • Dalvik VM (!= JVM) • Java Code -> dex bytecode • custom Java libraries • può lanciare codice nativo (syscall, ioctls, .. ) -> kernel “Like all security features, the Application Sandbox is not unbreakable. However, to break out of the Application Sandbox in a properly configured device, one must compromise the security of the the Linux kernel.” “Like all security features, the Application Sandbox is not unbreakable. However, to break out of the Application Sandbox in a properly configured device, one must compromise the security of the the Linux kernel.”
  • 7. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 7/43 hot-spot user desktop ext. router web server app backend db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud
  • 8. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 8/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious 3rd party app backend
  • 9. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 9/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious 3rd party app backend • vettori: • chat • e-mail • link su social network • MiTM / dns spoofing / .. • exploit: • sito malicious -> • app (pwned) -> • kernel (pwned) -> • r00t!!
  • 10. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 10/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious 3rd party app backend • classico “client side attack”: • exploit app/lib • (webkit, ..) • exec codice arbitrario • -> kernel (syscall, ioctls, ..) • situazione no-win • “non ci interessa” • però...: • root -> controllo completo • accesso ai dati di ogni app
  • 11. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 11/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious 3rd party app backend
  • 12. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 12/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious 3rd party app backend
  • 13. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 13/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious 3rd party app backend • root -> controllo completo • dati personali posta, documenti, rubrica,calendario, .. • intercettazioni audio, video, messaging, network, .. • geolocalizzazione foto, social network, .. • credenziali siti, posta, VPN, .. → cloud storage
  • 14. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 14/43 desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user Mr. MobileMalicious app backend
  • 15. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 15/43 desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user Mr. MobileMalicious app backend OOB covert channel (UMTS/GPRS/SMS/..) Bring Your 0wned Device
  • 16. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 16/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user servizi in cloud app backend
  • 17. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 17/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user servizi in cloud app backend
  • 18. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 18/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user servizi in cloud Mr. WifiMiTM app backend
  • 19. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 19/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user servizi in cloud Mr. WifiMiTM app backend no HTTPS (ahi ahi ahi) MiTM Hot Spot Rogue APs
  • 20. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 20/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user servizi in cloud Mr. WifiMiTM app backend
  • 21. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 21/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user servizi in cloud Mr. WifiMiTM app backend
  • 22. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 22/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user servizi in cloud Mr. WifiMiTM app backend • MiTM (browser) • no SSL? • traffic mangling • SSL? • utente “continua”? • game over
  • 23. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 23/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user servizi in cloud Mr. WifiMiTM app backend • MiTM (app) • no SSL? • traffic mangling • SSL? • app verifica cert? • OK! • app non verifica cert? • game over
  • 24. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 24/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user servizi in cloud Mr. WifiMiTM app backend • game over = traffic mangling • sniffing • credenziali • dati • reverse engineering • traffico/protocolli • business logic • analisi API/URL • rogue/fake app • HTML-like c.s. attacks • injection JS & co. • client side injection
  • 25. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 25/43 https://threatpost.com/en_us/blogs/research-shows-serious-problems-android-app-ssl-implementations-101912
  • 26. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 26/43 https://threatpost.com/en_us/blogs/research-shows-serious-problems-android-app-ssl-implementations-101912 Sì vabbé, nel 2012.. ma ora..
  • 27. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 27/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious app backend download .apk (install app)
  • 28. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 28/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious app backend • .apk • download • market install • adb pull • estrazione • dex2jar, apk-extractor, .. • analisi • risorse, manifest, .. • decompilazione • jd-gui, ypjd, ..
  • 29. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 29/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious app backend
  • 30. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 30/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious app backend
  • 31. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 31/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious app backend
  • 32. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 32/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious app backend • .apk • analisi business logic • broken/no auth • broken/no session management • credenziali/certificati • URL/API “privati” • HTTP/JSON/XMLRPC/WS/.. • SQL Injections • Path Traversal • Broken/no auth/session m. • ... • custom/altri protocolli • reverse engineering • vedi sopra
  • 33. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 33/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious app backend
  • 34. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 34/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious app backend http://www.example.com/app/privateapi?user=paperino http://www.example.com/app/privateapi?user=pluto
  • 35. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 35/43 hot-spot user desktop ext. router web server db server file server dep. server desktop desktop firewall access point BY0D user wifi user 3G user servizi in cloud Mr. MobileMalicious app backend http://www.example.com/app/privateapi?user=paperino&pass=moo http://www.example.com/app/privateapi?user=pluto'--&pass=boh
  • 36. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 36/43 https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks
  • 37. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 37/43 bonus track :)
  • 38. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 38/43 bonus track :)
  • 39. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 39/43 http://www.guardian.co.uk/technology/2012/jan/30/android-malware-row
  • 40. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 40/43 • diffusione e “geopardizzazione” (AUGH!) • sorgenti (AOSP), docs, SDK, NDK, emulatore, .. • .apk → decompilazione, reversing, debug • aggiornamenti OS, app e market alternativi • permessi delle applicazioni “delegati” agli utenti • Linux Kernel, ~ Linux userspace e librerie (e bug) • exploit mitigation techniques (fail) (< 2.3, < 4.0.3) • OOB “covert” channel (umts/gprs, SMS, ..) • territori poco explorati: OS/lib custom, hw driver http://www.enforcer.it/dl/android_security_smau2012.pdf
  • 41. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 41/43 • dati personali (posta, documenti, rubrica, calendario, ..) • intercettazioni (audio, video, messaging, network, ..) • geolocalizzazione (foto, social network, ..) • credenziali (siti, posta, VPN, ..) → cloud storage • HTML-like client side attacks • EvilApp want to eat your soul.. Install? YES!!! • BY0D (Bring Your 0wned Device) • banking OTP ($$) • NFC ($$)
  • 42. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 42/43 • url e web-services “privati” • business logic esposta (client-side) • -> device -> credenziali -> back-end • -> device -> storage -> back-end • credenziali e certificati hard-coded (.apk) • no/lazy input validation • no/broken authentication & session management • the good ole web security vulns
  • 43. Android e mobile security (for developers) - ifalcomata@enforcer.it – CTO, Enforcer - Slide 43/43 Webografia: http://www.enforcer.it/dl/android_security_smau2012.pdf Igor Falcomatà ifalcomata@enforcer.it – CTO, Enforcer Android e mobile security (for developers) Domande?