bypassing the android permission model
play

Bypassing the Android Permission Model Georgia Weidman Founder and - PowerPoint PPT Presentation

Bypassing the Android Permission Model Georgia Weidman Founder and CEO, Bulb Security LLC Is the permission model working? Are users making good decisions? Most Popular Android App Demo App abusing permissions Demo explained Permissions:


  1. Bypassing the Android Permission Model Georgia Weidman Founder and CEO, Bulb Security LLC

  2. Is the permission model working? Are users making good decisions?

  3. Most Popular Android App

  4. Demo App abusing permissions

  5. Demo explained Permissions: − Read IMEI − Read Contacts − Send SMS We exploited every one of these

  6. Rooting Android

  7. Rooting Android for Evil (DroidDream)

  8. DroidDream Permissions INTERNET READ_PHONE_STATE CHANGE_WIFI_STATE ACCESS_WIFI_STATE

  9. DroidDream

  10. DroidDream

  11. DroidDream Rooting Exploid CVE-2010-Easy (RageAgainsttheCage)

  12. DroidDream Root Payload  Permission model no longer applies − installed packages − All personal data − Send to C&C

  13. Rooting Android

  14. Demo Demo: Malicious post root payload

  15. How the Botnet Works Bot Receives a Message Bot Decodes User Data Checks for Bot Key Performs Functionality

  16. Mitigation  Users update their phones  That means they need the updates pushed out  That means you third party platforms!!

  17. Android Storage  Sdcard  VFAT  With apps  Only visible to app (default)  World readable

  18. Demo Exploiting bad storage practices

  19. Demo Explained  Stores sensitive data on the sdcard  Sdcard is VFAT  Everything is world readable

  20. Demo Explained  Discovers how the data is stored  Accesses it  Sends it to an attacker

  21. Code Examples Vulnerable Code Malicious Code

  22. BadSaveFile

  23. BadSendFile

  24. Wait? How do we get source code? Winzip/7zip etc. dex2jar jd-gui Whitepaper with more info: http://cdn01.exploit-db.com/wp- content/themes/exploit/docs/17717.pdf

  25. Nonsensical Code while (true) { if (i < 0); String str; while (true) { return; try {

  26. Mitigation  Store information securely  Not on sdcard  Not in source code  Not world readable

  27. Android Interfaces  Call other programs  Don't reinvent the wheel  Take a picture  Twitter from photo app

  28. Demo Exploiting open interface with SMS functionality

  29. Demo Explained  When it is called it sends an SMS  Caller can set the number and message  Sadly this is considered useful!

  30. Demo Explained  Calls the SMSBroadcastr  Sends number and message  Sends an SMS

  31. Code Examples Vulnerable Code Malicious Code

  32. SMSBroadcastr

  33. SMSIntent

  34. Mitigations  Don't have dangerous functionality available in interfaces  Require user interaction (click ok)  Require-permission tag in manifest for interface

  35. Contact Georgia Weidman georgiaweidman.com bulbsecurity.com georgia@bulbsecurity.com @georgiaweidman

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend