framework
play

Framework Blackhat USA 2014 Arsenal Jake Valletta August 07, 2014 - PowerPoint PPT Presentation

Android Device Testing Framework Blackhat USA 2014 Arsenal Jake Valletta August 07, 2014 https://github.com/jakev/dtf Who Am I Consultant at Mandiant/FireEye Mobile security research and tool development


  1. Android Device Testing Framework Blackhat USA 2014 Arsenal Jake Valletta August 07, 2014 https://github.com/jakev/dtf

  2. Who Am I • Consultant at Mandiant/FireEye • Mobile security research and tool development – www.thecobraden.com/projects/ – www.github.com/jakev/ • @jake_valletta Blackhat USA 2014 https://github.com/jakev/dtf 2

  3. What is dtf? • “Android Device Testing Framework” – Modular and extendable • Written in Python and Bash • Not a vulnerability scanner • Think of it as “lead generation” • Someone hands you a phone – Where are the vulnerabilities? Blackhat USA 2014 https://github.com/jakev/dtf 3

  4. Example Vulnerabilities • Information disclosure – Can a malicious application or user “pillage” system or personal data? • Privilege escalation – Can a malicious application or user escalate their privileges on the device? • Denial of service – Can a malicious application cause denial of service like conditions to a device? Blackhat USA 2014 https://github.com/jakev/dtf 4

  5. What it does Out of the Box • Not much. • Provides project management • Package installer and module support – Modules perform all the exciting functionality! – dtf <module_name> Blackhat USA 2014 https://github.com/jakev/dtf 5

  6. Modules? • Python or Bash scripts • I’ll be releasing my collection of modules for testing • Can also write your own  Blackhat USA 2014 https://github.com/jakev/dtf 6

  7. My Modules… • Collect information from device • Unpack data and process into databases • Provide APIs and modules to interact with the data • sysapps.db • frameworks.db • dev.db • services.db • appdexdbs/*.db • frameworkdexdbs/*.db • APK Files • Framework files • Disassemble DEX • Binaries • Decode manifests • System Libraries • Unpack resources Blackhat USA 2014 https://github.com/jakev/dtf 7

  8. What’s the Goal? • Rapidly answer the questions: – What changed in Android Open-Source Project (AOSP) applications? – What is exposed in new OEM/carrier applications? Blackhat USA 2014 https://github.com/jakev/dtf 8

  9. Blackhat Setup • Two test devices – ZTE Open C with ZTE Kit Kat 4.4.2 – Amazon Kindle HD with “ FireOS 3.0” • Physical access • USB Debugging enabled • No root access Blackhat USA 2014 https://github.com/jakev/dtf 9

  10. Demos! Blackhat USA 2014 https://github.com/jakev/dtf 10

  11. Closing Thoughts • Device OEMs and carriers have a lot to learn – 1999 style issues • Issues are extremely apparent, given the correct tools • Be careful how much trust you put in your device! Blackhat USA 2014 https://github.com/jakev/dtf 11

  12. Future Plans • Remove Bash dependency • Cross-platform support • Continue to release modules and expand functionality – More automation? – GUI? Blackhat USA 2014 https://github.com/jakev/dtf 12

  13. Questions? https://github.com/jakev/dtf

  14. Contact • Twitter: @jake_valletta • Email: javallet@gmail.com • Site: www.thecobraden.com • Blog: blog.thecobraden.com • GitHub: www.github.com/jakev/dtf Blackhat USA 2014 https://github.com/jakev/dtf 14

  15. Thanks! https://github.com/jakev/dtf

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend