Framework Blackhat USA 2014 Arsenal Jake Valletta August 07, 2014 - - PowerPoint PPT Presentation

framework
SMART_READER_LITE
LIVE PREVIEW

Framework Blackhat USA 2014 Arsenal Jake Valletta August 07, 2014 - - PowerPoint PPT Presentation

Android Device Testing Framework Blackhat USA 2014 Arsenal Jake Valletta August 07, 2014 https://github.com/jakev/dtf Who Am I Consultant at Mandiant/FireEye Mobile security research and tool development


slide-1
SLIDE 1

Android Device Testing Framework

Blackhat USA 2014 Arsenal

Jake Valletta August 07, 2014

https://github.com/jakev/dtf

slide-2
SLIDE 2

Who Am I

  • Consultant at Mandiant/FireEye
  • Mobile security research and tool

development

– www.thecobraden.com/projects/ – www.github.com/jakev/

  • @jake_valletta

Blackhat USA 2014 https://github.com/jakev/dtf 2

slide-3
SLIDE 3

What is dtf?

  • “Android Device Testing Framework”

– Modular and extendable

  • Written in Python and Bash
  • Not a vulnerability scanner
  • Think of it as “lead generation”
  • Someone hands you a phone – Where are the

vulnerabilities?

https://github.com/jakev/dtf 3 Blackhat USA 2014

slide-4
SLIDE 4

Example Vulnerabilities

  • Information disclosure

– Can a malicious application or user “pillage” system or personal data?

  • Privilege escalation

– Can a malicious application or user escalate their privileges on the device?

  • Denial of service

– Can a malicious application cause denial of service like conditions to a device?

https://github.com/jakev/dtf 4 Blackhat USA 2014

slide-5
SLIDE 5

What it does Out of the Box

  • Not much.
  • Provides project management
  • Package installer and module support

– Modules perform all the exciting functionality! – dtf <module_name>

https://github.com/jakev/dtf 5 Blackhat USA 2014

slide-6
SLIDE 6

Modules?

  • Python or Bash scripts
  • I’ll be releasing my collection of modules for

testing

  • Can also write your own 

https://github.com/jakev/dtf 6 Blackhat USA 2014

slide-7
SLIDE 7

My Modules…

  • Collect information from device
  • Unpack data and process into databases
  • Provide APIs and modules to interact with the

data

Blackhat USA 2014 https://github.com/jakev/dtf 7

  • sysapps.db
  • frameworks.db
  • dev.db
  • services.db
  • appdexdbs/*.db
  • frameworkdexdbs/*.db
  • APK Files
  • Framework files
  • Binaries
  • System Libraries
  • Disassemble DEX
  • Decode manifests
  • Unpack resources
slide-8
SLIDE 8

What’s the Goal?

  • Rapidly answer the questions:

– What changed in Android Open-Source Project (AOSP) applications? – What is exposed in new OEM/carrier applications?

Blackhat USA 2014 https://github.com/jakev/dtf 8

slide-9
SLIDE 9

Blackhat Setup

  • Two test devices

– ZTE Open C with ZTE Kit Kat 4.4.2 – Amazon Kindle HD with “FireOS 3.0”

  • Physical access
  • USB Debugging enabled
  • No root access

Blackhat USA 2014 https://github.com/jakev/dtf 9

slide-10
SLIDE 10

Demos!

10 https://github.com/jakev/dtf Blackhat USA 2014

slide-11
SLIDE 11

Closing Thoughts

  • Device OEMs and carriers have a lot to learn

– 1999 style issues

  • Issues are extremely apparent, given the

correct tools

  • Be careful how much trust you put in your

device!

Blackhat USA 2014 11 https://github.com/jakev/dtf

slide-12
SLIDE 12

Future Plans

  • Remove Bash dependency
  • Cross-platform support
  • Continue to release modules and expand

functionality

– More automation? – GUI?

Blackhat USA 2014 12 https://github.com/jakev/dtf

slide-13
SLIDE 13

Questions?

https://github.com/jakev/dtf

slide-14
SLIDE 14

Contact

  • Twitter: @jake_valletta
  • Email: javallet@gmail.com
  • Site: www.thecobraden.com
  • Blog: blog.thecobraden.com
  • GitHub: www.github.com/jakev/dtf

Blackhat USA 2014 14 https://github.com/jakev/dtf

slide-15
SLIDE 15

Thanks!

https://github.com/jakev/dtf