Mobile App Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Mobile App

Security
Examine The Complexity To
Hacking Mobile Apps & How To
Secure Them
Abhinav Mishra

- Founder & CEO: Enciphers


- Decade+ Experience in Hacking Web/Mobile/Infra
- Author: Mobile App Reverse Engineering
- Trainer | Penetration Tester
- Twitter: 0ctac0der

2
Enciphers
- Cyber Security Consulting & Training Company
- Penetration Testing:
- Web | Mobile | Cloud | Infra
- Training:
- Web | Mobile | Cloud | Reverse Engineering
- Responsible Disclosure Management
- Bug Bounty Triaging

www.enciphers.com | training.enciphers.com

3
Mobile App Security

- Android & iOS Application


Packages
- User & Application Data
- APIs & Infrastructure
- Android & iOS vulnerabilities
- Device Security

4
Some Analytics

Mobile apps are the primary target


for hacker & malicious actors. It’s
critically important to secure the
mobile apps, which handle sensitive
user information.

In our experience 90% of mobile


application security reviews result in
critical and high severity security
issues.

5
Attacking iOS Apps

Demonstrating how login


screen of an iOS app can be
brute forced, to find the
correct PIN.

Tweet Link

6
Myths & Reality

- Operating system security controls are enough to


protect the data
- Application code can not be reverse engineered
- Traffic interception is not possible on modern platforms
like Flutter
- Client side controls are enough for defence

7
Case Study
Hacking One Of The Biggest Gaming Platform

- Analyzed the application binary, through reverse


engineering
- Bypassed the certificate pinning
- Analyzed the API endpoints
- Fuzzing for undocumented API endpoints
{app.com/api/subs/FUZZ}

8
Case Study
Hacking One Of The Biggest Gaming Platform

- Discovered an API endpoint with no access control


{app.com/api/subs/v2/invoice/[sequential
identifier]}
- Fuzzed for sequential identifier to extract all valid
invoices
- Invoices contain personal details like name, phone
number, card details (last 4 digits), address etc.

9
What’s The Answer

In-Depth Penetration Testing


Believe it or not, for all business critical applications, manual
penetration tests are proven to be the best tool.

Injecting Security Into Development


Develop secure applications, by implement secure coding
practices & security trained developers

Automate The Baseline


Even though the automated scanner fail miserably at
finding critical/high issues, they are good to perform basic
scan and checks

10
THANK YOU

Reach out to me at:

0ctac0der

[email protected]

11

You might also like