Loading…
LASCON X has ended
Tuesday, October 22 • 9:00am - 5:00pm
Training: Attacking Android and iOS apps by Example (Day 1) LIMITED

Sign up or log in to save this to your schedule and see who's attending!

Limited Capacity seats available

(Paid Course) - Ticket can be purchased at https://lascon-x-training.eventbrite.com

Course DescriptionThis course has been prepared after years of research and experience gained through pentesting mobile applications. It is structured to follow the OWASP Mobile Top Ten and the OWASP Mobile Security Testing Guide. This is a hands-on practical course, the skills gained can be applied to mobile security assessments immediately. Each day starts with a brief introduction to the mobile platform for that day, and then continues with a look at static analysis, moves on to dynamic checks finishing off with a nice CTF session to test the skills gained.
Day 1 includes but is not limited to a brief introduction to Android security, a series of techniques focused on static analysis, followed by dynamic analysis covering both monitoring and modifying app behavior at runtime. The day ends with beautiful CTF challenges to entertain even advanced mobile app penetration testers.

Day 2 begins with a brief iOS security crash course, static analysis techniques, followed by dynamic analysis including both monitoring and modifying app behavior at runtime. The day ends with more lovely CTF challenges.

This is a basic outline of the course; it will contain various other components and details that will help the students understand and perform better. This will be a learning experience from which people relatively new to the ever-growing world of mobile security will benefit, while the advanced students will polish their skills in specific areas and perhaps complete more or the CTF challenges.
Topics Included
1. Review of Common Flaws in Source Code
2. Modification of App Behavior Through Code/Configuration Changes
3. Interception of Network Communication Aka MitM
4. Jailbreak/Root Detection Bypasses and App Review from A Privileged Standpoint
5. Instrumentation (Review and Modification of App Behavior)
6. CFT Challenges for Attendants to Test Their Skills

Attendees will be provided with
- Lifetime access to training portal
- Unlimited access to future updates and step-by-step video recordings
- Government-mandated and police apps in various countries
- Unlimited email support for training-related queries
- Many other excitingly vulnerable real-world apps
- IoT apps controlling Toys, Drones, etc.
- Digital copies of all training material
- Custom Build Lab VMs
- Purpose Build Vulnerable Test apps
- Source code for test apps

Hardware/Software Prerequisites
A laptop with the following specifications:
- Ability to connect to wireless and wired networks.
- Ability to read PDF files
- Administrative rights: USB allowed, the ability to deactivate AV, firewall, install tools, etc
- Knowledge of the BIOS password, in case VT is disabled.
- Minimum 8GB of RAM (recommended: 16GB+)
- 60GB+ of free disk space (to copy a lab VM and other goodies)
- Latest VirtualBox 6.0 or greater, including the “VirtualBox Extension Pack”
- Genymotion (can be the free version)
- A mobile phone capable of receiving text messages
- A jailbroken iPhone / iDevice with iOS >=9 (ideally: iOS 12) for the iOS labs
- Optional but useful: One of the following BurpSuite, ZAP or Fiddler (for MitM)
- Optional but useful: A Mac/Hackintosh with the latest XCode installed, for iOS code review & labs

Course Outline:

Day 1: Attacking Android apps by Example
Part 0 - Android Security Crash Course
- The state of Android Security
- Android security architecture and its components
- Android apps and the filesystem
- Android app signing, sandboxing and provisioning
- Recommended lab setup tips
Part 1 – Emphasis on Static Analysis with Runtime Checks
- Tools and techniques to retrieve/decompile/reverse and review APKs
- Identification of the attack surface of Android apps and general information gathering
- Identification of common vulnerability patterns in Android apps: hardcoded secrets, logic bugs, access control flaws, intents, cool injection attacks, and more
- The art of repackaging: Tips to get around not having root, Manipulating the Android Manifest, defeating pinning, defeating root detection, translating APKs in funny languages and more
Part 2 - Focus on Dynamic Analysis
- Monitoring data: LogCat, Insecure file storage, Android keystore, etc.
- The art of MitM: Intercepting Network Communications
- The art of Instrumentation: Hooking with Xposed and Frida
- App behaviour monitoring at runtime
- Defeating Certificate Pinning and root detection at runtime
- Modifying app behaviour at runtime
Part 3 - Test Your Skills
- CTF time

Day 2: Attacking iOS apps by Example
Part 0 - iOS Security Crash Course
- The state of iOS Security
- iOS security architecture and its components
- iOS app signing, sandboxing and provisioning
- iOS apps and the filesystem - Recommended lab setup tips
Part 1 - Focus on Static Analysis with runtime checks
- Tools and techniques to retrieve/decompile/reverse and review IPAs
- Identification of the attack surface of iOS apps and general information gathering
- Identification of common vulnerability patterns in iOS apps: hardcoded secrets, logic bugs, access, control flaws, URL handlers, cool injection attacks, and more
- Patching and Resigning iOS binaries to alter app behaviour
- Tips to test without a jailbreak Part 2 - Focus on Dynamic Analysis
- Monitoring data: caching, logs, app files, insecure file storage, iOS keychain, etc.
- Crypto flaws
- The art of MitM: Intercepting Network Communications
- Defeating certificate pinning and jailbreak detection at runtime
- The art of Instrumentation: Hooking with Cycript, Frida, Objection
- App behaviour monitoring at runtime
- Modifying app behaviour at runtime
Part 2 - Test your Skills
- CTF time

Speakers
avatar for Abraham Aranguren

Abraham Aranguren

CEO, 7ASecurity
After 13 years in itsec and 20 in IT Abraham is now the CEO of 7ASecurity (7asecurity.com), a company specializing in penetration testing of web/mobile apps, infrastructure, code reviews, and training. Former senior penetration tester / team lead at Cure53 (cure53.de) and Version... Read More →


Tuesday October 22, 2019 9:00am - 5:00pm
TBA