Slide 1
Slide 1
Slide 1
Slide 1
Slide 1
Slide 1

PRESENTATION MATERIALS

PHOTOS / VIDEOS

Official conference photos and HD videos will be made available in the next 2-3 weeks. Please follow @hitbsecconf on Twitter for links or join our Facebook Group

SPECIAL-OPS 3–MOBILE APPLICATION HACKING – ATTACK & DEFENSE

TRAINER: Shreeraj Shah (Founder, Blueinfy) and Hemil Shah (Founder, eSphere Security)

CAPACITY: 20 pax

SEATS LEFT: REGISTRATION CLOSED

DURATION: 1 day (21st May 2012)

COST (per pax): EUR699 (early bird) / EUR799 (non early-bird)

 

OVERVIEW

Mobile application hacking and its security is becoming a major concern in today’s world. In last few years we have seen range of new attack vectors and method of exploitation for these devices. Smart phones and tablets running on iPhone, Android, Windows and Blackberry have taken over the market in frenzy. In today’s world email, social networking, banking everything is possible on the go with Smart phones and derived applications. These Smart phones are now equipped with features like data, Wi-Fi, voice and GPS functions and applications can leverage these features. The sudden growth in number of applications available for these smart phones does raise a certain level of concern for the user’s security and server supporting these applications.

Mobile applications are vulnerable to various set of different attacks like local storage, user data harvesting, activity spying, unauthorized event injection, UI Jacking, Tab Jacking, Traffic redirection, Logical attacks, hard coded keys and few other. At the same time Mobile applications are talking with server side over HTTP/HTTPS, it opens up few possible attacks on Web Services and APIs. The server side applications can be attacked with Injections. Several new technology stacks are evolving over Mobile like HTML5 and Silverlight which opens up new attack surface.  In this context it is imperative for IT professional and corporate application owners to understand these attack vectors along with mechanism for securing. The class features real life cases, live demos, code scanning and defense plans. The course is designed by the author of “Web Hacking: Attacks and Defense”, “Hacking Web Services” and “Web 2.0 Security – Defending Ajax, RIA and SOA” bringing his experience in application and mobile security and research as part of curriculum to address new challenges. Following topics will be covered during the class.

COURSE OUTLINE

Mobile Application Attack Surface and Threats

  • General trend of application and technology
  • Recent attack and exploits used over mobile
  • Evaluation of mobile applications
  • Trend in mobile application Security and Exploit Patterns
  • Mobile basic blocks – What, Why, How and Where
  • Mobile Top 10 Attack Vectors

iPhone Application Model and Hacks

  • Sand boxing
  • iPhone Application Architecture
  • OS Structure
  • Application Architecture and Distribution
  • iPhone Attacks Vectors
  • Exploit Scenario and Tools
  • Defense and Countermeasures

Android Application Model and Hacks

  • Sand boxing and Permission Model
  • Android Application Architecture
  • OS Structure and Layers
  • Application Architecture and Entry Points
  • Android Attacks Vectors
  • Exploit Scenario and Tools
  • Defense and Countermeasures
  • Comparing Android with other application frameworks like Blackberry and Windows
  • Attack Vectors for Windows and Blackberry Applications

Environment for Attack and Penetration Testing

  • Intercepting tools
  • Analysis tools
  • Monitoring tools
  • Configuring simulators to use proxy
  • Overcoming SSL traffic interception challenges
  • Reverse engineering tools

Mobile Application Attacks for All Platforms

  • Insecure storage
  • Insecure network Communication
  • Unauthorized dialing & event injections
  • UI Impersonation, ClickJacking and TabJAcking
  • Activity spying and data harvesting
  • OS level modification via stealth calls (rootkit, APN proxy config)
  • Sensitive information leakage
  • Hardcoded keychains and password
  • Language issues
  • Timely application update
  • Jail breaking/Physical device theft
  • Business logic/Logical flaws
  • KeyBoard cache/ClipBoard issue in iPhone
  • Reading information from SQLite database
  • Web/Browser Attacks
  • HTML5 and Silverlight Attacks

Reverse Engineering & Code Analysis

  • Reverse engineering iPhone application
  • Reverse engineering Android Application
  • Interesting things to look for after reverse engineering
  • Secure coding for Mobile Application
  • Static Code Analyzer for iOS
  • Static Code Analyzer for Android

Who Should Attend?

Penetration testers, web developers, Mobile application developers, QA, Application Architect, Security researchers and one who wants to learn mobile security.

Shreeraj Shah (Founder/Director, Blueinfy)

Shreeraj Shah, (B.E., MSCS, MBA, CSSLP) is the founder of Blueinfy, a company that provides application security services. Prior to founding Blueinfy, he was founder and board member at Net Square. He also worked with Foundstone (McAfee), Chase Manhattan Bank and IBM in security space. He is also the author of popular books like Web 2.0 Security, Hacking Web Services and Web Hacking: Attacks and Defense. In addition, he has published several advisories, tools, and whitepapers, and has presented at numerous conferences including RSA, AusCERT, InfosecWorld (Misti), HackInTheBox, Blackhat, OSCON, Bellua, Syscan, ISACA etc. His articles are regularly published on Securityfocus, InformIT, DevX, O’reilly, HNS. His work has been quoted on BBC, Dark Reading, Bank Technology as an expert.

Hemil Shah (Founder/Director of eSphere Security)

Hemil Shah, CISSP, CSSLP, ACP is the founder and Director of eSphere Security, companies that provide Professional services in Security Arena. He also worked with HBO, KPMG, IL&FS and Net-Square in security space. He has published several advisories, tools, and whitepapers, and has presented at numerous conferences. Hemil is expert in Mobile Application Security, Application Security, researching new methodologies and training designs. He has performed more than 1000 security consulting assignments in the area of penetration testing, code reviews, web application assessments, security architecture reviews and Mobile application security review.

Okura Hotel Amsterdam
Ferdinand Bolstraat 333, 1072 LH Amsterdam,
The Netherlands

1-Day Intensive Training Sessions – 21st of May / 0900 – 1800

 

SPECIAL OPS 1  - WIRELESS SECURITY KUNGF00

SPECIAL OPS 2  – THE ART OF EXPLOITING SQL INJECTION FLAWS

SPECIAL OPS 3 – MOBILE APPLICATION HACKING – ATTACK & DEFENSE



2-Day Hands on Training Sessions – 22nd – 23rd of May / 0900 – 1800

TECH TRAINING 1  – HUNTING WEB ATTACKERS

TECH TRAINING 2  – ADVANCED LINUX EXPLOITATION METHODS

TECH TRAINING 3  - ADVANCED APPLICATION HACKING – ATTACKS, EXPLOITS & DEFENSE

 

 



3-Day Hands on Training Sessions – 21st, 22nd & 23rd of May / 0900 – 1800

TECH TRAINING 4  – THE EXPLOIT LABORATORY: ADVANCED EDITION




QUAD TRACK CONFERENCE – 24th & 25th of May / 0900 – 1800

Featuring keynotes by BRUCE SCHNEIER and ANDY ELLIS



EVENT ORGANIZER

LOCAL PARTNER

PLATINUM SPONSORS

GOLD SPONSORS

TITANIUM SPONSOR (POST CONFERENCE RECEPTION + SPEAKER RECEPTION)

SILVER SPONSOR

HACKWEEKDAY SPONSOR

ALCO_PWN SPONSOR (POST CONFERENCE RECEPTION)

HITB LAB / SIGINT SPONSOR

NETWORK SPONSORS AND UPLINK

ADDITIONAL SUPPORT BY

SUPPORTING MEDIA

FRIENDS OF HITB

Copyright © 2012 Hack In The Box | http://www.hackinthebox.org

( / 10 )