SlideShare a Scribd company logo
Security testing in mobile
applications
José Manuel Ortega Candel
About me
 Centers Technician at Everis
 Computer engineer by Alicante University
 Frontend and backend developer in Java/J2EE
 Speaker site with some presentations in
mobile and security
https://speakerdeck.com/jmortega
Index
Security Testing for Mobile Apps
Risk Management & Security Threads
Vulnerabilities & Mobile Security Risks
Testing Components Security & Tools
Security Test Plan & Best Practices
Security Testing for Mobile Apps
Security Testing for Mobile Apps
White Box Testing
Static Analysis Code
Black Box Testing
Dinamyc Analysis at
Runtime
Static Application Security Testing
Source code Review Reverse engineering
Lint for Android
Studio
Sonar Plugins for
mobile
http://www.sonarqube.org
Static Application Security Testing
Static Application Security Testing
https://github.com/SonarCommunity/sonar-android
Static Application Security Testing
http://sourceforge.net/projects/agnitiotool
You can decompile APKs and
search calls dangerous functions.
Reverse engineering on Android
APK Tool /Dex2jar/Java Decompiler
Static analysis on iOS
Xcode Development environment
Apple Developer Tools
‘otool’ command provided by XCode can be used to
get information from iOS application binaries and can
be used to support security analysis.
Static analysis on iOS
Detect memory leaks with XCode
Clang Static Analyzer
http://clang-analyzer.llvm.org
Flawfinder(Security weakness in C/C++)
http://www.dwheeler.com/flawfinder
Dynamic Application Security Testing
Analyze Network
Traffic at runtime
Analyze Remote
Services
DroidBox for Android
Instruments for iOS
Discovering logical
vulnerabilities
Dynamic Application Security Testing
 https://code.google.com/p/droidbox
Monitoring Actions
 Information leaks Network IO and File IO
 Cryptography operations SMS and Phone calls
Dynamic Application Security Testing
Instruments for iOS applications
File Activity Monitoring
Memory Monitoring Process Monitoring
Network Monitoring
Application Security Analyser
python androwarn.py -i my_apk.apk -r html -v 3
Telephony identifiers exfiltration: IMEI, IMSI, MCC, MNC, LAC, CID, operator's
name...
Device settings exfiltration: software version, usage statistics, system settings, logs...
Geolocation information leakage: GPS/WiFi geolocation... Connection interfaces
information exfiltration: WiFi credentials, Bluetooth MAC adress...
Telephony services abuse: premium SMS sending, phone call composition...
Audio/video flow interception: call recording, video capture... Remote connection
establishment: socket open call, Bluetooth pairing, APN settings edit...
PIM data leakage: contacts, calendar, SMS, mails...
External memory operations: file access on SD card...
PIM data modification: add/delete contacts, calendar events... Arbitrary code
execution: native code using JNI, UNIX command, privilege escalation...
Denial of Service: event notification deactivation, file deletion, process killing, virtual
keyboard disable, terminal shutdown/reboot...
Risk Management
Intelligence
Gathering
Threat model
Vulnerabilities
OWASP
Security risks
Security
threads
Intelligence Gathering
Environmental
Analysis
Architectural
Analysis
Analyze internal
processes and structures
App [network interfaces, used
data, communication with other
resources, session management]
Runtime environment [MDM,
jailbreak/rooting, OS version]
Backend services [application
server, databases]
Intelligence Gathering
What type of device is it?
Determine Operating System version
Is the device already rooted?
Is the device passcode enabled?
What key applications are installed?
Is the device connected to network?
Thread model in Mobile applications
Functional Security threads
Authentication
Session
Management
Access Control
Input Validation
Cryptography
Error Handling and
Logging
Data Protection
Communication
Security
Security issues
Malicious Applications
– Rooting Exploits
– SMS Fraud
– Rapid Malware Production
Dynamic Analysis
– Sandbox
– Real-time Monitoring
– Mobile Specific Features
Static Analysis
– Permissions
– Data Flow
– Control Flow
Browser Attacks
– Phishing
– Click Through
Mobile Botnets
– Epidemic Spread
– Attacking Network Services
– Tracking Uninfected Devices
User Education
– Ignoring Permissions
– Phishing
– Improperly Rooting Devices
– Alternative Markets
Vulnerabilities
Third party
libraries
Components
WebView
[JavaScript+Cache]
SQLite DataBase
Multiplaftorm
libraries for hybrid apps
Shared Preferences
Vulnerabilities
1. Activity monitoring and
data retrieval
2. Unauthorized dialing,
SMS, and payments
3. Unauthorized network
connectivity (exfiltration or
command & control)
4. UI Impersonation
5. System modification
(rootkit, APN proxy config)
6. Logic or Time bomb
7. Sensitive data leakage
(inadvertent or side
channel)
8. Unsafe sensitive data
storage
9. Unsafe sensitive data
transmission
10. Hardcoded
password/keys
Vulnerabilities Analysis
Static methods
Dynamic
methods
Automatic and manual
source code analysis
Reverse Engineering
Forensic
methods
Network monitoring and
trafic analyzing
Runtime analysis
Log analysis
File permission analysis
File content analysis
Dynamic methods tools
Network monitoring and
traffic analyzing
Runtime analysis
Wireshark, BurpSuite
GNU debugger,
Snoop-it, Cycript
Mercury, Intent Sniffer,
Intent Fuzzer
File analysis androidAuditTools
Testing vulnerabilities
Data flow
Data Storage
Data leakage
Authentication
Authorization
Server-side
OWASP Mobile Security Risks
Insecure Data
Storage
Transport Layer
Protection,
HTTP/SSL
Authorization and
Authentication
Cryptography /
Encrypting data
Session handling
Weak Server Side
Controls in backend
services
Sensitive information
[passwords,API
keys,code ofuscation]
Data Leakage [cache,
logging, temp
directories]
Testing components security
Content Providers Data Storage
WebViewServices
NetWork Connections
[HTTP / SSL]
Certificates
Data Encryption
SQLite
Shared Preferences
File storage
HTTPS and SSL can protect against Man in the Middle
attacks and prevent casual snooping
Data Storage
Encrypt data
Never store user credentials
Tools like SQLCipher for storing
database in applications
No global permissions granted to
applications, using the principle of
"least privilege".
Secure Storage on Android
The access permission of the created file was set to
WORLD_READABLE / WORLD_WRITABLE
Other app could read /write the file if the file path is known.
Application data (private files) should be created
with the access permission MODE_PRIVATE
FileOutputStream fos = openFileOutput(“MyFile",
Context.MODE_PRIVATE);
fos.write(“contenido”.getBytes());
fos.close();
Insecure Data on Android
Look for file open operations using
Context.MODE_WORLD_READABLE
(translates to “1”)
Secure Storage on iOS
NSFileManager class
NSFileProtectionKey attribute
 NSFileProtectionNone – Always accessible
 NSFileProtectionComplete – Encrypted on disk
when device is locked or booting
[[NSFileManager defaultManager] createFileAtPath:[self
filePath]
contents:[@"super secret file contents“
dataUsingEncoding:NSUTF8StringEncoding]
attributes:[NSDictionary
dictionaryWithObject:NSFileProtectionComplete
forKey:NSFileProtectionKey]];
DataBase Storage
Support iOS / Android
https://www.zetetic.net/sqlcipher/open-source
256-bit AES Encrypt SQLite database
Secure Preferences on Android
https://github.com/scottyab/secure-preferences
3rd-party extensions
Secure Shared Preferences
Cryptography
Android and iOS implement standard crypto libraries such as AES
algorithm
try{
PBEKeySpec keySpec = new PBEKeySpec(password.toCharArray(), salt,
PBE_ITERATION_COUNT, 256);
SecretKeyFactory keyFactory = SecretKeyFactory.getInstance(PBE_ALGORITHM);
SecretKey tmp = keyFactory.generateSecret(keySpec);
// Encrypt
SecretKey secret = new SecretKeySpec(tmp.getEncoded(), "AES");
Cipher encryptionCipher = Cipher.getInstance(CIPHER_ALGORITHM);
IvParameterSpec ivspec = new IvParameterSpec(initVector);
encryptionCipher.init(Cipher.ENCRYPT_MODE, secret, ivspec);
encryptedText = encryptionCipher.doFinal(cleartext.getBytes());
// Encode encrypted bytes to Base64 text to save in text file
result = Base64.encodeToString(encryptedText, Base64.DEFAULT);
} catch (Exception e) {
e.printStackTrace()
}
Android provides the javax.crypto.spec.PBEKeySpec
and javax.crypto.SecretKeyFactory classes to facilitate
the generation of the password-based encryption key.
Avoid Data Leackage on Android
public static final boolean SHOW_LOG =
BuildConfig.DEBUG;
public static void d(final String tag, final String msg) {
if (SHOW_LOG)
Log.d(tag, msg);
}
Don't expose data through logcat on production
-assumenosideeffects class android.util.Log
{
public static *** d(...);
public static *** v(...);
public static *** i(...);
public static *** e(...);
}
Proguard configuration
Permissions in mobile apps
AndroidManifest.xml on Android
 Try to minimize permissions
<manifest package="com.example.android" …>
<uses-permission android:name=“android.permission.
ACCESS_FINE_LOCATION"/>
<uses-permission
android:name="android.permission.INTERNET" />
<uses-permission
android:name="android.permission.READ_CONTACTS" />
…
</manifest>
Permissions in mobile apps
info.plist on iOS
Vulnerability scanner on Android
Vulnerability scanner on Android
Vulnerability scanner on Android
Tools / Santoku Linux
Security test plan
Test cases Example
Test Title /level Encryption /critical
Test
Description
When connections are used encryption
is used for sending / receiving sensitive
data.
Details and
tools
All sensitive information (personal data,
credit card & banking information etc.)
must be encrypted during transmission
over any network or communication
link.
Expected
result
It has been declared that the
Application uses encryption when
communicating sensitive data.
Security test plan
Test cases Example
Test Title /level Passwords /critical
Test
Description
Passwords and sensitive data are not
stored in the device and not echoed
when entered into the App, sensitive
data is always protected by password.
Details and
tools
The objective of the test is to minimize
the risk of access to sensitive
information should the device be lost,
by ensuring that no authentication data
can be re-used by simply re-opening
the application
Security test plan
Test cases Example
Test Title /level Passwords /critical
Expected
result
1. Entering a password or other
sensitive data will not leave it in
clear text if completion of the fields
is interrupted but not exited.
2. Passwords, credit card details, or
other sensitive data do not remain
in clear text in the fields where they
were previously entered, when the
application is reentered.
3. Sensitive personal data should
always need entry of a password
before it can be accessed.
Best Practices
Integrate security in Continuous
Integration (CI) process
Apply encryption /decryption techniques
used for sensitive data communication
Detect areas in tested application that have
more risks to detect vulnerabilities
Install an automated security vulnerability
scanner, integrated with your continuous
integration tool
Security testing in mobile applications
Attacker vs Defenders
Defenders Attackers
Often have limited time to
put defences in place
Can take time to plan their
attack
Have limited opportunities
to improve their defences
Can invent new ways to
attack
Need to defend against a
range of possible attacks
Need only pick the most
effective one
Need to defend all entry
points
Can choose where to
attack
Has limited resources to
defend
Can be multiple attackers
References
https://www.owasp.org/index.php/OWASP_Mobile_Security_
Project
http://developer.android.com/training/articles/security-
tips.html
OWASP Mobile Security Project
Android Security Best Practices
References
https://github.com/secmobi/wiki.secmobi.com
Tools
IOS Application Security Testing
https://www.owasp.org/index.php/IOS_Application_Security_
Testing_Cheat_Sheet
Books
Thank You,
Questions?
Ad

More Related Content

What's hot (20)

50 Shades of Sigma
50 Shades of Sigma50 Shades of Sigma
50 Shades of Sigma
Florian Roth
 
Getting started with Android pentesting
Getting started with Android pentestingGetting started with Android pentesting
Getting started with Android pentesting
Minali Arora
 
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
Lenur Dzhemiliev
 
Nessus Software
Nessus SoftwareNessus Software
Nessus Software
Megha Sahu
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
Marco Morana
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
Marco Morana
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
Scott Sutherland
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
abhimanyubhogwan
 
Aircrack
AircrackAircrack
Aircrack
MuhammadHanzalah6
 
Sigma and YARA Rules
Sigma and YARA RulesSigma and YARA Rules
Sigma and YARA Rules
Lionel Faleiro
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Sam Bowne
 
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, TripwireMITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE - ATT&CKcon
 
OAuth 2.0
OAuth 2.0OAuth 2.0
OAuth 2.0
Uwe Friedrichsen
 
OWASP Top 10 for Mobile
OWASP Top 10 for MobileOWASP Top 10 for Mobile
OWASP Top 10 for Mobile
Appvigil - Mobile App Security Scanner
 
API Security Best Practices and Guidelines
API Security Best Practices and GuidelinesAPI Security Best Practices and Guidelines
API Security Best Practices and Guidelines
WSO2
 
CSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoatCSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoat
Surachai Chatchalermpun
 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API WorldOWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World
42Crunch
 
security misconfigurations
security misconfigurationssecurity misconfigurations
security misconfigurations
Megha Sahu
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0
Mika Koivisto
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
50 Shades of Sigma
50 Shades of Sigma50 Shades of Sigma
50 Shades of Sigma
Florian Roth
 
Getting started with Android pentesting
Getting started with Android pentestingGetting started with Android pentesting
Getting started with Android pentesting
Minali Arora
 
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
Lenur Dzhemiliev
 
Nessus Software
Nessus SoftwareNessus Software
Nessus Software
Megha Sahu
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
Marco Morana
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
Marco Morana
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
Scott Sutherland
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
abhimanyubhogwan
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Sam Bowne
 
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, TripwireMITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE - ATT&CKcon
 
API Security Best Practices and Guidelines
API Security Best Practices and GuidelinesAPI Security Best Practices and Guidelines
API Security Best Practices and Guidelines
WSO2
 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API WorldOWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World
42Crunch
 
security misconfigurations
security misconfigurationssecurity misconfigurations
security misconfigurations
Megha Sahu
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0
Mika Koivisto
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 

Viewers also liked (10)

Bridging the gap - Security and Software Testing
Bridging the gap - Security and Software TestingBridging the gap - Security and Software Testing
Bridging the gap - Security and Software Testing
Roberto Suggi Liverani
 
Rajasekar R_resume_Mobile Testing
Rajasekar R_resume_Mobile TestingRajasekar R_resume_Mobile Testing
Rajasekar R_resume_Mobile Testing
Rajasekar Dpi
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
Denim Group
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Xavier Mertens
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration Testing
Subho Halder
 
Hijack rat android malware
Hijack rat android malwareHijack rat android malware
Hijack rat android malware
Hamid Shekarforoush
 
Mobile application testing
Mobile application testingMobile application testing
Mobile application testing
Softheme
 
Manoj resume
Manoj resumeManoj resume
Manoj resume
tekwissen
 
Niyati_Manual_Testing_ISTQB_Certified_Resume
Niyati_Manual_Testing_ISTQB_Certified_ResumeNiyati_Manual_Testing_ISTQB_Certified_Resume
Niyati_Manual_Testing_ISTQB_Certified_Resume
Niyati Madad
 
How to implement a simple dalvik virtual machine
How to implement a simple dalvik virtual machineHow to implement a simple dalvik virtual machine
How to implement a simple dalvik virtual machine
Chun-Yu Wang
 
Bridging the gap - Security and Software Testing
Bridging the gap - Security and Software TestingBridging the gap - Security and Software Testing
Bridging the gap - Security and Software Testing
Roberto Suggi Liverani
 
Rajasekar R_resume_Mobile Testing
Rajasekar R_resume_Mobile TestingRajasekar R_resume_Mobile Testing
Rajasekar R_resume_Mobile Testing
Rajasekar Dpi
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
Denim Group
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration Testing
Subho Halder
 
Mobile application testing
Mobile application testingMobile application testing
Mobile application testing
Softheme
 
Manoj resume
Manoj resumeManoj resume
Manoj resume
tekwissen
 
Niyati_Manual_Testing_ISTQB_Certified_Resume
Niyati_Manual_Testing_ISTQB_Certified_ResumeNiyati_Manual_Testing_ISTQB_Certified_Resume
Niyati_Manual_Testing_ISTQB_Certified_Resume
Niyati Madad
 
How to implement a simple dalvik virtual machine
How to implement a simple dalvik virtual machineHow to implement a simple dalvik virtual machine
How to implement a simple dalvik virtual machine
Chun-Yu Wang
 
Ad

Similar to Security testing in mobile applications (20)

6.3. How to get out of an inprivacy jail
6.3. How to get out of an inprivacy jail6.3. How to get out of an inprivacy jail
6.3. How to get out of an inprivacy jail
defconmoscow
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
Abdelhamid Limami
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]
Prathan Phongthiproek
 
[CONFidence 2016] Jacek Grymuza - From a life of SOC Analyst
[CONFidence 2016] Jacek Grymuza - From a life of SOC Analyst [CONFidence 2016] Jacek Grymuza - From a life of SOC Analyst
[CONFidence 2016] Jacek Grymuza - From a life of SOC Analyst
PROIDEA
 
Building your macOS Baseline Requirements MacadUK 2018
Building your macOS Baseline Requirements MacadUK 2018Building your macOS Baseline Requirements MacadUK 2018
Building your macOS Baseline Requirements MacadUK 2018
Henry Stamerjohann
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
Andrew Sispoidis
 
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
BeyondTrust
 
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
 DDD17 - Web Applications Automated Security Testing in a Continuous Delivery... DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
Fedir RYKHTIK
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
FernandoVizer
 
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
MrityunjayaHikkalgut1
 
wapt lab 6 - converted (2).pdfwaptLab09 tis lab is used for college lab exam
wapt lab 6 - converted (2).pdfwaptLab09 tis lab is used for college lab examwapt lab 6 - converted (2).pdfwaptLab09 tis lab is used for college lab exam
wapt lab 6 - converted (2).pdfwaptLab09 tis lab is used for college lab exam
imgautam076
 
Websecurity
Websecurity Websecurity
Websecurity
Merve Bilgen
 
Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plug
Kamal Rathaur
 
Android App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSecAndroid App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSec
DroidConTLV
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
Nawanan Theera-Ampornpunt
 
Super1
Super1Super1
Super1
neelakanteswarreddy
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
BeyondTrust
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOps
Ulf Mattsson
 
Sumo Logic Cert Jam - Security Analytics
Sumo Logic Cert Jam - Security AnalyticsSumo Logic Cert Jam - Security Analytics
Sumo Logic Cert Jam - Security Analytics
Sumo Logic
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
Daniel Owens
 
6.3. How to get out of an inprivacy jail
6.3. How to get out of an inprivacy jail6.3. How to get out of an inprivacy jail
6.3. How to get out of an inprivacy jail
defconmoscow
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]
Prathan Phongthiproek
 
[CONFidence 2016] Jacek Grymuza - From a life of SOC Analyst
[CONFidence 2016] Jacek Grymuza - From a life of SOC Analyst [CONFidence 2016] Jacek Grymuza - From a life of SOC Analyst
[CONFidence 2016] Jacek Grymuza - From a life of SOC Analyst
PROIDEA
 
Building your macOS Baseline Requirements MacadUK 2018
Building your macOS Baseline Requirements MacadUK 2018Building your macOS Baseline Requirements MacadUK 2018
Building your macOS Baseline Requirements MacadUK 2018
Henry Stamerjohann
 
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
BeyondTrust
 
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
 DDD17 - Web Applications Automated Security Testing in a Continuous Delivery... DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
Fedir RYKHTIK
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
FernandoVizer
 
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
MrityunjayaHikkalgut1
 
wapt lab 6 - converted (2).pdfwaptLab09 tis lab is used for college lab exam
wapt lab 6 - converted (2).pdfwaptLab09 tis lab is used for college lab examwapt lab 6 - converted (2).pdfwaptLab09 tis lab is used for college lab exam
wapt lab 6 - converted (2).pdfwaptLab09 tis lab is used for college lab exam
imgautam076
 
Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plug
Kamal Rathaur
 
Android App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSecAndroid App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSec
DroidConTLV
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
BeyondTrust
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOps
Ulf Mattsson
 
Sumo Logic Cert Jam - Security Analytics
Sumo Logic Cert Jam - Security AnalyticsSumo Logic Cert Jam - Security Analytics
Sumo Logic Cert Jam - Security Analytics
Sumo Logic
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
Daniel Owens
 
Ad

More from Jose Manuel Ortega Candel (20)

Seguridad y auditorías en Modelos grandes del lenguaje (LLM).pdf
Seguridad y auditorías en Modelos grandes del lenguaje (LLM).pdfSeguridad y auditorías en Modelos grandes del lenguaje (LLM).pdf
Seguridad y auditorías en Modelos grandes del lenguaje (LLM).pdf
Jose Manuel Ortega Candel
 
Beyond the hype: The reality of AI security.pdf
Beyond the hype: The reality of AI security.pdfBeyond the hype: The reality of AI security.pdf
Beyond the hype: The reality of AI security.pdf
Jose Manuel Ortega Candel
 
Seguridad de APIs en Drupal_ herramientas, mejores prácticas y estrategias pa...
Seguridad de APIs en Drupal_ herramientas, mejores prácticas y estrategias pa...Seguridad de APIs en Drupal_ herramientas, mejores prácticas y estrategias pa...
Seguridad de APIs en Drupal_ herramientas, mejores prácticas y estrategias pa...
Jose Manuel Ortega Candel
 
Security and auditing tools in Large Language Models (LLM).pdf
Security and auditing tools in Large Language Models (LLM).pdfSecurity and auditing tools in Large Language Models (LLM).pdf
Security and auditing tools in Large Language Models (LLM).pdf
Jose Manuel Ortega Candel
 
Herramientas de benchmarks para evaluar el rendimiento en máquinas y aplicaci...
Herramientas de benchmarks para evaluar el rendimiento en máquinas y aplicaci...Herramientas de benchmarks para evaluar el rendimiento en máquinas y aplicaci...
Herramientas de benchmarks para evaluar el rendimiento en máquinas y aplicaci...
Jose Manuel Ortega Candel
 
Asegurando tus APIs Explorando el OWASP Top 10 de Seguridad en APIs.pdf
Asegurando tus APIs Explorando el OWASP Top 10 de Seguridad en APIs.pdfAsegurando tus APIs Explorando el OWASP Top 10 de Seguridad en APIs.pdf
Asegurando tus APIs Explorando el OWASP Top 10 de Seguridad en APIs.pdf
Jose Manuel Ortega Candel
 
PyGoat Analizando la seguridad en aplicaciones Django.pdf
PyGoat Analizando la seguridad en aplicaciones Django.pdfPyGoat Analizando la seguridad en aplicaciones Django.pdf
PyGoat Analizando la seguridad en aplicaciones Django.pdf
Jose Manuel Ortega Candel
 
Ciberseguridad en Blockchain y Smart Contracts: Explorando los Desafíos y Sol...
Ciberseguridad en Blockchain y Smart Contracts: Explorando los Desafíos y Sol...Ciberseguridad en Blockchain y Smart Contracts: Explorando los Desafíos y Sol...
Ciberseguridad en Blockchain y Smart Contracts: Explorando los Desafíos y Sol...
Jose Manuel Ortega Candel
 
Evolution of security strategies in K8s environments- All day devops
Evolution of security strategies in K8s environments- All day devops Evolution of security strategies in K8s environments- All day devops
Evolution of security strategies in K8s environments- All day devops
Jose Manuel Ortega Candel
 
Evolution of security strategies in K8s environments.pdf
Evolution of security strategies in K8s environments.pdfEvolution of security strategies in K8s environments.pdf
Evolution of security strategies in K8s environments.pdf
Jose Manuel Ortega Candel
 
Implementing Observability for Kubernetes.pdf
Implementing Observability for Kubernetes.pdfImplementing Observability for Kubernetes.pdf
Implementing Observability for Kubernetes.pdf
Jose Manuel Ortega Candel
 
Computación distribuida usando Python
Computación distribuida usando PythonComputación distribuida usando Python
Computación distribuida usando Python
Jose Manuel Ortega Candel
 
Seguridad en arquitecturas serverless y entornos cloud
Seguridad en arquitecturas serverless y entornos cloudSeguridad en arquitecturas serverless y entornos cloud
Seguridad en arquitecturas serverless y entornos cloud
Jose Manuel Ortega Candel
 
Construyendo arquitecturas zero trust sobre entornos cloud
Construyendo arquitecturas zero trust sobre entornos cloud Construyendo arquitecturas zero trust sobre entornos cloud
Construyendo arquitecturas zero trust sobre entornos cloud
Jose Manuel Ortega Candel
 
Tips and tricks for data science projects with Python
Tips and tricks for data science projects with Python Tips and tricks for data science projects with Python
Tips and tricks for data science projects with Python
Jose Manuel Ortega Candel
 
Sharing secret keys in Docker containers and K8s
Sharing secret keys in Docker containers and K8sSharing secret keys in Docker containers and K8s
Sharing secret keys in Docker containers and K8s
Jose Manuel Ortega Candel
 
Implementing cert-manager in K8s
Implementing cert-manager in K8sImplementing cert-manager in K8s
Implementing cert-manager in K8s
Jose Manuel Ortega Candel
 
Python para equipos de ciberseguridad(pycones)
Python para equipos de ciberseguridad(pycones)Python para equipos de ciberseguridad(pycones)
Python para equipos de ciberseguridad(pycones)
Jose Manuel Ortega Candel
 
Python para equipos de ciberseguridad
Python para equipos de ciberseguridad Python para equipos de ciberseguridad
Python para equipos de ciberseguridad
Jose Manuel Ortega Candel
 
Shodan Tips and tricks. Automatiza y maximiza las búsquedas shodan
Shodan Tips and tricks. Automatiza y maximiza las búsquedas shodanShodan Tips and tricks. Automatiza y maximiza las búsquedas shodan
Shodan Tips and tricks. Automatiza y maximiza las búsquedas shodan
Jose Manuel Ortega Candel
 
Seguridad y auditorías en Modelos grandes del lenguaje (LLM).pdf
Seguridad y auditorías en Modelos grandes del lenguaje (LLM).pdfSeguridad y auditorías en Modelos grandes del lenguaje (LLM).pdf
Seguridad y auditorías en Modelos grandes del lenguaje (LLM).pdf
Jose Manuel Ortega Candel
 
Beyond the hype: The reality of AI security.pdf
Beyond the hype: The reality of AI security.pdfBeyond the hype: The reality of AI security.pdf
Beyond the hype: The reality of AI security.pdf
Jose Manuel Ortega Candel
 
Seguridad de APIs en Drupal_ herramientas, mejores prácticas y estrategias pa...
Seguridad de APIs en Drupal_ herramientas, mejores prácticas y estrategias pa...Seguridad de APIs en Drupal_ herramientas, mejores prácticas y estrategias pa...
Seguridad de APIs en Drupal_ herramientas, mejores prácticas y estrategias pa...
Jose Manuel Ortega Candel
 
Security and auditing tools in Large Language Models (LLM).pdf
Security and auditing tools in Large Language Models (LLM).pdfSecurity and auditing tools in Large Language Models (LLM).pdf
Security and auditing tools in Large Language Models (LLM).pdf
Jose Manuel Ortega Candel
 
Herramientas de benchmarks para evaluar el rendimiento en máquinas y aplicaci...
Herramientas de benchmarks para evaluar el rendimiento en máquinas y aplicaci...Herramientas de benchmarks para evaluar el rendimiento en máquinas y aplicaci...
Herramientas de benchmarks para evaluar el rendimiento en máquinas y aplicaci...
Jose Manuel Ortega Candel
 
Asegurando tus APIs Explorando el OWASP Top 10 de Seguridad en APIs.pdf
Asegurando tus APIs Explorando el OWASP Top 10 de Seguridad en APIs.pdfAsegurando tus APIs Explorando el OWASP Top 10 de Seguridad en APIs.pdf
Asegurando tus APIs Explorando el OWASP Top 10 de Seguridad en APIs.pdf
Jose Manuel Ortega Candel
 
PyGoat Analizando la seguridad en aplicaciones Django.pdf
PyGoat Analizando la seguridad en aplicaciones Django.pdfPyGoat Analizando la seguridad en aplicaciones Django.pdf
PyGoat Analizando la seguridad en aplicaciones Django.pdf
Jose Manuel Ortega Candel
 
Ciberseguridad en Blockchain y Smart Contracts: Explorando los Desafíos y Sol...
Ciberseguridad en Blockchain y Smart Contracts: Explorando los Desafíos y Sol...Ciberseguridad en Blockchain y Smart Contracts: Explorando los Desafíos y Sol...
Ciberseguridad en Blockchain y Smart Contracts: Explorando los Desafíos y Sol...
Jose Manuel Ortega Candel
 
Evolution of security strategies in K8s environments- All day devops
Evolution of security strategies in K8s environments- All day devops Evolution of security strategies in K8s environments- All day devops
Evolution of security strategies in K8s environments- All day devops
Jose Manuel Ortega Candel
 
Evolution of security strategies in K8s environments.pdf
Evolution of security strategies in K8s environments.pdfEvolution of security strategies in K8s environments.pdf
Evolution of security strategies in K8s environments.pdf
Jose Manuel Ortega Candel
 
Implementing Observability for Kubernetes.pdf
Implementing Observability for Kubernetes.pdfImplementing Observability for Kubernetes.pdf
Implementing Observability for Kubernetes.pdf
Jose Manuel Ortega Candel
 
Seguridad en arquitecturas serverless y entornos cloud
Seguridad en arquitecturas serverless y entornos cloudSeguridad en arquitecturas serverless y entornos cloud
Seguridad en arquitecturas serverless y entornos cloud
Jose Manuel Ortega Candel
 
Construyendo arquitecturas zero trust sobre entornos cloud
Construyendo arquitecturas zero trust sobre entornos cloud Construyendo arquitecturas zero trust sobre entornos cloud
Construyendo arquitecturas zero trust sobre entornos cloud
Jose Manuel Ortega Candel
 
Tips and tricks for data science projects with Python
Tips and tricks for data science projects with Python Tips and tricks for data science projects with Python
Tips and tricks for data science projects with Python
Jose Manuel Ortega Candel
 
Sharing secret keys in Docker containers and K8s
Sharing secret keys in Docker containers and K8sSharing secret keys in Docker containers and K8s
Sharing secret keys in Docker containers and K8s
Jose Manuel Ortega Candel
 
Python para equipos de ciberseguridad(pycones)
Python para equipos de ciberseguridad(pycones)Python para equipos de ciberseguridad(pycones)
Python para equipos de ciberseguridad(pycones)
Jose Manuel Ortega Candel
 
Shodan Tips and tricks. Automatiza y maximiza las búsquedas shodan
Shodan Tips and tricks. Automatiza y maximiza las búsquedas shodanShodan Tips and tricks. Automatiza y maximiza las búsquedas shodan
Shodan Tips and tricks. Automatiza y maximiza las búsquedas shodan
Jose Manuel Ortega Candel
 

Recently uploaded (20)

LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRYLEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
NidaFarooq10
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)
sh607827
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
Kubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptxKubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptx
CloudScouts
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
FL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full VersionFL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full Version
tahirabibi60507
 
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
F-Secure Freedome VPN 2025 Crack Plus Activation  New VersionF-Secure Freedome VPN 2025 Crack Plus Activation  New Version
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
saimabibi60507
 
Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)
Allon Mureinik
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
Egor Kaleynik
 
Revolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptxRevolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptx
nidhisingh691197
 
Maxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINKMaxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINK
younisnoman75
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRYLEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
NidaFarooq10
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)
sh607827
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
Kubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptxKubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptx
CloudScouts
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
FL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full VersionFL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full Version
tahirabibi60507
 
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
F-Secure Freedome VPN 2025 Crack Plus Activation  New VersionF-Secure Freedome VPN 2025 Crack Plus Activation  New Version
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
saimabibi60507
 
Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)
Allon Mureinik
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
Egor Kaleynik
 
Revolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptxRevolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptx
nidhisingh691197
 
Maxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINKMaxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINK
younisnoman75
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 

Security testing in mobile applications

  • 1. Security testing in mobile applications José Manuel Ortega Candel
  • 2. About me  Centers Technician at Everis  Computer engineer by Alicante University  Frontend and backend developer in Java/J2EE  Speaker site with some presentations in mobile and security https://speakerdeck.com/jmortega
  • 3. Index Security Testing for Mobile Apps Risk Management & Security Threads Vulnerabilities & Mobile Security Risks Testing Components Security & Tools Security Test Plan & Best Practices
  • 4. Security Testing for Mobile Apps
  • 5. Security Testing for Mobile Apps White Box Testing Static Analysis Code Black Box Testing Dinamyc Analysis at Runtime
  • 6. Static Application Security Testing Source code Review Reverse engineering Lint for Android Studio Sonar Plugins for mobile http://www.sonarqube.org
  • 8. Static Application Security Testing https://github.com/SonarCommunity/sonar-android
  • 9. Static Application Security Testing http://sourceforge.net/projects/agnitiotool You can decompile APKs and search calls dangerous functions.
  • 10. Reverse engineering on Android APK Tool /Dex2jar/Java Decompiler
  • 11. Static analysis on iOS Xcode Development environment Apple Developer Tools ‘otool’ command provided by XCode can be used to get information from iOS application binaries and can be used to support security analysis.
  • 12. Static analysis on iOS Detect memory leaks with XCode Clang Static Analyzer http://clang-analyzer.llvm.org Flawfinder(Security weakness in C/C++) http://www.dwheeler.com/flawfinder
  • 13. Dynamic Application Security Testing Analyze Network Traffic at runtime Analyze Remote Services DroidBox for Android Instruments for iOS Discovering logical vulnerabilities
  • 14. Dynamic Application Security Testing  https://code.google.com/p/droidbox Monitoring Actions  Information leaks Network IO and File IO  Cryptography operations SMS and Phone calls
  • 16. Instruments for iOS applications File Activity Monitoring Memory Monitoring Process Monitoring Network Monitoring
  • 17. Application Security Analyser python androwarn.py -i my_apk.apk -r html -v 3 Telephony identifiers exfiltration: IMEI, IMSI, MCC, MNC, LAC, CID, operator's name... Device settings exfiltration: software version, usage statistics, system settings, logs... Geolocation information leakage: GPS/WiFi geolocation... Connection interfaces information exfiltration: WiFi credentials, Bluetooth MAC adress... Telephony services abuse: premium SMS sending, phone call composition... Audio/video flow interception: call recording, video capture... Remote connection establishment: socket open call, Bluetooth pairing, APN settings edit... PIM data leakage: contacts, calendar, SMS, mails... External memory operations: file access on SD card... PIM data modification: add/delete contacts, calendar events... Arbitrary code execution: native code using JNI, UNIX command, privilege escalation... Denial of Service: event notification deactivation, file deletion, process killing, virtual keyboard disable, terminal shutdown/reboot...
  • 19. Intelligence Gathering Environmental Analysis Architectural Analysis Analyze internal processes and structures App [network interfaces, used data, communication with other resources, session management] Runtime environment [MDM, jailbreak/rooting, OS version] Backend services [application server, databases]
  • 20. Intelligence Gathering What type of device is it? Determine Operating System version Is the device already rooted? Is the device passcode enabled? What key applications are installed? Is the device connected to network?
  • 21. Thread model in Mobile applications
  • 22. Functional Security threads Authentication Session Management Access Control Input Validation Cryptography Error Handling and Logging Data Protection Communication Security
  • 23. Security issues Malicious Applications – Rooting Exploits – SMS Fraud – Rapid Malware Production Dynamic Analysis – Sandbox – Real-time Monitoring – Mobile Specific Features Static Analysis – Permissions – Data Flow – Control Flow Browser Attacks – Phishing – Click Through Mobile Botnets – Epidemic Spread – Attacking Network Services – Tracking Uninfected Devices User Education – Ignoring Permissions – Phishing – Improperly Rooting Devices – Alternative Markets
  • 25. Vulnerabilities 1. Activity monitoring and data retrieval 2. Unauthorized dialing, SMS, and payments 3. Unauthorized network connectivity (exfiltration or command & control) 4. UI Impersonation 5. System modification (rootkit, APN proxy config) 6. Logic or Time bomb 7. Sensitive data leakage (inadvertent or side channel) 8. Unsafe sensitive data storage 9. Unsafe sensitive data transmission 10. Hardcoded password/keys
  • 26. Vulnerabilities Analysis Static methods Dynamic methods Automatic and manual source code analysis Reverse Engineering Forensic methods Network monitoring and trafic analyzing Runtime analysis Log analysis File permission analysis File content analysis
  • 27. Dynamic methods tools Network monitoring and traffic analyzing Runtime analysis Wireshark, BurpSuite GNU debugger, Snoop-it, Cycript Mercury, Intent Sniffer, Intent Fuzzer File analysis androidAuditTools
  • 28. Testing vulnerabilities Data flow Data Storage Data leakage Authentication Authorization Server-side
  • 29. OWASP Mobile Security Risks Insecure Data Storage Transport Layer Protection, HTTP/SSL Authorization and Authentication Cryptography / Encrypting data Session handling Weak Server Side Controls in backend services Sensitive information [passwords,API keys,code ofuscation] Data Leakage [cache, logging, temp directories]
  • 30. Testing components security Content Providers Data Storage WebViewServices NetWork Connections [HTTP / SSL] Certificates Data Encryption SQLite Shared Preferences File storage
  • 31. HTTPS and SSL can protect against Man in the Middle attacks and prevent casual snooping
  • 32. Data Storage Encrypt data Never store user credentials Tools like SQLCipher for storing database in applications No global permissions granted to applications, using the principle of "least privilege".
  • 33. Secure Storage on Android The access permission of the created file was set to WORLD_READABLE / WORLD_WRITABLE Other app could read /write the file if the file path is known. Application data (private files) should be created with the access permission MODE_PRIVATE FileOutputStream fos = openFileOutput(“MyFile", Context.MODE_PRIVATE); fos.write(“contenido”.getBytes()); fos.close();
  • 34. Insecure Data on Android Look for file open operations using Context.MODE_WORLD_READABLE (translates to “1”)
  • 35. Secure Storage on iOS NSFileManager class NSFileProtectionKey attribute  NSFileProtectionNone – Always accessible  NSFileProtectionComplete – Encrypted on disk when device is locked or booting [[NSFileManager defaultManager] createFileAtPath:[self filePath] contents:[@"super secret file contents“ dataUsingEncoding:NSUTF8StringEncoding] attributes:[NSDictionary dictionaryWithObject:NSFileProtectionComplete forKey:NSFileProtectionKey]];
  • 36. DataBase Storage Support iOS / Android https://www.zetetic.net/sqlcipher/open-source 256-bit AES Encrypt SQLite database Secure Preferences on Android https://github.com/scottyab/secure-preferences 3rd-party extensions
  • 38. Cryptography Android and iOS implement standard crypto libraries such as AES algorithm try{ PBEKeySpec keySpec = new PBEKeySpec(password.toCharArray(), salt, PBE_ITERATION_COUNT, 256); SecretKeyFactory keyFactory = SecretKeyFactory.getInstance(PBE_ALGORITHM); SecretKey tmp = keyFactory.generateSecret(keySpec); // Encrypt SecretKey secret = new SecretKeySpec(tmp.getEncoded(), "AES"); Cipher encryptionCipher = Cipher.getInstance(CIPHER_ALGORITHM); IvParameterSpec ivspec = new IvParameterSpec(initVector); encryptionCipher.init(Cipher.ENCRYPT_MODE, secret, ivspec); encryptedText = encryptionCipher.doFinal(cleartext.getBytes()); // Encode encrypted bytes to Base64 text to save in text file result = Base64.encodeToString(encryptedText, Base64.DEFAULT); } catch (Exception e) { e.printStackTrace() } Android provides the javax.crypto.spec.PBEKeySpec and javax.crypto.SecretKeyFactory classes to facilitate the generation of the password-based encryption key.
  • 39. Avoid Data Leackage on Android public static final boolean SHOW_LOG = BuildConfig.DEBUG; public static void d(final String tag, final String msg) { if (SHOW_LOG) Log.d(tag, msg); } Don't expose data through logcat on production -assumenosideeffects class android.util.Log { public static *** d(...); public static *** v(...); public static *** i(...); public static *** e(...); } Proguard configuration
  • 40. Permissions in mobile apps AndroidManifest.xml on Android  Try to minimize permissions <manifest package="com.example.android" …> <uses-permission android:name=“android.permission. ACCESS_FINE_LOCATION"/> <uses-permission android:name="android.permission.INTERNET" /> <uses-permission android:name="android.permission.READ_CONTACTS" /> … </manifest>
  • 41. Permissions in mobile apps info.plist on iOS
  • 46. Security test plan Test cases Example Test Title /level Encryption /critical Test Description When connections are used encryption is used for sending / receiving sensitive data. Details and tools All sensitive information (personal data, credit card & banking information etc.) must be encrypted during transmission over any network or communication link. Expected result It has been declared that the Application uses encryption when communicating sensitive data.
  • 47. Security test plan Test cases Example Test Title /level Passwords /critical Test Description Passwords and sensitive data are not stored in the device and not echoed when entered into the App, sensitive data is always protected by password. Details and tools The objective of the test is to minimize the risk of access to sensitive information should the device be lost, by ensuring that no authentication data can be re-used by simply re-opening the application
  • 48. Security test plan Test cases Example Test Title /level Passwords /critical Expected result 1. Entering a password or other sensitive data will not leave it in clear text if completion of the fields is interrupted but not exited. 2. Passwords, credit card details, or other sensitive data do not remain in clear text in the fields where they were previously entered, when the application is reentered. 3. Sensitive personal data should always need entry of a password before it can be accessed.
  • 49. Best Practices Integrate security in Continuous Integration (CI) process Apply encryption /decryption techniques used for sensitive data communication Detect areas in tested application that have more risks to detect vulnerabilities Install an automated security vulnerability scanner, integrated with your continuous integration tool
  • 51. Attacker vs Defenders Defenders Attackers Often have limited time to put defences in place Can take time to plan their attack Have limited opportunities to improve their defences Can invent new ways to attack Need to defend against a range of possible attacks Need only pick the most effective one Need to defend all entry points Can choose where to attack Has limited resources to defend Can be multiple attackers
  • 53. References https://github.com/secmobi/wiki.secmobi.com Tools IOS Application Security Testing https://www.owasp.org/index.php/IOS_Application_Security_ Testing_Cheat_Sheet
  • 54. Books