SlideShare a Scribd company logo
The Real Incident of
     Stealing
a Droid App & Data

Akash Mahajan and Ankur Bhargava @ DroidCon Bangalore 2012
What we stole

   The Android Application Package File

      All the encrypted files found in the
                external storage

Š Akash Mahajan      DroidCon Bangalore 2012   2
Not only we successfully
                 the app + data we
                    it on another
          device which was rooted

Š Akash Mahajan   DroidCon Bangalore 2012   3
Them devs made it more secure?

   A device ID check was added

   We reversed the applications added our
   device ID and compiled it again.

   Able to execute again, yay!

Š Akash Mahajan   DroidCon Bangalore 2012   4
THE DROID JOB
A standard Chinese made Tablet
running Android 4.0 (Indian Brand)

The application contained encrypted
data along with other resources.

 Š Akash Mahajan       DroidCon Bangalore 2012   5
We had written
                  permission to
                      steal!

Š Akash Mahajan       DroidCon Bangalore 2012   6
All your data are belong to us


All the encrypted data was with us

We didn’t have the encryption key

But we had the device with the key in
internal storage

 Š Akash Mahajan   DroidCon Bangalore 2012   7
GONE IN 300 SECONDS

Android Backup API using Android Debug
Bridge because we had the package name.

ADB pull command, YAY!

> adb pull <remote> <local>

 Š Akash Mahajan         DroidCon Bangalore 2012   8
DISCLAIMER


                  It is not Rocket
                       Science

                  Simple common
                  security testing
Š Akash Mahajan       DroidCon Bangalore 2012   9
The Simple Hack

We knew find an exploit to root the device
might take some time and skill

Application written for the same version of
Android will run in all devices


 Š Akash Mahajan       DroidCon Bangalore 2012   10
If the device having the
              application can’t be
            rooted, let us take the
          application to the rooted
                    device.
Š Akash Mahajan   DroidCon Bangalore 2012   11
The Simple Hack

Once copied to the rooted device we could see
what the application was doing using DDMS.

Dalvik Debug Monitor Server provides among
other things process information about apps
running on a device connected in USB debug
mode.

 Š Akash Mahajan       DroidCon Bangalore 2012   12
The key to everything
In this particular case, the encryption key was
required to decrypt the data.

We didn’t have file permissions to reach the key.

We decided not to go after the key. We weren’t
being paid enough for that.

 Š Akash Mahajan          DroidCon Bangalore 2012   13
The Encryption Conundrum

If you give away your device, the only way you
can ensure safety of the data is by ensuring that
the symmetric encryption key isn’t stolen.

At any given point depending on the application
the key might be available in memory, temp
file/storage or on the chip itself.

 Š Akash Mahajan    DroidCon Bangalore 2012     14
The Encryption Conundrum

But because the device is with the thieves, they
have all the time in the world to find it.

If nothing works, they can always break open
the device and steal the key from the storage.



 Š Akash Mahajan   DroidCon Bangalore 2012         15
FREE CONSULTING /Checklist

Disable USB debugging port

Disable USB itself

Don’t give internet access in the device.

Obfuscate the source code.

Provide a unique key for each device.
Š Akash Mahajan      DroidCon Bangalore 2012   16
SUCCESS KIDZ

Client felt assured about their device security

Dev had a more secure solution

We get to pretend that we are Android security
experts. We are not, just love the challenge.


Š Akash Mahajan      DroidCon Bangalore 2012      17
WANTED
              DROID CHORS


                  @ankurbhargava87               @makash


Š Akash Mahajan            DroidCon Bangalore 2012         18

More Related Content

PPTX
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
WhiteSource
 
PDF
DevSecOps: A New Hope for Security in CI/CD
Franklin Mosley
 
PDF
Tackling the Container Iceberg:How to approach security when most of your sof...
WhiteSource
 
PDF
Scale DevSecOps with your Continuous Integration Pipeline
DevOps.com
 
PPTX
Google Glass - An Intro presentation to conduct code lab events.
getdinesh
 
PPTX
Defining DevSecOps
Uchit Vyas ☁
 
PDF
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
PDF
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon
 
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
WhiteSource
 
DevSecOps: A New Hope for Security in CI/CD
Franklin Mosley
 
Tackling the Container Iceberg:How to approach security when most of your sof...
WhiteSource
 
Scale DevSecOps with your Continuous Integration Pipeline
DevOps.com
 
Google Glass - An Intro presentation to conduct code lab events.
getdinesh
 
Defining DevSecOps
Uchit Vyas ☁
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon
 

What's hot (17)

PDF
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthinkspa
 
PDF
DevSecOps The Evolution of DevOps
Michael Man
 
PDF
Release Your Inner DevSecOp
James Wickett
 
PDF
Empowering Financial Institutions to Use Open Source With Confidence
WhiteSource
 
PDF
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
SecureSoftwareDevOn SecureSoftwareDevOn
 
PDF
The New Security Playbook: DevSecOps
James Wickett
 
PPTX
(Isc)² secure johannesburg
Tunde Ogunkoya
 
PPTX
Practical DevSecOps Using Security Instrumentation
VMware Tanzu
 
PDF
Maturing DevSecOps: From Easy to High Impact
SBWebinars
 
PDF
Meningkatkan SOC dan Reusabillity Kode dengan Duo DI - Sidiq Permana (CIO Nus...
DicodingEvent
 
PDF
10 Myth of DevSecOps
DevOps Indonesia
 
PDF
Innocent Vulnerabilities vs. Malicious Backdoors: How to Manage Your Risk
WhiteSource
 
PDF
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
James Wickett
 
PDF
DefCamp 2013 - Android hacking techniques
DefCamp
 
PDF
Security in the FaaS Lane
James Wickett
 
PPTX
DevSecOps Days SF at RSA Conference 2018
DevSecOps Days
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthinkspa
 
DevSecOps The Evolution of DevOps
Michael Man
 
Release Your Inner DevSecOp
James Wickett
 
Empowering Financial Institutions to Use Open Source With Confidence
WhiteSource
 
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
SecureSoftwareDevOn SecureSoftwareDevOn
 
The New Security Playbook: DevSecOps
James Wickett
 
(Isc)² secure johannesburg
Tunde Ogunkoya
 
Practical DevSecOps Using Security Instrumentation
VMware Tanzu
 
Maturing DevSecOps: From Easy to High Impact
SBWebinars
 
Meningkatkan SOC dan Reusabillity Kode dengan Duo DI - Sidiq Permana (CIO Nus...
DicodingEvent
 
10 Myth of DevSecOps
DevOps Indonesia
 
Innocent Vulnerabilities vs. Malicious Backdoors: How to Manage Your Risk
WhiteSource
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
James Wickett
 
DefCamp 2013 - Android hacking techniques
DefCamp
 
Security in the FaaS Lane
James Wickett
 
DevSecOps Days SF at RSA Conference 2018
DevSecOps Days
 
Ad

Similar to The real incident of stealing a droid app+data (20)

PPTX
Simulation and Tutorial M2 Insecure Data Storage by OWASP Mobile 2016
Rizal Aditya
 
PDF
Putting real feeling into Android Apps
Peter van der Linden
 
PDF
Android security and penetration testing | DIVA | Yogesh Ojha
Yogesh Ojha
 
PDF
Getting started with Android pentesting
Minali Arora
 
PDF
Securing Android Applications
Infosys
 
PPTX
Getting started with android
Vandana Verma
 
DOCX
Android_Studio_Structure.docx
KNANTHINIMCA
 
PDF
Building Custom Android Malware BruCON 2013
Stephan Chenette
 
PDF
MobSecCon 2015 - Dynamic Analysis of Android Apps
Ron Munitz
 
PPTX
From Reversing to Exploitation
Satria Ady Pradana
 
PDF
Securing User Data with SQLCipher
CommonsWare
 
PDF
YuryMakedonov_TesTrek2013_AndroidTesting_12u_slides
Yury M
 
PDF
Droidcon it-2014-marco-grassi-viaforensics
viaForensics
 
PPTX
Secure Android Apps- nVisium Security
Jack Mannino
 
PDF
Android installation & configuration, and create HelloWorld Project
Rakesh Jha
 
PDF
TDC2018SP | Trilha Mobile - Case VC+: Como tornar seguro um aplicativo mobile...
tdc-globalcode
 
PDF
Case VC+: Como tornar seguro um aplicativo mobile payment sem penalizar a exp...
MĂĄrcio Rosa
 
PDF
Android_Malware_IOAsis_2014_Analysis.pdf
jjb117343
 
PPTX
From Reversing to Exploitation: Android Application Security in Essence
Satria Ady Pradana
 
PDF
Android tio manual
iamkimberlybruno
 
Simulation and Tutorial M2 Insecure Data Storage by OWASP Mobile 2016
Rizal Aditya
 
Putting real feeling into Android Apps
Peter van der Linden
 
Android security and penetration testing | DIVA | Yogesh Ojha
Yogesh Ojha
 
Getting started with Android pentesting
Minali Arora
 
Securing Android Applications
Infosys
 
Getting started with android
Vandana Verma
 
Android_Studio_Structure.docx
KNANTHINIMCA
 
Building Custom Android Malware BruCON 2013
Stephan Chenette
 
MobSecCon 2015 - Dynamic Analysis of Android Apps
Ron Munitz
 
From Reversing to Exploitation
Satria Ady Pradana
 
Securing User Data with SQLCipher
CommonsWare
 
YuryMakedonov_TesTrek2013_AndroidTesting_12u_slides
Yury M
 
Droidcon it-2014-marco-grassi-viaforensics
viaForensics
 
Secure Android Apps- nVisium Security
Jack Mannino
 
Android installation & configuration, and create HelloWorld Project
Rakesh Jha
 
TDC2018SP | Trilha Mobile - Case VC+: Como tornar seguro um aplicativo mobile...
tdc-globalcode
 
Case VC+: Como tornar seguro um aplicativo mobile payment sem penalizar a exp...
MĂĄrcio Rosa
 
Android_Malware_IOAsis_2014_Analysis.pdf
jjb117343
 
From Reversing to Exploitation: Android Application Security in Essence
Satria Ady Pradana
 
Android tio manual
iamkimberlybruno
 
Ad

More from Akash Mahajan (17)

PDF
On Writing Well - A talk given at WinjaBlogs Session
Akash Mahajan
 
PDF
App sec in the time of docker containers
Akash Mahajan
 
PPTX
Venom vulnerability Overview and a basic demo
Akash Mahajan
 
PPTX
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
ODP
INCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-there
Akash Mahajan
 
PPTX
Believe It Or Not SSL Attacks
Akash Mahajan
 
PPTX
I haz your mouse clicks and key strokes
Akash Mahajan
 
PPTX
Hackers versus Developers and Secure Web Programming
Akash Mahajan
 
PPTX
Secure HTTP Headers c0c0n 2011 Akash Mahajan
Akash Mahajan
 
PPTX
Php security
Akash Mahajan
 
PPTX
Secure passwords-theory-and-practice
Akash Mahajan
 
PDF
Top 10 web application security risks akash mahajan
Akash Mahajan
 
PDF
Web application security
Akash Mahajan
 
PPTX
Web application security
Akash Mahajan
 
PPTX
Web application security
Akash Mahajan
 
PPTX
Secure Programming In Php
Akash Mahajan
 
PPT
Startups Security
Akash Mahajan
 
On Writing Well - A talk given at WinjaBlogs Session
Akash Mahajan
 
App sec in the time of docker containers
Akash Mahajan
 
Venom vulnerability Overview and a basic demo
Akash Mahajan
 
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
INCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-there
Akash Mahajan
 
Believe It Or Not SSL Attacks
Akash Mahajan
 
I haz your mouse clicks and key strokes
Akash Mahajan
 
Hackers versus Developers and Secure Web Programming
Akash Mahajan
 
Secure HTTP Headers c0c0n 2011 Akash Mahajan
Akash Mahajan
 
Php security
Akash Mahajan
 
Secure passwords-theory-and-practice
Akash Mahajan
 
Top 10 web application security risks akash mahajan
Akash Mahajan
 
Web application security
Akash Mahajan
 
Web application security
Akash Mahajan
 
Web application security
Akash Mahajan
 
Secure Programming In Php
Akash Mahajan
 
Startups Security
Akash Mahajan
 

Recently uploaded (20)

PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PDF
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CIFDAQ
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PPTX
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Make GenAI investments go further with the Dell AI Factory - Infographic
Principled Technologies
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
GYTPOL If You Give a Hacker a Host
linda296484
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
PDF
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
CIFDAQ
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Software Development Company | KodekX
KodekX
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CIFDAQ
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Make GenAI investments go further with the Dell AI Factory - Infographic
Principled Technologies
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
GYTPOL If You Give a Hacker a Host
linda296484
 
Software Development Methodologies in 2025
KodekX
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
CIFDAQ
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Software Development Company | KodekX
KodekX
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 

The real incident of stealing a droid app+data

  • 1. The Real Incident of Stealing a Droid App & Data Akash Mahajan and Ankur Bhargava @ DroidCon Bangalore 2012
  • 2. What we stole The Android Application Package File All the encrypted files found in the external storage Š Akash Mahajan DroidCon Bangalore 2012 2
  • 3. Not only we successfully the app + data we it on another device which was rooted Š Akash Mahajan DroidCon Bangalore 2012 3
  • 4. Them devs made it more secure? A device ID check was added We reversed the applications added our device ID and compiled it again. Able to execute again, yay! Š Akash Mahajan DroidCon Bangalore 2012 4
  • 5. THE DROID JOB A standard Chinese made Tablet running Android 4.0 (Indian Brand) The application contained encrypted data along with other resources. Š Akash Mahajan DroidCon Bangalore 2012 5
  • 6. We had written permission to steal! Š Akash Mahajan DroidCon Bangalore 2012 6
  • 7. All your data are belong to us All the encrypted data was with us We didn’t have the encryption key But we had the device with the key in internal storage Š Akash Mahajan DroidCon Bangalore 2012 7
  • 8. GONE IN 300 SECONDS Android Backup API using Android Debug Bridge because we had the package name. ADB pull command, YAY! > adb pull <remote> <local> Š Akash Mahajan DroidCon Bangalore 2012 8
  • 9. DISCLAIMER It is not Rocket Science Simple common security testing Š Akash Mahajan DroidCon Bangalore 2012 9
  • 10. The Simple Hack We knew find an exploit to root the device might take some time and skill Application written for the same version of Android will run in all devices Š Akash Mahajan DroidCon Bangalore 2012 10
  • 11. If the device having the application can’t be rooted, let us take the application to the rooted device. Š Akash Mahajan DroidCon Bangalore 2012 11
  • 12. The Simple Hack Once copied to the rooted device we could see what the application was doing using DDMS. Dalvik Debug Monitor Server provides among other things process information about apps running on a device connected in USB debug mode. Š Akash Mahajan DroidCon Bangalore 2012 12
  • 13. The key to everything In this particular case, the encryption key was required to decrypt the data. We didn’t have file permissions to reach the key. We decided not to go after the key. We weren’t being paid enough for that. Š Akash Mahajan DroidCon Bangalore 2012 13
  • 14. The Encryption Conundrum If you give away your device, the only way you can ensure safety of the data is by ensuring that the symmetric encryption key isn’t stolen. At any given point depending on the application the key might be available in memory, temp file/storage or on the chip itself. Š Akash Mahajan DroidCon Bangalore 2012 14
  • 15. The Encryption Conundrum But because the device is with the thieves, they have all the time in the world to find it. If nothing works, they can always break open the device and steal the key from the storage. Š Akash Mahajan DroidCon Bangalore 2012 15
  • 16. FREE CONSULTING /Checklist Disable USB debugging port Disable USB itself Don’t give internet access in the device. Obfuscate the source code. Provide a unique key for each device. Š Akash Mahajan DroidCon Bangalore 2012 16
  • 17. SUCCESS KIDZ Client felt assured about their device security Dev had a more secure solution We get to pretend that we are Android security experts. We are not, just love the challenge. Š Akash Mahajan DroidCon Bangalore 2012 17
  • 18. WANTED DROID CHORS @ankurbhargava87 @makash Š Akash Mahajan DroidCon Bangalore 2012 18