[PDF] [PDF] Security Testing Guidelines for Mobile Apps - OWASP Foundation

The OWASP Foundation http://www owasp Security Testing Guidelines for mobile Apps Florian Stahl Johannes Ströher AppSec Research EU 2013 



Previous PDF Next PDF





[PDF] Mobile Application Security Testing - Deloitte

2019 Deloitte Touche Tohmatsu India LLP Our comprehensive mobile security testing approach will cover all the possible threats and attack vectors that affect



[PDF] Introduction to Mobile Security Testing - German OWASP Day

Mobile Automotive Security Testing – Security Testing OWASP Mobile Application Security Verification Standard OWASP Mobile Security Testing Gui de



[PDF] Penetration Testing of Android-based Smartphones - CORE

Android, an open source operating system, is rapidly increasing in the Smartphone industry It has already beaten the most popular mobile operating systems, like 



[PDF] SpiderLabs Mobile Application Penetration Testing - Trustwave

The Trustwave SpiderLabs Mobile Application Penetration Test service results in an in-depth test of the target mobile application (e g smartphone or tablet 



[PDF] MOBILE PENETRATION TESTING - Secure Apps

MOBILE PENETRATION TESTING what pentesting can do Developing applications for mobile devices has become an important market for programmers and 



[PDF] Security Testing Guidelines for Mobile Apps - OWASP Foundation

The OWASP Foundation http://www owasp Security Testing Guidelines for mobile Apps Florian Stahl Johannes Ströher AppSec Research EU 2013 



[PDF] MOBILE APPLICATION PENETRATION TESTING - 2WTech

Within the emulator, a pen tester can choose different User-Agents and test them in turn Native mobile apps Native mobile apps are apk (Android), ipa (iOS) or



Mobile security testing approaches and challenges - IEEE Xplore

apps on a mobile device In this paper, we present four testing approaches for mobile security: mobile forensic, penetration test, static analysis, and dynamic 



[PDF] MOBILE APPLICATION SECURITY AND PENETRATION TESTING

WILL I GET A CERTIFICATE? Once you pass the final exam, you will be awarded the eMAPT “eLearnSecurity Mobile Application Penetration Tester” certification

[PDF] mobile phone industry analysis 2018

[PDF] mobile phone industry analysis in pakistan

[PDF] mobile phone industry swot analysis

[PDF] mobile phone leasing market

[PDF] mobile phone market analysis

[PDF] mobile site speed test google

[PDF] mobile speed test think with google

[PDF] mobile system architecture research paper

[PDF] mobile test automation with appium nishant verma pdf

[PDF] mobile testing center

[PDF] mobile testing guide

[PDF] mobile testing process

[PDF] mobile testing with uft

[PDF] mobile website speed test google

[PDF] mobile website testing checklist

The OWASP Foundation

http://www.owasp.org

Security Testing Guidelines

for mobile Apps

Florian Stahl

AppSec Research EU 2013

Who we are

Florian Stahl

‡Lead Consultant for Information

Security, CISSP, CIPP/IT

‡Security & Privacy advocate

‡Works in Munich for msg

largest IT consulting and system development company

‡Florian.Stahl@msg-systems.com

‡Consultant for Information

Security

‡Expert for Mobile App Testing

‡Developed the Mobile Security

Thesis

‡Johannes.Stroeher@msg.de

AppSec Research EU 2013

2

Agenda

1.Motivation for Mobile Security Testing Guidelines

Current mobile threat landscape and current situation

Challenges

2.Mobile Security Testing Guide (MSTG)

Overview

Intelligence Gathering, Threat Modeling & Vulnerability Analysis in specific

Tools and examples

3.Summary

AppSec Research EU 2013 3

Mobile App Threat Landscape

Location-independent (mobile)

³$ORM\V RQOLQH´ MQG PUMŃHMNOH

Consumerization ± devices are built for personal use Focus on functionality and design rather than security

Raise of sensitive use cases for mobile apps

163% increase of mobile malware in 2012 *

³+LGGHQ´ NXVLQHVV ŃMVHV IRU IUHH MSSV

AppSec Research EU 2013

* Source: NQ Mobile Security Report 4

Situation Mobile Security Testing

Mobile apps have some specific characteristics

regarding penetration testing

Custom guidelines have not been available

msg systems decided to develop guidelines (MSTG) with Munich University of Applied Sciences

Similar guidelines published by OWASP:

OWASP Mobile Security Testing

AppSec Research EU 2013 5

Challenges

Identify differences to common penetration tests

Flexible Preconditions

App Security also depends on device security (jailbreak, different platforms, versions, interfaces, MDM, etc.) Different attackers (internal, external, network or device access, blackbox / whitebox, etc.)

Keep it flexible AND give specific hints to the

penetration tester Result: General process (mandatory) and supporting tools and practices (optional)

AppSec Research EU 2013 6

Mobile Security Testing Guide

Overview

AppSec Research EU 2013 7

Explanation:

Start

Preparation

End

Intelligence Gathering

Threat Modeling

Vulnerability Analysis

Vulnerability

Assessment

Develop

Countermeasures

Show Countermeasures?

Yes No

Mandatory

Optional

Annotation for

app specific sub-processes The specific sub-processes were elaborated in detail for Android and iOS

An iOS native CRM app is used for illustration

NHŃMXVH "

TOH F50 MSS VXSSRUPV PMQ\ PHVPMNOH IXQŃPLRQV MXPOHQPLŃMPLRQ " It is open source AE more possibilities to demonstrate static methods It is a native app AE provides more attack surface for the tester We can install the relating CRM service on an own server AE no need for taking care of impacts during the tests

The CRM App was tested on an iPhone 4 with iOS 6

AppSec Research EU 2013 8

Intelligence Gathering

Try to catch as much as possible information about the app

Consists of 2 analysis

Differences to conventional process

Focus mainly on the architectural/technical part

Not considering mobile specific requirements

AppSec Research EU 2013

Intelligence

Gathering

Environmental

Analysis

Architectural

Analysis

9

Intelligence Gathering

Environmental Analysis

Focus on the company behind the app and their business case and the relating stakeholders

Analyze internal processes and structures

Architectural Analysis

App (network interfaces, used data, communication with other ressources VHVVLRQ PMQMJHPHQP ÓMLONUHMNCURRPLQJ GHPHŃPLRQ " Runtime environment (MDM, jailbreak/rooting, os version) %MŃNHQG VHUYLŃHV MSSOLŃMPLRQ VHUYHU GMPMNMVHV ILUHRMOO "

AppSec Research EU 2013

10

Intelligence Gathering - Example

Examples for collected information from the

Architectural Analysis for the CRM app

App User session remains until the user logs off manually

No financial transactions are included

Runs on a jailbroken device AE no jailbreak detection Provides operations on server side CRM data for creating, reading, updating,

GHOHPLQJ ŃRQPMŃPV ŃMVHV ŃMOOV "

Runtime environment analysis is not relevant, because the app is running on a device from the tester

Backend services

Details about the version of the running CRM service

AppSec Research EU 2013 11

Threat Modeling

Identifying threats for the app - specific or

prepared threats (e. g. OWASP Top 10)

Should be done already in the development

Risk rating e. g. with OWASP Risk Rating

Developing countermeasures e. g. with

best practices or developers guides

Differences to conventional process

Most software testing processes do not include Threat

Modeling

Threat Modeling makes the complete process more

traceable and efficient for all participants

AppSec Research EU 2013

Start

Dividing and clustering

app

Identifying threats for

each component

Comparing all identified

threats

Rating all risks

Developing

countermeasures for identified risks

Defining test cases

End 12

Threat Modeling - Example

Threat Modeling process example for the CRM App

Information from the Intelligence Gathering

App provides operations on CRM data on server side

Specific threat

Unauthorized reading of CRM data on the network traffic while communicating with the CRM backend

Relating countermeasure

Implementing a secure transport layer protection (e. g. SSL, TLS)

Relating test case

Try to catch and read the network traffic between the CRM App and the backend

AppSec Research EU 2013 13

Vulnerability Analysis

Identifying vulnerabilities in the app with the

previous created test cases Executing test cases with techniques from 3 different categories

Differences to conventional process

Most software testing processes not include so many categories of testing methods

AppSec Research EU 2013

Vulnerability

Analysis

Static

methods

Dynamic

methods

Forensic

methods 14

Vulnerability Analysis

Static methods

Reverse Engineering

Automatic and manual source code analysis

Excursion: Tools for static methods

AppSec Research EU 2013

Reverse Engineering

Android: dex2jar, JD-GUI

iOS: otool, class-dump-z

Automatic and manual source code

analysis

Android: Androwarn, Andrubis,

ApkAnalyser

iOS: Flawfinder, Clang Static Analyzer 15

Vulnerability Analysis

Dynamic methods

Passive network monitoring and analyzing

Network traffic analysis at different places in the network (at the device, gateway or in an own VPN) Active network capturing and manipulating (Wifi and cellular)

Problems

Native apps do not use always device proxy settings

SSL encrypted connections

Solutions

Special apps that force the usage of device proxy settings or which break SSL encrypted connections (mostly for jailbroken or rooted devices)

AppSec Research EU 2013 16

Vulnerability Analysis

Dynamic methods

Runtime analysis

Possible by analyzing the communicating process for internal components (Android: Intents; iOS: objc_msgSend calls)

Runtime manipulation

Call or manipulate specific functions

Read and write variable values

File activity analysis

Analysis file system changes during the runtime

AppSec Research EU 2013

17

Vulnerability Analysis

Dynamic methods - CRM app example

Network traffic analysis reveals usage of HTTP and sending non-encrypted sensitive user data (session id, username and password)

Tools: Wireshark, BurpSuite "

User authentication can be bypassed by runtime manipulation iOS tools: GNU debugger, Snoop-it, Cycript " Android tools: Mercury, Intent Sniffer, Intent Fuzzer " File activity analysis shows that user credentials (username and password) are stored in and used from the iOS keychain iOS tools: filemon.iOS, Snoop-it

Android tools: androidAuditTools

AppSec Research EU 2013 18

Vulnerability Analysis

Forensic methods

Timeline analysis

Analyze timestamps created from the file system

Analysis of different file types

AppSec Research EU 2013

SQLite databases

Log files

Cookies

Screenshots (iOS)

Keyboard cache (iOS)

SharedPreferences (Android)

Keychain (iOS)

19

Vulnerability Analysis

Forensic methods - CRM app example

Timeline analysis shows that the app updates several files during its runtime (*.plist file, database)

Tools: mac-robber, mactime

Analyzing identified files and standard file types reveal that the user credentials are stored in plain text in the iOS keychain

7RROV .H\ŃOMLQ GXPSHU NH\ŃOMLQ YLHRHU "

AppSec Research EU 2013 20

Summary

0RNLOH 6HŃXULP\ 7HVPLQJ *XLGH "

" ŃRQVLGHUV PRNLOH ŃOMUMŃPHULVPLŃV NXP LV LQGHSHQGHQP from technologies " OHOSV PR LPSURYH PUMQVSMUHQŃ\ MQG UHSHMPMNLOLP\ IRU mobile penetration testing " LV M OROLVPLŃ MSSURMŃO RLPO VXIILŃLHQP IOH[LNLOLP\ " MQG XOPLPMPHO\ OHOSV PR LPSURYH PRNLOH MSS VHŃXULP\

AppSec Research EU 2013 21

The OWASP Foundation

http://www.owasp.org

Thank you for your attention!

infosec@msg-systems.com

Full thesis (in German) available on request

AppSec Research EU 2013

quotesdbs_dbs17.pdfusesText_23