The document discusses auditing mobile applications. It covers dividing auditing efforts between client-side and server-side testing. On the client side, it discusses approaches like jailbreaking or rooting phones to gain more access. It also covers techniques like man-in-the-middle attacks by manipulating DNS or SSL certificates. The document recommends standard tools for assessing the server-side but also analyzing the mobile app binaries like dex files on Android and iOS formats. It highlights privacy issues found in WhatsApp and potential hijacking risks if traffic is not encrypted.
21. MOBILE LAB
NETWORK
CLIENT SERVER
Phone full control Some ways We CAN¡¯T change
the server
SW full control We¡¯re able to
control the We CAN¡¯T have a
network look to the
We¡¯re able to
software
change config and
software Sometimes hard
and expensive Black Box Testing
22. JAILBREAK / ROOTING
Sometimes emulator r00lz!
? Android Emulator (SDK)
? iOS Simulator (SDK)
But sometimes not...
We don¡¯t have full built-in control
Maybe we should...
? iOS Jailbreak
? Android Rooting
84. Man-in-the-
CRACKING VERIFYCERT
certificados como v¨¢lidos), algo que evidentemente no podr¨¢ hacer un atacante que no
tuviera previo control de la m¨¢quina pero que nos situa en la posici¨®n de un intruso que
haya comprometido previamente el NOC de Good. En esta ocasi¨®n, dado que no se ha
conseguido vulnerar los certificados SSL, NO bastar¨ªa con el compromiso de algunos de
los routers internmedios, como SI ocurr¨ªa en el caso anterior.
www.s21sec.c
87. KNOWN WHATSAPP ISSUES
Unencrypted Traffic
? But using 443 tcp port...
Storing ALL conversation FOREVER
Storing GPS position!
? WTF!!
? Why??!!
Much more...
Great research from SecurityByDefault guys!