Quick evaluation on the current status of fingerprinting resistance between vanilla Mozilla Firefox and the Tor Browser (OWASP Saitama MTG #12, talk #1)
The document outlines the activities of Asynchronicity, co-founded by Takahiro Yoshimura and Shinya Kuroda, focusing on security research and development, particularly in mobile and web applications, alongside penetration testing and forensic analysis. It highlights innovative techniques for mass scraping web pages, including the use of asynchronous programming for enhanced efficiency in scraping operations. Additionally, it discusses various tools and methodologies employed to tackle challenges in web scraping and network interactions.
Describing various attack methods on Android/iOS apps. This time I decided to take a quick dive into actual analysis session on the a-bit-hardened InsecureBankV2 with Trueseeing (for OWASP Sendai Meetup #29.) Roughly the same content with the talk I gave in #kyusec18.
Describing various attack methods on Android/iOS apps. This time I decided to take a quick dive into actual analysis session on the a-bit-hardened InsecureBankV2 with Trueseeing (for #kyusec, Kyushu Security Conference 2018)
Trueseeing: Effective Dataflow Analysis over Dalvik OpcodesTakahiro Yoshimura
?
This document describes Trueseeing, a static dataflow analysis tool for analyzing Android Dalvik bytecode without using decompilers. Trueseeing marks up constants, invocations, and stored values in SQLite databases during disassembly. It then traces dataflow statically by matching getter/setter calls and instance field accesses to solve constants. This allows Trueseeing to analyze the dataflow and identify potential vulnerabilities in applications related to most of the OWASP top 10 mobile risks without suffering from the problems of dynamic analysis or dependency on decompilers.
The document discusses the Effy application for Android, which allows drawing on a canvas using finger gestures. It describes the DrawActivity class which handles touch events and drawing, and compares it to the FingerPaint sample application. The document also provides a link to download the Effy source code from GitHub under the GPL-3 license.
Effy is an Android drawing app that allows users to customize pen settings like width and color through preference settings. It uses XML configuration files and preference activities to define and access preference keys for pen properties. When the app starts or preference values change, it retrieves the preference values from shared preferences and applies them by re-styling the paint object used for drawing. This allows pen settings to persist and be updated dynamically.
This document contains snippets of code and discussions around Android development. It discusses topics like Android NDK, Eclipse, RelativeLayout, and provides code examples and tutorials. Stack Overflow is also mentioned as a resource. The snippets seem to be from a tutorial or set of notes on learning Android development.
The document outlines the activities of Asynchronicity, co-founded by Takahiro Yoshimura and Shinya Kuroda, focusing on security research and development, particularly in mobile and web applications, alongside penetration testing and forensic analysis. It highlights innovative techniques for mass scraping web pages, including the use of asynchronous programming for enhanced efficiency in scraping operations. Additionally, it discusses various tools and methodologies employed to tackle challenges in web scraping and network interactions.
Describing various attack methods on Android/iOS apps. This time I decided to take a quick dive into actual analysis session on the a-bit-hardened InsecureBankV2 with Trueseeing (for OWASP Sendai Meetup #29.) Roughly the same content with the talk I gave in #kyusec18.
Describing various attack methods on Android/iOS apps. This time I decided to take a quick dive into actual analysis session on the a-bit-hardened InsecureBankV2 with Trueseeing (for #kyusec, Kyushu Security Conference 2018)
Trueseeing: Effective Dataflow Analysis over Dalvik OpcodesTakahiro Yoshimura
?
This document describes Trueseeing, a static dataflow analysis tool for analyzing Android Dalvik bytecode without using decompilers. Trueseeing marks up constants, invocations, and stored values in SQLite databases during disassembly. It then traces dataflow statically by matching getter/setter calls and instance field accesses to solve constants. This allows Trueseeing to analyze the dataflow and identify potential vulnerabilities in applications related to most of the OWASP top 10 mobile risks without suffering from the problems of dynamic analysis or dependency on decompilers.
The document discusses the Effy application for Android, which allows drawing on a canvas using finger gestures. It describes the DrawActivity class which handles touch events and drawing, and compares it to the FingerPaint sample application. The document also provides a link to download the Effy source code from GitHub under the GPL-3 license.
Effy is an Android drawing app that allows users to customize pen settings like width and color through preference settings. It uses XML configuration files and preference activities to define and access preference keys for pen properties. When the app starts or preference values change, it retrieves the preference values from shared preferences and applies them by re-styling the paint object used for drawing. This allows pen settings to persist and be updated dynamically.
This document contains snippets of code and discussions around Android development. It discusses topics like Android NDK, Eclipse, RelativeLayout, and provides code examples and tutorials. Stack Overflow is also mentioned as a resource. The snippets seem to be from a tutorial or set of notes on learning Android development.
3. TEXT
WHO I AM
? Takahiro Yoshimura (@alterakey)
https://keybase.io/alterakey
? Monolith Works Inc.
Co-founder, CTO
Security researcher
? 明治大学サイバーセキュリティ研究所
客員研究員
4. TEXT
WHAT I DO
? Security research and development
? iOS/Android Apps
→Financial, Games, IoT related, etc. (>200)
→trueseeing: Non-decompiling Android Application
Vulnerability Scanner [2017]
? Windows/Mac/Web/HTML5 Apps
→POS, RAD tools etc.
? Network/Web penetration testing
→PCI-DSS etc.
? Search engine reconnaissance
(aka. Google Hacking)
? Whitebox testing
? Forensic analysis
5. TEXT
WHAT I DO
? CTF
? Enemy10, Sutegoma2
? METI CTFCJ 2012 Qual.: Won
? METI CTFCJ 2012: 3rd
? DEF CON 21 CTF: 6th
? DEF CON 22 OpenCTF: 4th
? 発表?講演など
DEF CON 25 Demo Labs (2017)
DEF CON 27 AI Village (2019)
CODE BLUE (2017, 2019)
CYDEF (2020) etc.
Image by Wiyre Media on flickr, CC-BY 2.0
8. TEXT
FEBURARY - #12
? 2023年初めの開催
? 春日部市開催: ふれあいキューブ 4F
? この時懇親会を行なったピザ屋が潰れた… orz
Image by Erik Weibust on flickr, CC-BY-NC-ND 2.0
9. TICKET TO THE DARK WORLD
FRONT
Image by Alexandre Gallier on flickr, CC-BY-NC-ND 2.0
10. TEXT
FRONT: TICKET TO THE DARK WORLD
? 無法地帯であるダークウェブ環境
? アクセスにはTorブラウザが要求されるが遅い
→TorはFirefox ESR
→Firefox自体の改良が進んでいるのだが…
? では自家製環境がどれだけ通用するのか?
またより安全な環境を作るには?
→検証だ!
Image by Alexandre Gallier on flickr, CC-BY-NC-ND 2.0
13. TEXT
FRONT: TAKEAWAYS
? 無法地帯であるダークウェブ環境
? 決してナメてはいけないJSの執念を垣間見た回
→non-JS環境ならRFP+FPI+少しの工夫でイケる
→JS環境はかなりのリスク; Torブラウザが必須
→いずれにしても全画面モードの使用は絶対NG
? より安全な環境を作るには?
→Torブラウザを基本的にSafestで運用
→Extensionの導入: uBO/LocalCDNは有効
※Hard modeが良いが許可履歴に注意
Image by Andrew on flickr, CC-BY-NC-ND 2.0
16. TEXT
FRONT: TAKEAWAYS
? 無法地帯であるダークウェブ環境
? あなたをいつでも見守るGuard nodeの恐怖
→Guard nodeはプライバシーのアキレス腱
→立候補さえすれば誰でもなれる
→たまに多数の同質ノードによるcampaignが
? そんな装備で大丈夫か? — 大丈夫だ問題ない (r
…そんな展開が普通にある世界;
? 信頼できるbridgeを大切に、どうかご安全に。
Image by KaCey97078 on flickr, CC-BY-NC 2.0