SlideShare una empresa de Scribd logo
1 de 27
Android in the Healthcare
           Workplace: A Case Study



                    Thomas Richards

                    g13net@gmail.com


OWASP
04/05/12

               Copyright © The OWASP Foundation
               Permission is granted to copy, distribute and/or modify this document
               under the terms of the OWASP License.




               The OWASP Foundation
               http://www.owasp.org
About me

My name is Tom
Twitter: @g13net
Website: www.g13net.com
Independent Vulnerability Researcher(at night!)
  13 Published vulnerabilities with 5 CVE-IDs assigned
IT Support Analyst (by day)




                                               OWASP      2
Why this talk?

With the growth of mobile devices, companies
 are looking to capitalize on this for business
 purposes

Very rapidly writing applications for these mobile
 platforms

Security is a concern



                                           OWASP      3
What this talk is

This talk is about a security assessment
 performed on a product my company uses

This is not about the Android platform itself, or
 security issues with it




                                           OWASP     4
Background

Home Health Company (visiting nurses)

Transitioned from Laptop with thick client
 software to Mobile platform
  Flexibility and Mobility are huge for a 75% mobile
   workforce

New product, rewritten for Android from
 Windows Mobile


                                               OWASP    5
HIPAA Concerns

HIPAA is the word in Healthcare

Need to Protect PHI

Encryption!
  At Rest
  In Transit




                                   OWASP   6
Deploying Devices

Deployed 250 Android Tablets
  Running Froyo (2.2)

MDM Solutions

No Imaging




                                OWASP   7
About the software

Runs on Android
  Not available in the market

Clinicians sync to get data
  Patient data(records) are kept on the device

Vendor stated data on the device was encrypted
 as well as data in transit



                                                  OWASP   8
How did I perform this assessment?

Android Emulator!
  Able to observe traffic in real time

Used OWASP Mobile Top 10 and Web Top 10 as
 guidelines




                                          OWASP   9
Authentication and Authorization

Only two pieces of information were needed to
 configure a device: Server name and Agent ID

Agent IDs are sequential

No way to validate an approved device is being
 configured

Finding Server name and Agent ID would lead to
 complete compromise
                                        OWASP     10
Setup Screen




               OWASP   11
Password

User’s password was configured and stored
 locally

No complexity requirements




                                       OWASP   12
Data at rest

I was able to determine that the data in the
 local database was encrypted (yay!)

It was protected by the user’s password and
 using built in SQLite APIs for encrypting a
 database




                                          OWASP   13
Data in Transit

No SSL!

Using HTTP, they used POST methods to
 retrieve data from the server

Now treat this as a web app also




                                     OWASP   14
Traffic capture screenshot




                             OWASP   15
POST Request Screenshot




                          OWASP   16
Interesting Side Note

Going to sync1.vendor.com/falcon showed form
 based login prompt.

Also not in HTTPs, tried to connect to it via

Going to:
 sync1.vend.com/falcon/mobiledevicehandler.fal
  Displayed custom encoding




                                           OWASP   17
Session Handling

No Cookies present.

The server would not know if the request was
 proper which could lead to Replay attacks.




                                        OWASP   18
Insufficient Transport Layer Protection

Obvious Issues

Custom “encoding”
  After some RE, not encryption! (no key present)
  Some Plaintext available
  I was able to analyze their protocol.




                                              OWASP   19
Server name Identification

Plaintext!




                             OWASP   20
Agent ID Identification

After observing traffic with different Agent IDs, I
 was able to determine where in the string it lived




                                           OWASP       21
Agent ID Identification Cont.

Raw Hex:
  aa10ffffffff00010102633a1020000000000081
  aa10ffffffff0001010264ee1020000000000081

Converting the hex “633a” and “64ee” to
 decimal revealed the Agent IDs.

This coupled with Server Name in plaintext could
 lead to complete compromise of data


                                          OWASP     22
Server Identification

No attempts were made to disguise the identity
 of web server and technology used




                                        OWASP     23
Notifying the Vendor

Brought this to the attention of my boss who
 asked me to write it up

Submitted write-up to the vendor

CTO Came and stated they were aware of these
 issues (they lied to us in the beginning)




                                         OWASP   24
Vendor’s Plan

Setup Codes
  Unique 8 character string generated on server end
   before setting up a device

SSL (eventually)
  As of current version, still no SSL present. They
   stated it would have been in Dec 2011 release




                                                OWASP   25
Protecting Ourselves

Ask vendor if the app has been independently
 assessed for security issues (companies
 specialize in this!)

Assess the software yourself.




                                        OWASP   26
Thank you!




             OWASP   27

Más contenido relacionado

La actualidad más candente

OWASP Serbia - A3 broken authentication and session management
OWASP Serbia - A3 broken authentication and session managementOWASP Serbia - A3 broken authentication and session management
OWASP Serbia - A3 broken authentication and session management
Nikola Milosevic
 
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программинструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ
belhonka
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
baoyin
 
PCI security requirements secure coding and code review 2014
PCI security requirements   secure coding and code review 2014PCI security requirements   secure coding and code review 2014
PCI security requirements secure coding and code review 2014
Haitham Raik
 
4 owasp egypt_12_4_2014_ebrahim_hegazy
4 owasp egypt_12_4_2014_ebrahim_hegazy4 owasp egypt_12_4_2014_ebrahim_hegazy
4 owasp egypt_12_4_2014_ebrahim_hegazy
sunil kumar
 

La actualidad más candente (20)

OWASP Serbia - A3 broken authentication and session management
OWASP Serbia - A3 broken authentication and session managementOWASP Serbia - A3 broken authentication and session management
OWASP Serbia - A3 broken authentication and session management
 
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программинструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ
 
OWASP Top 10 2017 - New Vulnerabilities
OWASP Top 10 2017 - New VulnerabilitiesOWASP Top 10 2017 - New Vulnerabilities
OWASP Top 10 2017 - New Vulnerabilities
 
OWASP Top 10 2017
OWASP Top 10 2017OWASP Top 10 2017
OWASP Top 10 2017
 
OWASP Top 10 Vulnerabilities 2017- AppTrana
OWASP Top 10 Vulnerabilities 2017- AppTranaOWASP Top 10 Vulnerabilities 2017- AppTrana
OWASP Top 10 Vulnerabilities 2017- AppTrana
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
Troubleshooting the Windows Installer
Troubleshooting the Windows Installer Troubleshooting the Windows Installer
Troubleshooting the Windows Installer
 
Software Development Weaknesses - SecOSdays Sofia, 2019
Software Development Weaknesses - SecOSdays Sofia, 2019Software Development Weaknesses - SecOSdays Sofia, 2019
Software Development Weaknesses - SecOSdays Sofia, 2019
 
PCI security requirements secure coding and code review 2014
PCI security requirements   secure coding and code review 2014PCI security requirements   secure coding and code review 2014
PCI security requirements secure coding and code review 2014
 
Top 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilitiesTop 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilities
 
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security RisksOWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
 
[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #5] OWASP Projects: beyond Top 10[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #5] OWASP Projects: beyond Top 10
 
Acs trb g42
Acs trb g42Acs trb g42
Acs trb g42
 
Certificate Pinning in Mobile Applications
Certificate Pinning in Mobile ApplicationsCertificate Pinning in Mobile Applications
Certificate Pinning in Mobile Applications
 
4 owasp egypt_12_4_2014_ebrahim_hegazy
4 owasp egypt_12_4_2014_ebrahim_hegazy4 owasp egypt_12_4_2014_ebrahim_hegazy
4 owasp egypt_12_4_2014_ebrahim_hegazy
 
PVS-Studio 7.12 New Features for Finding Safety and Security Threats
PVS-Studio 7.12 New Features for Finding Safety and Security ThreatsPVS-Studio 7.12 New Features for Finding Safety and Security Threats
PVS-Studio 7.12 New Features for Finding Safety and Security Threats
 
Owasp 2017 oveview
Owasp 2017   oveviewOwasp 2017   oveview
Owasp 2017 oveview
 
Owasp
Owasp Owasp
Owasp
 
OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019
 
Atelier Technique - F5 - #ACSS2019
Atelier Technique - F5 - #ACSS2019Atelier Technique - F5 - #ACSS2019
Atelier Technique - F5 - #ACSS2019
 

Destacado (8)

What If
What IfWhat If
What If
 
Android in the healthcare workplace - GrrCON and DerbyCON
Android in the healthcare workplace - GrrCON and DerbyCONAndroid in the healthcare workplace - GrrCON and DerbyCON
Android in the healthcare workplace - GrrCON and DerbyCON
 
Picking blackberries
Picking blackberriesPicking blackberries
Picking blackberries
 
Time management inspiration
Time management inspirationTime management inspiration
Time management inspiration
 
Curso entornos saludables
Curso entornos saludablesCurso entornos saludables
Curso entornos saludables
 
Portfolio2012
Portfolio2012Portfolio2012
Portfolio2012
 
Offset.az Price List
Offset.az Price ListOffset.az Price List
Offset.az Price List
 
Cosmoprof 2012 - Le tendenze del packaging
Cosmoprof 2012 - Le tendenze del packagingCosmoprof 2012 - Le tendenze del packaging
Cosmoprof 2012 - Le tendenze del packaging
 

Similar a Android in the healthcare workplace

OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
johnpragasam1
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
azida3
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
cgt38842
 
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Ajin Abraham
 
SAP (In)Security: New and Best
SAP (In)Security: New and BestSAP (In)Security: New and Best
SAP (In)Security: New and Best
Positive Hack Days
 

Similar a Android in the healthcare workplace (20)

OWASP an Introduction
OWASP an Introduction OWASP an Introduction
OWASP an Introduction
 
OWASP App Sec US - 2010
OWASP App Sec US - 2010OWASP App Sec US - 2010
OWASP App Sec US - 2010
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
 
Jump-Start The MASVS
Jump-Start The MASVSJump-Start The MASVS
Jump-Start The MASVS
 
OWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptxOWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptx
 
RSA Europe 2013 OWASP Training
RSA Europe 2013 OWASP TrainingRSA Europe 2013 OWASP Training
RSA Europe 2013 OWASP Training
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
OWASP Free Training - SF2014 - Keary and Manico
OWASP Free Training - SF2014 - Keary and ManicoOWASP Free Training - SF2014 - Keary and Manico
OWASP Free Training - SF2014 - Keary and Manico
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guide
 
Looking Forward… and Beyond - Distinctiveness Through Security Excellence
Looking Forward… and Beyond - Distinctiveness Through Security ExcellenceLooking Forward… and Beyond - Distinctiveness Through Security Excellence
Looking Forward… and Beyond - Distinctiveness Through Security Excellence
 
"Crypto wallets security. For developers", Julia Potapenko
"Crypto wallets security. For developers", Julia Potapenko"Crypto wallets security. For developers", Julia Potapenko
"Crypto wallets security. For developers", Julia Potapenko
 
Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)
Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)
Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)
 
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
 
mobsf.pdf
mobsf.pdfmobsf.pdf
mobsf.pdf
 
Toronto node js_meetup
Toronto node js_meetupToronto node js_meetup
Toronto node js_meetup
 
SAP (In)Security: New and Best
SAP (In)Security: New and BestSAP (In)Security: New and Best
SAP (In)Security: New and Best
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
OWASP - Building Secure Web Applications
OWASP - Building Secure Web ApplicationsOWASP - Building Secure Web Applications
OWASP - Building Secure Web Applications
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Android in the healthcare workplace

  • 1. Android in the Healthcare Workplace: A Case Study Thomas Richards g13net@gmail.com OWASP 04/05/12 Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation http://www.owasp.org
  • 2. About me My name is Tom Twitter: @g13net Website: www.g13net.com Independent Vulnerability Researcher(at night!) 13 Published vulnerabilities with 5 CVE-IDs assigned IT Support Analyst (by day) OWASP 2
  • 3. Why this talk? With the growth of mobile devices, companies are looking to capitalize on this for business purposes Very rapidly writing applications for these mobile platforms Security is a concern OWASP 3
  • 4. What this talk is This talk is about a security assessment performed on a product my company uses This is not about the Android platform itself, or security issues with it OWASP 4
  • 5. Background Home Health Company (visiting nurses) Transitioned from Laptop with thick client software to Mobile platform Flexibility and Mobility are huge for a 75% mobile workforce New product, rewritten for Android from Windows Mobile OWASP 5
  • 6. HIPAA Concerns HIPAA is the word in Healthcare Need to Protect PHI Encryption! At Rest In Transit OWASP 6
  • 7. Deploying Devices Deployed 250 Android Tablets Running Froyo (2.2) MDM Solutions No Imaging OWASP 7
  • 8. About the software Runs on Android Not available in the market Clinicians sync to get data Patient data(records) are kept on the device Vendor stated data on the device was encrypted as well as data in transit OWASP 8
  • 9. How did I perform this assessment? Android Emulator! Able to observe traffic in real time Used OWASP Mobile Top 10 and Web Top 10 as guidelines OWASP 9
  • 10. Authentication and Authorization Only two pieces of information were needed to configure a device: Server name and Agent ID Agent IDs are sequential No way to validate an approved device is being configured Finding Server name and Agent ID would lead to complete compromise OWASP 10
  • 11. Setup Screen OWASP 11
  • 12. Password User’s password was configured and stored locally No complexity requirements OWASP 12
  • 13. Data at rest I was able to determine that the data in the local database was encrypted (yay!) It was protected by the user’s password and using built in SQLite APIs for encrypting a database OWASP 13
  • 14. Data in Transit No SSL! Using HTTP, they used POST methods to retrieve data from the server Now treat this as a web app also OWASP 14
  • 17. Interesting Side Note Going to sync1.vendor.com/falcon showed form based login prompt. Also not in HTTPs, tried to connect to it via Going to: sync1.vend.com/falcon/mobiledevicehandler.fal Displayed custom encoding OWASP 17
  • 18. Session Handling No Cookies present. The server would not know if the request was proper which could lead to Replay attacks. OWASP 18
  • 19. Insufficient Transport Layer Protection Obvious Issues Custom “encoding” After some RE, not encryption! (no key present) Some Plaintext available I was able to analyze their protocol. OWASP 19
  • 21. Agent ID Identification After observing traffic with different Agent IDs, I was able to determine where in the string it lived OWASP 21
  • 22. Agent ID Identification Cont. Raw Hex: aa10ffffffff00010102633a1020000000000081 aa10ffffffff0001010264ee1020000000000081 Converting the hex “633a” and “64ee” to decimal revealed the Agent IDs. This coupled with Server Name in plaintext could lead to complete compromise of data OWASP 22
  • 23. Server Identification No attempts were made to disguise the identity of web server and technology used OWASP 23
  • 24. Notifying the Vendor Brought this to the attention of my boss who asked me to write it up Submitted write-up to the vendor CTO Came and stated they were aware of these issues (they lied to us in the beginning) OWASP 24
  • 25. Vendor’s Plan Setup Codes Unique 8 character string generated on server end before setting up a device SSL (eventually) As of current version, still no SSL present. They stated it would have been in Dec 2011 release OWASP 25
  • 26. Protecting Ourselves Ask vendor if the app has been independently assessed for security issues (companies specialize in this!) Assess the software yourself. OWASP 26
  • 27. Thank you! OWASP 27