SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
MBFuzzer - MITM Fuzzing for Mobile Applications



Fatih Özavcı
Mentor of MBFuzer @ yakindanegitim.org
fatih.ozavci at gamasec.net
gamasec.net/fozavci
Scope
     “Yakindan Egitim” Project
     Security Vulnerabilities of Mobile Applications
     Fuzzing for Mobile Applications
     Man in the Middle Fuzzing
        Understanding Mobile Services
        Response Based Fuzzing for Mobile Applications
        XML/JSON/RAW Response Injections and Corruptions
        SQL/XSS/Overflow Injections
     MBFuzzer
        PoC -> 1 June 2013
        Future Releases and Features


2
Yakindan Egitim Project
     Web : www.yakindanegitim.org
     Blog : blog.yakindanegitim.org
     Github : github.org/yakindanegitim


     It's a Training Project for Students
     Students Develop, Mentors Manage
     It's Like Google Summer of Code Without Money :(
     Other Security Related Projects
         Yekk – Necdet Yucel
         Malwarez – Oguz Yarimtepe
         VirtLabNet – Emre Yuce
         NfQuery – Serdar Yigit
3
Security Vulnerabilities of Mobile Applications
    OWASP – TOP 10 Mobile Security Risks
      M1: Insecure Data Storage
      M2: Weak Server Side Controls
      M3: Insufficient Transport Layer Protection
      M4: Client Side Injection
      M5: Poor Authorization and Authentication
      M6: Improper Session Handling
      M7: Security Decisions Via Untrusted Inputs
      M8: Side Channel Data Leakage
      M9: Broken Cryptography
      M10: Sensitive Information Disclosure


4
Fuzzing
     Automated Data Sending to Test Applications
     Main Target : Crashing Application & Memory Leaks
     Workflow
       Sending Random Big Data
       Wait For Crash or Increase Data Size
       Report the Crash
     Weaknesses
       Understanding Protocols
       Random Data is Not Enough!
       Crash & Vulnerability Detection Problems
       Smart vs Mutation Based vs Generation Based


5
Fuzzing for Mobile Applications
      Out of Scope : Internal Fuzzing of Mobile Applications
      Mobil Applications are Mostly Clients not Servers
         Fuzzing Should be Implemented as Server Response
         Man in the Middle Attack Should be Implemented
         Target is Remote Vulnerabilities
            Priveledge Escalation & Obtain Information
            Crashing the Target Application
      Fake Services vs Response Injection
         Understanding Remote Services
         Understanding Conditions and Response Types
         Parsing Request & Response Data
            XML, JSON, RAW, Binary

6
Targeted Remote Vulnerabilities
     M3: Insufficient Transport Layer Protection
       SSL Implementation
       Flow Manipulation
     M4: Client Side Injection
       SQL Injection
       XSS Injection
     M5: Poor Authorization and Authentication
       Remote Code Execution via Overflows
     M6: Improper Session Handling
       Flow Manipulation
     M7: Security Decisions Via Untrusted Inputs
       Memory Corruptions
     M10: Sensitive Information Disclosure
       Information Leak with Error and Warning Messages

7
The Man in The Middle
     Proxy Behaviors
     Implementing Fake Services
     SSL and Certificate Problems
     Real-Time Response Fuzzing




                      S             S
                          HTTPS
                      S   Proxy     S
                      L             L




8
Proxy Implementation
     Multi-Threaded Proxy Support
     Invisible and Reverse Proxy Support
        Mobile Proxy Settings Could be Bypassed
     SSL Support
        SSL and TLS Support
        HTTPS Connect Conversion Support
        On-The-Fly x.509 Certificate Generation
            Using Information of Target Server's Certificate
            Bypassing Weak Server Certificate Pinning
     Parsing Data
        XML, JSON, RAW, Binary


9
Fake Server Implementation
      Multi-Thread Support
      SSL Support
         SSL and TLS Support
         HTTPS Connect Conversion Support
         On-The-Fly x.509 Certificate Generation
            Using Information of Target Server's Certificate
            Bypassing Weak Server Certificate Pinning
      Parsing Data
         XML, JSON, RAW, Binary
      Learning Flow from Configuration File
         Request & Response Types
         Fuzzing Targets

10
Parsing and Manipulating Server Responses
      XML & JSON Data
         Corrupting XML/JSON Type, Language, Structure
         Manipulating Labels and Seperators
         Injection Data to Variables and Values
      RAW Data and Binary Data
         Random Injections
         HTML, JS and File-Type Fuzzing (Images, PDF etc)
      Flow Manipulation
         Timing Attacks, Logical Attacks
         Replay Attacks
         Parsing UDP/TCP Data and Creating Flow


11
Fuzzing Server Responses For...
      Memory Corruptions and Overflows
         Big Data, A*20000
         Format String Data (%n %x)
         Big Numbers for Arithmetic Overflows
         Null Data, Fake Variables, Missing Variables
      SQL Injections → Mobile Applications Sqlite Databases
      Cross-Site Scripting → Manipulating Interface
      Path Injections (NSFileManager etc.)
      Protocol and Library Based Fuzzing
         SSL, Raw Proto and HTTP Libraries
         XML and JSON Libraries
         Image, PDF and Office Files Libraries
12
MBFuzzer Project
      MBFuzzer → Mobile Application Fuzzer
      Real-Time Fuzzing for Mobile Applications
         Proxy Support (Invisible & Reverse Support)
         Fake Service Support (Flow Based)
         SSL Support
            HTTPS Connect Conversion
            On-The-Fly Certificate Generation
         Response Based Fuzzing
            XML/JSON/Raw/Binary Data Fuzzing
      Fuzzing Support For
         Memory Corruptions and Overflows
         SQL Injections, Cross-Site Scripting, Path Injections
         Protocol and Library Based Fuzzing

13
MBFuzzer Project Timeline
      Mentor                                : Fatih Ozavci
      Developer Candidate                   : Loading....


        Proof of Concept                               Second Phase


      Basic Proxy Support                      Fake Service Support




                                                                                    Unknown 2013
                              1 June 2013
      SSL Implementation                       Flow Manipulations
         Cert Generation                       Client Side Monitoring & Scripting
         HTTPS Connect                         Additional Fuzzing Supports
      MITM Fuzzing                                SQL Injection, XSS
         Big Data, Format String                  File Type Manipulations
14
References
      Yakindan Egitim Project
      http://www.yakindanegitim.org
      http://blog.yakindanegitim.org

      MBFuzzer Project Page
      http://github.org/yakindanegitim/mbfuzzer

      Fatih Ozavci Personal Page & Blog for Mobile Security
      http://gamasec.net/fozavci
      http://fozavci.blogspot.com



15

Más contenido relacionado

La actualidad más candente

The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopFatih Ozavci
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysFatih Ozavci
 
Alfresco DevCon 2019 - Alfresco Identity Services in Action
Alfresco DevCon 2019 - Alfresco Identity Services in ActionAlfresco DevCon 2019 - Alfresco Identity Services in Action
Alfresco DevCon 2019 - Alfresco Identity Services in ActionFrancesco Corti
 
FreeSBC - Getting Started
FreeSBC - Getting StartedFreeSBC - Getting Started
FreeSBC - Getting StartedAlan Percy
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)Pasquale Tursi
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Alan Percy
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open SourceSuhas Desai
 
DEFCON 23 - Fatih Ozavci - the art of voip workshop
DEFCON 23 - Fatih Ozavci - the art of voip workshopDEFCON 23 - Fatih Ozavci - the art of voip workshop
DEFCON 23 - Fatih Ozavci - the art of voip workshopFelipe Prado
 
Pangpse training q12011
Pangpse training q12011Pangpse training q12011
Pangpse training q12011Joe Palo Alto
 
How to protect your business telephony from cyber attacks - webinar 2017, Eng...
How to protect your business telephony from cyber attacks - webinar 2017, Eng...How to protect your business telephony from cyber attacks - webinar 2017, Eng...
How to protect your business telephony from cyber attacks - webinar 2017, Eng...Askozia
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to knowEric Klein
 
SAP (In)Security: New and Best
SAP (In)Security: New and BestSAP (In)Security: New and Best
SAP (In)Security: New and BestPositive Hack Days
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fCyber Security Alliance
 
Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009ClubHack
 
SailFin - Adding Presence and Voice to WebApps
SailFin - Adding Presence and Voice to WebAppsSailFin - Adding Presence and Voice to WebApps
SailFin - Adding Presence and Voice to WebAppsEduardo Pelegri-Llopart
 

La actualidad más candente (20)

The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
 
Alfresco DevCon 2019 - Alfresco Identity Services in Action
Alfresco DevCon 2019 - Alfresco Identity Services in ActionAlfresco DevCon 2019 - Alfresco Identity Services in Action
Alfresco DevCon 2019 - Alfresco Identity Services in Action
 
Silc
SilcSilc
Silc
 
FreeSBC - Getting Started
FreeSBC - Getting StartedFreeSBC - Getting Started
FreeSBC - Getting Started
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
 
Firewall
FirewallFirewall
Firewall
 
DEFCON 23 - Fatih Ozavci - the art of voip workshop
DEFCON 23 - Fatih Ozavci - the art of voip workshopDEFCON 23 - Fatih Ozavci - the art of voip workshop
DEFCON 23 - Fatih Ozavci - the art of voip workshop
 
Pangpse training q12011
Pangpse training q12011Pangpse training q12011
Pangpse training q12011
 
PAN PA500
PAN PA500PAN PA500
PAN PA500
 
How to protect your business telephony from cyber attacks - webinar 2017, Eng...
How to protect your business telephony from cyber attacks - webinar 2017, Eng...How to protect your business telephony from cyber attacks - webinar 2017, Eng...
How to protect your business telephony from cyber attacks - webinar 2017, Eng...
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
SAP (In)Security: New and Best
SAP (In)Security: New and BestSAP (In)Security: New and Best
SAP (In)Security: New and Best
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
 
Operation emmental appsec
Operation emmental appsecOperation emmental appsec
Operation emmental appsec
 
Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009
 
SailFin - Adding Presence and Voice to WebApps
SailFin - Adding Presence and Voice to WebAppsSailFin - Adding Presence and Voice to WebApps
SailFin - Adding Presence and Voice to WebApps
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 

Destacado

NGN ve VoIP Ağları Güvenlik Denetimi
NGN ve VoIP Ağları Güvenlik DenetimiNGN ve VoIP Ağları Güvenlik Denetimi
NGN ve VoIP Ağları Güvenlik DenetimiFatih Ozavci
 
Mahremiyet Ekseninde Ozgur Yazilimlar
Mahremiyet Ekseninde Ozgur YazilimlarMahremiyet Ekseninde Ozgur Yazilimlar
Mahremiyet Ekseninde Ozgur YazilimlarFatih Ozavci
 
Ozgur Yazilimlar ile Saldiri Yontemleri
Ozgur Yazilimlar ile Saldiri YontemleriOzgur Yazilimlar ile Saldiri Yontemleri
Ozgur Yazilimlar ile Saldiri YontemleriFatih Ozavci
 
Metasploit Framework ile Güvenlik Denetimi
Metasploit Framework ile Güvenlik DenetimiMetasploit Framework ile Güvenlik Denetimi
Metasploit Framework ile Güvenlik DenetimiFatih Ozavci
 
Ozgur Yazilimlar ile VoIP Guvenlik Denetimi
Ozgur Yazilimlar ile VoIP Guvenlik DenetimiOzgur Yazilimlar ile VoIP Guvenlik Denetimi
Ozgur Yazilimlar ile VoIP Guvenlik DenetimiFatih Ozavci
 
Metasploit Framework ile Exploit Gelistirme
Metasploit Framework ile Exploit GelistirmeMetasploit Framework ile Exploit Gelistirme
Metasploit Framework ile Exploit GelistirmeFatih Ozavci
 
Bilgi Guvenligi Temel Kavramlar
Bilgi Guvenligi Temel Kavramlar Bilgi Guvenligi Temel Kavramlar
Bilgi Guvenligi Temel Kavramlar Fatih Ozavci
 
Web vulnerability seminar3
Web vulnerability seminar3Web vulnerability seminar3
Web vulnerability seminar3Sakuya Izayoi
 
Software Security - Vulnerability&Attack
Software Security - Vulnerability&AttackSoftware Security - Vulnerability&Attack
Software Security - Vulnerability&AttackEmanuela Boroș
 
How to find_vulnerability_in_software
How to find_vulnerability_in_softwareHow to find_vulnerability_in_software
How to find_vulnerability_in_softwaresanghwan ahn
 
Web vulnerability seminar4
Web vulnerability seminar4Web vulnerability seminar4
Web vulnerability seminar4Sakuya Izayoi
 
Fuzzinator - In bug we trust.
Fuzzinator - In bug we trust.Fuzzinator - In bug we trust.
Fuzzinator - In bug we trust.Renata Hodovan
 
Codegate 2013 Junior - Music Player Exploit
Codegate 2013 Junior - Music Player ExploitCodegate 2013 Junior - Music Player Exploit
Codegate 2013 Junior - Music Player Exploitsweetchip
 
Browser Fuzzing with a Twist (and a Shake) -- ZeroNights 2015
Browser Fuzzing with a Twist (and a Shake) -- ZeroNights 2015Browser Fuzzing with a Twist (and a Shake) -- ZeroNights 2015
Browser Fuzzing with a Twist (and a Shake) -- ZeroNights 2015Jeremy Brown
 
Web vulnerability seminar1
Web vulnerability seminar1Web vulnerability seminar1
Web vulnerability seminar1Sakuya Izayoi
 
취약점(Vulnerability) db 구조 설명
취약점(Vulnerability) db 구조 설명취약점(Vulnerability) db 구조 설명
취약점(Vulnerability) db 구조 설명eungjin cho
 
Mahremiyetinizi Koruyun
Mahremiyetinizi KoruyunMahremiyetinizi Koruyun
Mahremiyetinizi KoruyunFatih Ozavci
 

Destacado (20)

NGN ve VoIP Ağları Güvenlik Denetimi
NGN ve VoIP Ağları Güvenlik DenetimiNGN ve VoIP Ağları Güvenlik Denetimi
NGN ve VoIP Ağları Güvenlik Denetimi
 
Mahremiyet Ekseninde Ozgur Yazilimlar
Mahremiyet Ekseninde Ozgur YazilimlarMahremiyet Ekseninde Ozgur Yazilimlar
Mahremiyet Ekseninde Ozgur Yazilimlar
 
Ozgur Yazilimlar ile Saldiri Yontemleri
Ozgur Yazilimlar ile Saldiri YontemleriOzgur Yazilimlar ile Saldiri Yontemleri
Ozgur Yazilimlar ile Saldiri Yontemleri
 
0-knowledge fuzzing
0-knowledge fuzzing0-knowledge fuzzing
0-knowledge fuzzing
 
Metasploit Framework ile Güvenlik Denetimi
Metasploit Framework ile Güvenlik DenetimiMetasploit Framework ile Güvenlik Denetimi
Metasploit Framework ile Güvenlik Denetimi
 
Ozgur Yazilimlar ile VoIP Guvenlik Denetimi
Ozgur Yazilimlar ile VoIP Guvenlik DenetimiOzgur Yazilimlar ile VoIP Guvenlik Denetimi
Ozgur Yazilimlar ile VoIP Guvenlik Denetimi
 
Metasploit Framework ile Exploit Gelistirme
Metasploit Framework ile Exploit GelistirmeMetasploit Framework ile Exploit Gelistirme
Metasploit Framework ile Exploit Gelistirme
 
Bilgi Guvenligi Temel Kavramlar
Bilgi Guvenligi Temel Kavramlar Bilgi Guvenligi Temel Kavramlar
Bilgi Guvenligi Temel Kavramlar
 
Web vulnerability seminar3
Web vulnerability seminar3Web vulnerability seminar3
Web vulnerability seminar3
 
Variables and constants
Variables and constantsVariables and constants
Variables and constants
 
Software Security - Vulnerability&Attack
Software Security - Vulnerability&AttackSoftware Security - Vulnerability&Attack
Software Security - Vulnerability&Attack
 
How to find_vulnerability_in_software
How to find_vulnerability_in_softwareHow to find_vulnerability_in_software
How to find_vulnerability_in_software
 
Web vulnerability seminar4
Web vulnerability seminar4Web vulnerability seminar4
Web vulnerability seminar4
 
Fuzzinator - In bug we trust.
Fuzzinator - In bug we trust.Fuzzinator - In bug we trust.
Fuzzinator - In bug we trust.
 
Codegate 2013 Junior - Music Player Exploit
Codegate 2013 Junior - Music Player ExploitCodegate 2013 Junior - Music Player Exploit
Codegate 2013 Junior - Music Player Exploit
 
Fuzzing sucks!
Fuzzing sucks!Fuzzing sucks!
Fuzzing sucks!
 
Browser Fuzzing with a Twist (and a Shake) -- ZeroNights 2015
Browser Fuzzing with a Twist (and a Shake) -- ZeroNights 2015Browser Fuzzing with a Twist (and a Shake) -- ZeroNights 2015
Browser Fuzzing with a Twist (and a Shake) -- ZeroNights 2015
 
Web vulnerability seminar1
Web vulnerability seminar1Web vulnerability seminar1
Web vulnerability seminar1
 
취약점(Vulnerability) db 구조 설명
취약점(Vulnerability) db 구조 설명취약점(Vulnerability) db 구조 설명
취약점(Vulnerability) db 구조 설명
 
Mahremiyetinizi Koruyun
Mahremiyetinizi KoruyunMahremiyetinizi Koruyun
Mahremiyetinizi Koruyun
 

Similar a MBFuzzer : MITM Fuzzing for Mobile Applications

Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Making application threat intelligence practical - DEM06 - AWS reInforce 2019 Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Making application threat intelligence practical - DEM06 - AWS reInforce 2019 Amazon Web Services
 
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?NowSecure
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Prathan Phongthiproek
 
F5 on AWS: How MailControl Improved their Application Visbility and Security
F5 on AWS:  How MailControl Improved their Application Visbility and Security F5 on AWS:  How MailControl Improved their Application Visbility and Security
F5 on AWS: How MailControl Improved their Application Visbility and Security Amazon Web Services
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attackerbugcrowd
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015Sreeni Pamidala
 
The Middleware technology that connects the enterprise
The Middleware technology that connects the enterpriseThe Middleware technology that connects the enterprise
The Middleware technology that connects the enterprise Kasun Indrasiri
 
Web Servislerinin Hacklenmesi, Ömer Çıtak
Web Servislerinin Hacklenmesi, Ömer ÇıtakWeb Servislerinin Hacklenmesi, Ömer Çıtak
Web Servislerinin Hacklenmesi, Ömer ÇıtakNetsparker Türkiye
 
OWASPTop 10
OWASPTop 10OWASPTop 10
OWASPTop 10InnoTech
 
Web API Security
Web API SecurityWeb API Security
Web API SecurityStefaan
 
Secure Application Development Training
Secure Application Development TrainingSecure Application Development Training
Secure Application Development Trainingpivotalsecurity
 
Mobile Application Security – Effective methodology, efficient testing!
Mobile Application Security – Effective methodology, efficient testing!Mobile Application Security – Effective methodology, efficient testing!
Mobile Application Security – Effective methodology, efficient testing!espheresecurity
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointCA API Management
 
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseThe Future is Now: The ForgeRock Identity Platform, Early 2017 Release
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseForgeRock
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Michael Noel
 

Similar a MBFuzzer : MITM Fuzzing for Mobile Applications (20)

Novinky F5
Novinky F5Novinky F5
Novinky F5
 
Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Making application threat intelligence practical - DEM06 - AWS reInforce 2019 Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Making application threat intelligence practical - DEM06 - AWS reInforce 2019
 
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]
 
F5 on AWS: How MailControl Improved their Application Visbility and Security
F5 on AWS:  How MailControl Improved their Application Visbility and Security F5 on AWS:  How MailControl Improved their Application Visbility and Security
F5 on AWS: How MailControl Improved their Application Visbility and Security
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015
 
The Middleware technology that connects the enterprise
The Middleware technology that connects the enterpriseThe Middleware technology that connects the enterprise
The Middleware technology that connects the enterprise
 
Web Servislerinin Hacklenmesi, Ömer Çıtak
Web Servislerinin Hacklenmesi, Ömer ÇıtakWeb Servislerinin Hacklenmesi, Ömer Çıtak
Web Servislerinin Hacklenmesi, Ömer Çıtak
 
Atelier Technique - F5 - #ACSS2019
Atelier Technique - F5 - #ACSS2019Atelier Technique - F5 - #ACSS2019
Atelier Technique - F5 - #ACSS2019
 
OWASPTop 10
OWASPTop 10OWASPTop 10
OWASPTop 10
 
OWASP
OWASPOWASP
OWASP
 
Web API Security
Web API SecurityWeb API Security
Web API Security
 
Secure Application Development Training
Secure Application Development TrainingSecure Application Development Training
Secure Application Development Training
 
Mobile Application Security – Effective methodology, efficient testing!
Mobile Application Security – Effective methodology, efficient testing!Mobile Application Security – Effective methodology, efficient testing!
Mobile Application Security – Effective methodology, efficient testing!
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePoint
 
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseThe Future is Now: The ForgeRock Identity Platform, Early 2017 Release
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
 

Último

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

MBFuzzer : MITM Fuzzing for Mobile Applications

  • 1. MBFuzzer - MITM Fuzzing for Mobile Applications Fatih Özavcı Mentor of MBFuzer @ yakindanegitim.org fatih.ozavci at gamasec.net gamasec.net/fozavci
  • 2. Scope “Yakindan Egitim” Project Security Vulnerabilities of Mobile Applications Fuzzing for Mobile Applications Man in the Middle Fuzzing Understanding Mobile Services Response Based Fuzzing for Mobile Applications XML/JSON/RAW Response Injections and Corruptions SQL/XSS/Overflow Injections MBFuzzer PoC -> 1 June 2013 Future Releases and Features 2
  • 3. Yakindan Egitim Project Web : www.yakindanegitim.org Blog : blog.yakindanegitim.org Github : github.org/yakindanegitim It's a Training Project for Students Students Develop, Mentors Manage It's Like Google Summer of Code Without Money :( Other Security Related Projects Yekk – Necdet Yucel Malwarez – Oguz Yarimtepe VirtLabNet – Emre Yuce NfQuery – Serdar Yigit 3
  • 4. Security Vulnerabilities of Mobile Applications OWASP – TOP 10 Mobile Security Risks M1: Insecure Data Storage M2: Weak Server Side Controls M3: Insufficient Transport Layer Protection M4: Client Side Injection M5: Poor Authorization and Authentication M6: Improper Session Handling M7: Security Decisions Via Untrusted Inputs M8: Side Channel Data Leakage M9: Broken Cryptography M10: Sensitive Information Disclosure 4
  • 5. Fuzzing Automated Data Sending to Test Applications Main Target : Crashing Application & Memory Leaks Workflow Sending Random Big Data Wait For Crash or Increase Data Size Report the Crash Weaknesses Understanding Protocols Random Data is Not Enough! Crash & Vulnerability Detection Problems Smart vs Mutation Based vs Generation Based 5
  • 6. Fuzzing for Mobile Applications Out of Scope : Internal Fuzzing of Mobile Applications Mobil Applications are Mostly Clients not Servers Fuzzing Should be Implemented as Server Response Man in the Middle Attack Should be Implemented Target is Remote Vulnerabilities Priveledge Escalation & Obtain Information Crashing the Target Application Fake Services vs Response Injection Understanding Remote Services Understanding Conditions and Response Types Parsing Request & Response Data XML, JSON, RAW, Binary 6
  • 7. Targeted Remote Vulnerabilities M3: Insufficient Transport Layer Protection SSL Implementation Flow Manipulation M4: Client Side Injection SQL Injection XSS Injection M5: Poor Authorization and Authentication Remote Code Execution via Overflows M6: Improper Session Handling Flow Manipulation M7: Security Decisions Via Untrusted Inputs Memory Corruptions M10: Sensitive Information Disclosure Information Leak with Error and Warning Messages 7
  • 8. The Man in The Middle Proxy Behaviors Implementing Fake Services SSL and Certificate Problems Real-Time Response Fuzzing S S HTTPS S Proxy S L L 8
  • 9. Proxy Implementation Multi-Threaded Proxy Support Invisible and Reverse Proxy Support Mobile Proxy Settings Could be Bypassed SSL Support SSL and TLS Support HTTPS Connect Conversion Support On-The-Fly x.509 Certificate Generation Using Information of Target Server's Certificate Bypassing Weak Server Certificate Pinning Parsing Data XML, JSON, RAW, Binary 9
  • 10. Fake Server Implementation Multi-Thread Support SSL Support SSL and TLS Support HTTPS Connect Conversion Support On-The-Fly x.509 Certificate Generation Using Information of Target Server's Certificate Bypassing Weak Server Certificate Pinning Parsing Data XML, JSON, RAW, Binary Learning Flow from Configuration File Request & Response Types Fuzzing Targets 10
  • 11. Parsing and Manipulating Server Responses XML & JSON Data Corrupting XML/JSON Type, Language, Structure Manipulating Labels and Seperators Injection Data to Variables and Values RAW Data and Binary Data Random Injections HTML, JS and File-Type Fuzzing (Images, PDF etc) Flow Manipulation Timing Attacks, Logical Attacks Replay Attacks Parsing UDP/TCP Data and Creating Flow 11
  • 12. Fuzzing Server Responses For... Memory Corruptions and Overflows Big Data, A*20000 Format String Data (%n %x) Big Numbers for Arithmetic Overflows Null Data, Fake Variables, Missing Variables SQL Injections → Mobile Applications Sqlite Databases Cross-Site Scripting → Manipulating Interface Path Injections (NSFileManager etc.) Protocol and Library Based Fuzzing SSL, Raw Proto and HTTP Libraries XML and JSON Libraries Image, PDF and Office Files Libraries 12
  • 13. MBFuzzer Project MBFuzzer → Mobile Application Fuzzer Real-Time Fuzzing for Mobile Applications Proxy Support (Invisible & Reverse Support) Fake Service Support (Flow Based) SSL Support HTTPS Connect Conversion On-The-Fly Certificate Generation Response Based Fuzzing XML/JSON/Raw/Binary Data Fuzzing Fuzzing Support For Memory Corruptions and Overflows SQL Injections, Cross-Site Scripting, Path Injections Protocol and Library Based Fuzzing 13
  • 14. MBFuzzer Project Timeline Mentor : Fatih Ozavci Developer Candidate : Loading.... Proof of Concept Second Phase Basic Proxy Support Fake Service Support Unknown 2013 1 June 2013 SSL Implementation Flow Manipulations Cert Generation Client Side Monitoring & Scripting HTTPS Connect Additional Fuzzing Supports MITM Fuzzing SQL Injection, XSS Big Data, Format String File Type Manipulations 14
  • 15. References Yakindan Egitim Project http://www.yakindanegitim.org http://blog.yakindanegitim.org MBFuzzer Project Page http://github.org/yakindanegitim/mbfuzzer Fatih Ozavci Personal Page & Blog for Mobile Security http://gamasec.net/fozavci http://fozavci.blogspot.com 15