asetalias / talks

ALiAS Talks
7 stars 12 forks source link

[Proposal] DAST (Dynamic Application Security Testing) and SAST (Static Application Security Testing) for android applicaftions #80

Open AYAN-AMBESH opened 4 months ago

AYAN-AMBESH commented 4 months ago

Type

Talk

Location

Campus: Noida

About

Android Testing

Static and Dynamic testing on android Apk with hands on demonstration via test application will also go through SMALI but not in depth as its a topic big in itself

Will go from Beginner to Advance

Pre-requisites

Basic knowledge of linux , programming (any langauge)

Duration

2 hours

Level

Beginner

Resources

Currently working on the presentation will share it as soon as possible

Speakers

Ayan Ambesh Linkedin Github

bloodyvoid13 commented 4 months ago

Hey, looks good does mid march work for you? (7 or 14)

AYAN-AMBESH commented 4 months ago

yes it works for me

AYAN-AMBESH commented 4 months ago

7 march will be nice

chanu4321 commented 4 months ago

Hey, what's the update on presentation?

AYAN-AMBESH commented 4 months ago

Hey i have crafted the presentation in markdown format and im sending that below down i will be presenting it through slides (a program written in go to showcase presentation in terminal)

What is Static Analysis? Examining code without execution

#


What is Dynamic Analysis? Analyzing code while it's running

Benefits in Android Development: Detects vulnerabilities that only manifest at runtime, such as unauthorized network access, attempts to tamper with device settings, and malware injection. Provides a more comprehensive security assessment compared to static analysis. Limitations: Can be time-consuming and resource-intensive. May require additional setup and configuration.


Exploits we are gonna cover

Avoiding Sensitive Information Leaks in Android Apps

  1. Introduction

Problem: Mobile apps are increasingly vulnerable to leaks of sensitive information like passwords, API keys, and user data. Impact: These leaks can compromise user privacy, financial information, and internal systems.

  1. Common Vulnerabilities

Hardcoded Secrets: Embedding sensitive data directly in the app's code. Example: A hardcoded secret key allowed decryption of encrypted data. Insecure Logging: Inadvertently logging sensitive information through debugging tools like "adb logcat." Example: Debuggers can reveal sensitive data logged during development or testing.

  1. Demonstration

Finding the Process ID (PID): Use adb shell ps -ef | grep to identify the target app's PID. Filtering Logs with PID: Use adb logcat | grep to filter logs specific to the target app.

  1. Prevention Strategies

Secure Coding Practices: Avoid Hardcoding: Use environment variables or secure key storage mechanisms for sensitive data. Log Management: Filter Logs: Capture only essential information. Centralized Logging: Use a system with access controls for sensitive logs.

  1. Conclusion

Secure coding, responsible log management, and regular security assessments are crucial to protect user data. By adopting these practices, we can build a more secure mobile app ecosystem.