HackLab: Android Security
This course explains how Android’s architecture has improved over the years and what’s being done to reduce the likelihood of such attacks happening. We will discuss various techniques in-depth (theory and practice) that can be used to analyze the security properties of individual applications.
19th of October 2017 | Amsterdam | 11 January 2018 | 5 April 2018 | 15 October 2018
Android is currently the most used smartphone OS in the world. The Android OS powers many devices including smartphones, tablets, TVs, cars, watches, cameras, and other electronics.
There are many different manufacturers that each produce custom Android software for these devices. The software on these devices may become outdated over time while security vulnerabilities are discovered. Due to this large variety in the ecosystem, keeping these devices up-to-date becomes a problem. Outdated Android OS versions and applications pose a risk as they become a potential target for attackers.
Threats on Android are emerging: malware is encountered on a regular basis, capable of extracting sensitive data from the device, including contact data and pictures, or abusing vulnerabilities in the device software. Malware may obtain privileged access on the system and extract sensitive details from banking applications or to lure the victim into giving up their payment card details.
This is a single day, technical, hands-on training that is focused around the general security architecture and different analysis techniques for Android. This is a course suited for security analysts and reverse engineers, as well as mobile application developers concerned with the security posture of their application.
We will address security by design principles applicable for mobile applications and deep-dive into concepts and techniques that can be used to analyze the security of mobile applications during hands-on exercises. We will use static and dynamic analysis techniques on sample applications to gain an understanding of how an application works without having access to the source code of the application. Using these techniques we build an understanding of how security was implemented and discuss what could be done to remediate weaknesses in the applications.
- Mobile developers
- Security engineers
- IT professionals
- IT auditors with interest in hacking
Participants should have fundamental insight into operating systems and have experience with Android, either as a developer of mobile applications, security tester, or reverse engineer.
- Android security architecture review:
- Android kernel
- Android runtime
- Application framework
- Application development basics
- Permission model
- Secure design principles
- Static analysis techniques
- Decompilation, disassembly and recompilation
- Usage of reverse engineering tools such as APKtool, enjarify and Procyon
- Dynamic analysis techniques
- SSL man-in-the-middle
- Sensitive data extraction
- (Intent) fuzzing
- Dynamic debugging and instrumentation
- Temporary rooting
- Capture the flag exercises
Date, location and time
This training will be held on
19 October 2017 in Amsterdam
11 January 2018
5 April 2018
15 October 2018
The costs are € 795 ex VAT. Catering (lunch) and course materials included in the price.
Until four weeks before the start of the course you may cancel your participation in writing free of charge, or you may propose to attend on another date. Should you cancel within four weeks before the start of the course you will have to pay the full course fee. In the event of insufficient participants we reserve the right to cancel the course at any time or move the date of the event. If so, you will be informed in due time.