CNIT 128: Hacking Mobile Devices

36895 Weds 06:10-09:00 pm SCIE 100

Spring 2015 Sam Bowne

Schedule · Powerpoints · Projects · Links · Home Page

Scores


Catalog Description

Mobile devices such as smartphones and tablets are now used for making purchases, emails, social networking, and many other risky activities. These devices run specialized operating systems have many security problems. This class will cover how mobile operating systems and apps work, how to find and exploit vulnerabilities in them, and how to defend them. Topics will include phone call, voicemail, and SMS intrusion, jailbreaking, rooting, NFC attacks, malware, browser exploitation, and application vulnerabilities. Hands-on projects will include as many of these activities as are practical and legal.

Advisory: CNIT 113 and 123, or equivalent familiarity with hacking computers and operating mobile devices

Upon successful completion of this course, the student will be able to:
  1. Describe the risks of using mobile devices for common activities such as making phone calls, emailing, and shopping
  2. Explain cellular network functions, attacks, anbd countermeasures for voice calls, voicemail, and SMS
  3. Perform and analyze jailbreaks for iOS devices
  4. Analyze the Android security model and rooting
  5. Recognize types of mobile malware and anti-malware options
  6. Identify Web browser services and attacks on mobile platforms and recommend countermeasures
  7. Configure and defeat locking, remote location and wiping services
  8. Explain common mobile app risks and make intelligent decisions when installing and using them
  9. Evaluate the functions and risks of mobile payment services, such as Google Wallet

Textbook

"Hacking Exposed Mobile: Security Secrets & Solutions", by Bergman, Stanfield, Rouse, Scambray, Geethakumar, Deshmukh, Matsumoto, Steven and Price, McGraw-Hill Osborne Media; 1 edition (July 9, 2013) ISBN-10: 0071817018 Buy from Amazon



Schedule (may be revised)

DateQuiz & ProjTopic
Wed 1-14  1: The mobile risk ecosystem
Wed 1-21  2: Hacking the cellular network
Wed 1-28 3: iOS
Fri 1-30 Last Day to Add Classes
Wed 2-4Quiz: Ch 1 & 2
Proj 1 due
3: iOS
Wed 2-11Quiz: Ch 3
Proj 2-4 due
4: Android
Wed 2-18No Quiz
Proj 5 due
4: Android
Wed 2-25Quiz: Ch 4
Proj 6 due
5: Mobile malware
Wed 3-4No Quiz
Proj 7 due
6: Mobile services and mobile Web
Wed 3-11No Quiz 6: Mobile services and mobile Web
Wed 3-18Quiz: Ch 5 & 6 7: Mobile Device Management
Wed 3-25No Quiz
Proj 8 and 9 due
8: Mobile development security
Wed 3-25 Mid-Term Grades Due
Wed 4-1 Holiday - No Class

Wed 4-8 No Quiz
Proj 10 and 11 due
Guest speaker: Adam Ely from BlueBox

Wed 4-15 No Quiz
No Proj due
Guest speaker: Sam Harwin from Salesforce
"Mobile Wi-Fi Risks"

Slides


Thu 4-16 Last Day to Withdraw
Wed 4-22Quiz: Ch 7 and 8 9: Mobile payments

Wed 4-29CLASS CANCELLED

Wed 5-6No Quiz
Guest speaker: Claire Medeiros from Evident.io

Wed 5-13Last class
No Quiz
All Extra Credit Projects Due
Guest speaker: Irfan Asrar from appthority
Wed 5-20  Final Exam





Powerpoints

Policy

1: The mobile risk ecosystem
2: Hacking the cellular network
3: iOS
4: Android
5: Mobile malware
6: Mobile services and mobile Web (part 1)
6: Mobile services and mobile Web (part 2)
7: Mobile Device Management
8: Mobile development security
9: Mobile payments

If you do not have PowerPoint you can use Open Office.


Back to Top

Projects (in development)

Project 1: Preparing an Android Virtual Machine (25 pts.)
Project 2: Rooting Your Android Virtual Machine (10 pts.)
Project 3: Android Studio (20 pts.)

Troubleshooting Android Emulator Problems

Ubuntu Prep for Android Security Auditing

Project 4: ExploitMe Mobile Lab 1: Sniffing Insecure Connections with Burp (15 points)
Project 5: ExploitMe Mobile Lab 2: Parameter Manipulation (15 points)
Project 6: ExploitMe Mobile Lab 3: Insecure File Storage (20 points)
Project 7: ExploitMe Mobile Lab 4: Secure Logging (10 points)
Project 8: ExploitMe Mobile Lab 7: Scraping Data from RAM (15 points)
Project 9: Decompiling and Trojaning an Android App with Smali Code (15 points)
Project 10: Obfuscating an Android App with ProGuard (10 points)
Project 11: MaaS360 (15 points)

Extra Credit Projects

Project 1x: Android Security Auditing with Genymotion and Burp (20 pts. extra credit)
Project 2x: Security Audit of the NFL Android App (15 pts. extra credit)
Project 3x: Security Audit of Another Android App (20 pts. extra credit)
Project 4x: BlueStacks Android Emulator on Windows (15 pts. extra credit)
Project 5x: Trojaning an Android App and Posting Credentials on the Web (15 pts. extra credit)
Project 6x: Obfuscating Android Source Code with DashO (15 pts. extra credit)
Project 7x: Making an iPhone App with Xcode (15 pts. extra credit)
Project 8x: Security Audit of ExploitMe Mobile in Xcode (25 pts. extra credit)
Project 9x: Making a Data-Stealing Android Trojan (15 pts. extra credit)
Project 10x: Find an Android Vulnerability and Report it Correctly (40 pts. extra credit)
Project 11x: Stealing Credentials from an Android App with a SSL MITM Attack (15 pts.)

More projects are coming later

References for Projects

ExploitMe Mobile Android Labs from Security Compass
ExploitMe Mobile iPhone Labs from Security Compass
Android Assessments with GenyMotion + Burp
Back to Top

Links

Ch 1a: Mobile OS market share in the U.S. 2018
Ch 1b: Android App Vulnerablities Research
Ch 1c: How to secure, protect, and completely lock down your Android phone
Installing Burp Certificate as a System Certificate
Ch 6a: SSL broken! Hackers create rogue CA certificate using MD5 collisions (2008)
Ch 6b: Create your own MD5 collisions
Ch 6c: MD5 considered harmful today (2008)
Ch 6d: Why it's harder to forge a SHA-1 certificate than it is to find a SHA-1 collision
Ch 6e: Encryption: Android Open Source Project
Ch 6f: Android version history - Wikipedia
Ch 6g: Android Encryption Demystified | ElcomSoft blog
Stuck at 99% : noxappplayer
JustTrustMe SSL certificate UN-pinning
Android Applications Reversing 101
Android and Apple phone security: Here's an objective chart to help you decide
Android Enterprise Recommended
Ch 6h: What is LineageOS and What Happened to CyanogenMod?
Ch 6i: Paranoid Android (software) - Wikipedia
Ch 7a: Picking your compileSdkVersion, minSdkVersion, targetSdkVersion
Ch 7b: Distribution dashboard: Android Developers
Ch 7c: What has happened to Android's Distribution Dashboards?
Ch 7d: Apple will stop reporting unit sales for iPhone, iPad and Mac from next quarter (2018)
Ch 7e: Vulnerabilities with Custom Permissions
Ch 7f: Permission Downgrade Attacks and Android 5.0
Ch 7g: Android Intents - Tutorial
Ch 7h: am: Activity Manager
Ch 7i: CVE-2013-6271: Remove Device Locks from Android Phone - Cureblog
Ch 5k: whois microsoft.com (archived)
Ch 5j: Zone Transfer Test Online | HackerTarget.com
Android Security Analysis Tools, Part Four - MobSF | Netguru Blog on Android
Ch 7j: What is Umask and How To Setup Default umask Under Linux? - nixCraft
Ch 7k: linux - Effect of umask on text files - Stack Overflow
Ch 7l: Download Cydia for Android - Full Installation Guide
Ch 7m: Link Substrate Files failed � Issue #1 � AndroidHooker/hooker
Ch 7n: Frida -- A world-class dynamic instrumentation framework
Ch 7o: Hacking Android app with Frida
Ch 7p: Hacking Android apps with FRIDA
passionfruit: [WIP] Crappy iOS app analyzer -- TRY FOR PROJECTS
JEB Decompiler by PNF Software -- Important commercial tool
Ch 7q: Four Ways to Bypass Android SSL Verification and Certificate Pinning
MOBISEC slides for European Android Hacking Class
TrustMeAlready: Disable SSL verification and pinning on Android, system-wide
Ch 7r: CVE-2013-6271 Android Settings Remove Device Locks (4.0-4.3)
Ch 8a: PathClassLoader �|� Android Developers
Ch 8b: DexClassLoader - Android Developers
Don't Trust Google Play Protect to Shield Your Android
9 Mobile App Scanner to Find Security Vulnerabilities

          
Back to Top
Last Updated: 4-30-15 8:47 pm