This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Bucharest AppSec Conference 2017 Training2"
Oana Cornea (talk | contribs) |
Oana Cornea (talk | contribs) |
||
| Line 45: | Line 45: | ||
The knowledge of Mobile Security, especially Android has become essential in securing today’s digital environment. This workshop is developed to introduce and bring hands on experience of the exciting and growing field of Android Pentesting and its Security Essentials.<br> | The knowledge of Mobile Security, especially Android has become essential in securing today’s digital environment. This workshop is developed to introduce and bring hands on experience of the exciting and growing field of Android Pentesting and its Security Essentials.<br> | ||
Upon completing this course, the participants are expected to: | Upon completing this course, the participants are expected to: | ||
| − | * Gain a set of techniques focused on the use of vendor-neutral, open source tools, Develop the skills to capture suspicious data. | + | |
| − | * Discern unusual patterns hidden within seemingly normal applications. | + | *Gain a set of techniques focused on the use of vendor-neutral, open source tools, Develop the skills to capture suspicious data. |
| − | * Understand the basics of Android Security Architecture. | + | *Discern unusual patterns hidden within seemingly normal applications. |
| − | * Get trained enough to start into Mobile Pentesting as the new generation Mobile Security Researcher. | + | *Understand the basics of Android Security Architecture. |
| − | * Get prepared for active research at the forefront of these areas. | + | *Get trained enough to start into Mobile Pentesting as the new generation Mobile Security Researcher. |
| − | Throughout the course, real-world examples in conjunction with numerous hands-on exercises will provide android pentesting & analysis skills.<br> | + | *Get prepared for active research at the forefront of these areas. |
| + | *Throughout the course, real-world examples in conjunction with numerous hands-on exercises will provide android pentesting & analysis skills. | ||
| + | <br> | ||
Outline: Android Security | Outline: Android Security | ||
| − | * Module 1 | + | *Module 1: |
| − | *# | + | *#Introduction to Android OS |
| − | *# Android Security Architecture | + | *#Android Security Architecture |
| − | *# Android | + | *#Android Permission Model |
| − | *# | + | *#Sandboxing Applications |
| − | *# Android | + | *#Setting up the Android Emulator |
| − | *# | + | *#Setting up a Mobile Pentest Environment |
| − | |||
| − | * Module 2 | + | *Module 2: |
| − | *# | + | *#Inspecting Application Certificates and Signatures |
| − | *# | + | *#Signing/Resigning Android Applications |
| − | *# | + | *#Application Signatures Verification |
| + | *#Investigating app permissions through manifest file | ||
| + | *#Working with Android Debug Bridge (ADB) | ||
| + | *#Application Resources Extraction using ADB | ||
| − | * Module 3 | + | *Module 3: |
| − | *# | + | *#Bypassing Android Permissions |
| − | *# | + | *#Introduction to Drozer |
| − | *# | + | *#Setting up and Running a Drozer Session |
| + | *#Enumerating Packages and their Activities | ||
| + | *#Enumerating Content Providers and Services | ||
| + | *#Enumerating Broadcast Receivers | ||
| + | *#Using Drozer to find vulnerabilities | ||
| − | * Module 4 | + | *Module 4: |
| − | *# | + | *#Reversing Android Applications |
| − | *# | + | *#Analysing DEX Files |
| − | *# | + | *#Working with Logcat |
| − | *# | + | *#Network Traffic Inspection |
| − | *# | + | *#Passive Intent Sniffing |
| − | *# Exploiting | + | *#Exploiting Services |
| − | *# | + | *#Exploiting Broadcast Receivers |
| − | *# | + | *#Exploiting Insecure Data Storage |
| − | *# | + | *#Exploiting Poor Cryptography Implementation |
| − | *# Exploiting | + | *#Exploiting Data Leakage vulnerabilities |
| − | *# Dynamic Analysis | + | *#Exploiting the Debuggable Applications |
| − | *# | + | *#Static/Dynamic Analysis of Android Applications |
| + | *#Working with Dexguard and Proguard | ||
<br> | <br> | ||
'''Intended audience:''' This workshop is essential to information security, mobile security & risk management, loss prevention, corporate security and law enforcement personnel interested in Mobile Security. e.g. Security professionals, who possess basic general security knowledge. Personnel who have working knowledge of android security and pentesting and want to gain experience in the end-to-end mobile security process can attend this training.<br> | '''Intended audience:''' This workshop is essential to information security, mobile security & risk management, loss prevention, corporate security and law enforcement personnel interested in Mobile Security. e.g. Security professionals, who possess basic general security knowledge. Personnel who have working knowledge of android security and pentesting and want to gain experience in the end-to-end mobile security process can attend this training.<br> | ||
Revision as of 18:24, 23 September 2017
Training | |||||
| Time | Title | Trainers | Description | ||
| 2 days training 11th and 12th of October daily: 9:00 - 17:00 |
Assessing and securing applications using the OWASP ASVS (Application Security Verification Standard) |
Oana Cornea | Description: The focus of this training will be on how to build secure applications and how to evaluate them using real world scenarios. The attendees will learn the concepts solving exercises and using various OWASP resources like the OWASP ASVS (Application Security Verification Standard) and the OWASP Testing Guide.
Topics covered:
Day 2:
| ||
| 2 days training 11th and 12th of October daily: 9:00 - 17:00 |
Advanced Mobile Security Training |
Nikhil P Kulkarni and Ravi Kumar | Description: The knowledge of Mobile Security, especially Android has become essential in securing today’s digital environment. This workshop is developed to introduce and bring hands on experience of the exciting and growing field of Android Pentesting and its Security Essentials.
| ||
| 2 days training 12th and 13th of October daily: 9:00 - 17:00 |
Advanced Malware Analysis |
Himanshu Khokhar | Description: Advanced Malware Analysis is a fast paced, full hands-on course which starts from the very basics of malware analysis and reverse engineering and then moves to advanced analysis of malwares (including malicious exe, js, pdf and word files as well) which then advances to analyze shellcodes, rootkits and ransomwares. Students taking this course will learn the tools and techniques to understand, analyze and defend against modern day malwares. Syllabus 1. Malware ananlysis fundamentals
2. Advanced Static Analysis
3. Advanced Dynamic malware analysis
4. Other major types of malware types
5. Shellcodes, Rootkits and Ransomwares
Intended audience:Advanced Malware Analysis is a full hands-on course. It is useful both for beginners into the field of malware analysis, as well as for those who have been into this area for some time but want to polish their skills to a new level. Other than malware analysts, reverse engineers, forensic investigators, threat analysts, students, people wanting to get into malware analysis can take this course. | ||