This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Android Testing Cheat Sheet"
(→M3 - Insufficient Transport Layer) |
(→M3 - Insufficient Transport Layer) |
||
Line 47: | Line 47: | ||
1. On Server side | 1. On Server side | ||
− | |||
* Identify all ssl endpoints. | * Identify all ssl endpoints. | ||
* Perform SSL Cipher Scan using (sslscan)[https://github.com/rbsec/sslscan] or similar software. | * Perform SSL Cipher Scan using (sslscan)[https://github.com/rbsec/sslscan] or similar software. | ||
− | |||
* SSLv2, SSLv3 is disabled | * SSLv2, SSLv3 is disabled | ||
* TLS 1.2, 1.1 and 1.0 is supported (1.2 is essential to ensure highest possible secure connection) | * TLS 1.2, 1.1 and 1.0 is supported (1.2 is essential to ensure highest possible secure connection) | ||
Line 61: | Line 59: | ||
2. On Device Side | 2. On Device Side | ||
− | + | * Ensure application is working correctly by navigating around. | |
− | + | * Put a proxy in between the application and remote server. If application fails to load. Application might be doing cert validation. Refer logcat if any message is printed. | |
− | + | * Place Proxy RootCA in trusted root CA list in device. (Burp)[https://support.portswigger.net/customer/portal/articles/1841101-configuring-an-android-device-to-work-with-burp] (OWASP-ZAP)[https://security.secure.force.com/security/tools/webapp/zapandroidsetup] | |
− | + | * Try using application again. If application still doesn't connect, application might be doing cert pinning. | |
− | + | * Install (Xposed Framework)[http://repo.xposed.info/module/de.robv.android.xposed.installer] and (Just Trust Me)[https://github.com/Fuzion24/JustTrustMe], enable JustTrustMe and then reboot device. | |
− | + | * Try again if everything works we have a application which employee's cert pinning. | |
== M4 - Unintended Data Leakage == | == M4 - Unintended Data Leakage == |
Revision as of 18:39, 18 March 2016
Last revision (mm/dd/yy): 03/18/2016 IntroductionDRAFT MODE - This Cheat Sheet is a Work in Progress This cheat sheet provides a checklist of tasks to be performed to do a penetration test of an Android application. It follows the OWASP Mobile Top 10 Risks list. Testing MethodologyAt the device level, there are 2 ways in which the application shall be tested.
At the application level, there are 2 ways in which it shall be tested
Application MappingMap the application for possible security vectors
OWASP Step-by-step Approach(For each of the standards below, there shall be multiple steps for the tester to follow]) M1 - Weaker Server side controlsM2 - Insecure Data storageThis Section should be ideally tested after using the application for some time. This way application has time to store some data on the disk. Commonplaces to look at
M3 - Insufficient Transport LayerMultiple layer of checks to be performed here 1. On Server side
2. On Device Side
M4 - Unintended Data LeakageSimmilar to M2 this section requires application to be used however while the application is in use we need to monitor following places.
M5 - Poor Authorization and AuthenticationOne of the simplest check's to be performed after application is used for some time and it has time to put the data inside system.
M6 - Broken CryptographyThere are multiple things to look at
M7 - Client Side InjectionAndroid applications need to store data locally in sqlite files or XML structures and hence need to performs either SQL/XML Queries or file I/O. This gives rise to 2 major issues.
If the application is a HTML5 hybrid application then Cross Site Scripting (XSS) should also be considered. XSS will expose the entire application to the attacker as HTML5 applications will have the ability to call native functionality and hence control over the entire application. M8 - Security Decisions via untrusted inputsM9 - Improper Session HandlingM10 - Lack of Binary ProtectionAuthors and Primary EditorsJim Manico Jonathan Carter Prashant Phatak Milan Singh Thakur Anant Shrivastava Other Cheatsheets |