Главная
Study mode:
on
1
Introduction
2
Applications
3
Native vs Web
4
Agenda
5
Web Authentication
6
Summary
7
Types of Authenticator
8
Basic Authentication
9
Single SIA
10
Android Account Manager
11
Demo
12
Protocol Security
13
Infrastructure Security
14
Internal Storage
15
Adulation Mechanism
16
Backup Function
17
ADB Based Backup
18
ADB Based Backup Implementation
19
Backup Data
20
Authentication Protocol
21
Helium
22
Reverse Engineering
23
Helium Interface
24
Broadcast Password
25
Exception
26
Cover
27
Evaluation
28
WebBased Backup
29
Evolution Evaluation
30
Case Study
31
Mitigation
32
Developers
33
Conclusion
Description:
Explore the critical security vulnerabilities in Android authentication protocols through this Black Hat conference talk. Delve into the risks associated with authenticator management in Android apps, focusing on potential leakage through backup channels. Examine how most apps store credentials in persistent storage, relying on Android OS for protection, and learn why this approach can be problematic. Discover how backup apps on Google Play may inadvertently expose sensitive data to malicious apps with basic permissions. Follow the speaker's systematic investigation of this overlooked attack vector, including the development of a proof-of-concept app called AuthSniffer. Understand the widespread nature of this threat, affecting 68.4% of top-ranked apps with authentication schemes. Gain insights into various authentication types, backup mechanisms, and potential mitigation strategies for developers. This comprehensive analysis aims to raise awareness about the importance of secure authenticator management in Android app development and protocol design. Read more

Authenticator Leakage Through Backup Channels on Android

Black Hat
Add to list