Skip to main content

Damn Vulnerable Android Application by Security Compass - Lab 2 Server Side Authorization Issue

 Lab 2 Server Side Authorization Issue

Welcome back my friends now we are gonna have hands on on server side authorization issue in this lab we will use burp proxy try to manipulate the parameters and will see the impact.

The server side authorization issue is in bank transfer function of an app as now a days some android apps rely on traditional architecture like REST interfaces to perform the functions.

We can intercept the server client communication in 2 ways:

1) Go to settings -->more -->mobile networks --> Access point names create one new access point change proxy option to your proxy IP and change the port to port of proxy and save it. now your communication will be intercepted by proxy.

2)Another way is to start the emulator in proxy mode by giving below command

emulator.exe @[AVD name] -http-proxy [proxy IP]:[proxy port]



so now we are ready to intercept the communication.

Lets launch the app



Now as I said the server side authorization issue is on transfer function so tap on transfer and try to trasnfer the funds



as you can see that we tried to transfer 50 bucks and intercepted the request in burp

we are having some preconfigured accounts

  1. jdoe / password
    • Debit: 123456789
    • Credit: 987654321
  2. bsmith / password
    • Debit: 111111111
    • Credit: 22222222
 So now we will try to change the debit account

 as you can see we changed the debit account from 123456789 to 111111111 which belongs to Bsmith.

and thats it we got the funds in our account that too even a single buck not got deducted from our debit account.


so the impact is very severe.


Solution

So the solution is that we should have some server side validation


#To validate on server side that accounts belong to user:
if to_account.user != session.user or from_account.user != session.user:
    return error("E6")

#validate that amount is positive
if total_cents < 0:
    return error("E5")

Lab 3 Insecure File Storage

Comments

  1. This is a really informative knowledge, Thanks for posting this informative Information. Secure File Sharing

    ReplyDelete
  2. Excellent Blog to read. You have shared useful information. Thank you.
    SEO Online Training
    Learn SEO Online

    ReplyDelete

Post a Comment

Popular posts from this blog

Drozer Commands - A Security & Attack Framework for Android

What is Drozer? Drozer is a Security & Attack Framework for Android Application Testing. Drozer is a tool that can be used for Mobile device review , Secure development of applications, BYOD approval and Mobile application testing. There are 2 Versions of Drozer an Open Source and other one Pro version having following features Gathering the information about the application Find the attack surface Test your Exposure to Public Exploits Execute dynamic code on a device, to avoid the need to compile and install small test scripts. Start Android emulators, provisioned with the drozer Agent and the app you want to investigate. Simulate sensor input, such as GPS, to emulators to test the full attack surface. View the attack surface as a graph. this will be helpful for the risk assessment reporting. Drozer is having agent & server architecture so to start with assessment we have to install the agent in the emulator or connected device. Command to install the Dr

Android Damn Vulnerable App by Security Compass

Tutorial of Android Damn Vulnerable App by Security Compass Introduction: Hi folks, today I am gonna show you some hands on or tutorial of the android app testing which I done during my R&D of android app security testing. Here I will show you from scratch setting up of Lab Server to testing of application. In this you will learn on below topics: 1)Insecure Connection (Traffic over HTTP) 2)Server Side Authorization Issue 3)Insecure File Storage 4)Insecure Logging 5)Encryption of data on device 6)Memory Protection Setting-up of lab (App & Server) First of all you have to download the base app which is damn vulnerable from here . After downloading zip and extracting it you have to build it in .apk format using Eclipse IDE. Now you have to install the app in the emulator before that you have to make sure that you installed SDK and its packages. To install the app you have to start emulator using AVD and clicking on "Start" or by command line emul

OWASP IoT (Internet of Things) Top 10 - A Walkthrough

OWASP IoT (Internet of Things) Top 10 - 2014 Introductions: In Todays world things of everyday are becoming smart, every hour hundreds and thousands of smart devices are being added to the Internet whether it is a Toaster, Camera, Refrigerator, T.Vs, Cars etc. So it can be a target of attackers easily, here comes OWASP IoT Top 10 to address this issue. OWASP IoT Top 10 is designed to make the everyday devices secure on same lines of guidelines by OWASP TOP 10 for applications. The OWASP Internet of Things Top 10 - 2014 is as follows: I1 – Insecure Web Interface I2 – Insufficient Authentication/Authorization I3 – Insecure Network Services I4 – Lack of Transport Encryption I5 – Privacy Concerns I6 – Insecure Cloud Interface I7 – Insecure Mobile Interface I8 – Insufficient Security Configurability I9 – Insecure Software/Firmware I10 – Poor Physical Security  How to test for OWASP IoT Top 10   I1 – Insecure Web Interface: Everyday devices have web ser