OWASP Top 10 for Mobile

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

7 hours 6 minutes
Video Transcription
Hey, everyone, welcome back to the course in this video. We're gonna talk through the OAS top 10 for mobile,
so the always top 10 for mobile includes improper platforms usage.
We've also got insecure data storage, insecure communications, insecure authentication, insufficient cryptography. So there's in cryptography and used, but it's not properly being used. We'll talk about that in a little bit. We've got insecure authorization, client code quality,
code tampering, reverse engineering and finally, extraneous functionality. So let's talk about each one of these just a little bit.
So improper Platform usage, which is number one on the mobile list.
This is where we've got something like an expose p I that the attacker can and get access to, and they'll go ahead and put malicious data. One area we might see this in is if the developers using app, local storage for the data and not using something like the IOS key chain. If it's an IOS device
insecure data storage. So as the name implies, this is where an attacker can have. Uh, they might have physical access to the device, or they might do it through an app with malware or something like that,
and so this could be many things, right? So it's insecure. Data storage. But it could be many things that that are included under that right, so it could be an insecure sequel database or a leaky sequel database Could be. The logs are insecure and the attacker can get access to those. Could be the data on an SD card
could even be the cookie data, right? So the stored cookie data on the device.
Next, we have insecure communication.
This is where a lot of times the data is being transmitted in clear text
or it's being transmitted with weak or miss configured encryption. And this includes things like the poor handshake of communication and some common attacks against this, our man in the middle attacks, where they're just grabbing the data and the Attackers putting themselves in the session as well as phishing attacks insecure authentication. So
the app or application is not
actually identifying the user. It's failing to identify the user, or it's failing to continuously identify the user. So things like such a management weakness, insufficient cryptography. So this is where we might be using, like a weaker, weaker algorithm or some kind of process flaw in the crypt encryption itself insecure authorization. This where
it could be exploited via malware. So,
um, this is where the attacker will bypass the authentication control and then actually take over the communication. So we just talked about insecure authentication, which is just proving you are who you say you are essentially right. Credentialing that user and then insecure authorization we're talking about What do you have access to? Right, So we wanna make sure that our APS are
operating off a principle of least privilege
client code quality. So this is where we're talking about code level issues with the client. So things like untrusted inputs that can lead to things like buffer overflow attacks or format string vulnerabilities, code tampering. So this is where the attacker actually changes the app code itself. They might also change the contents of memory dynamically as well as
changing the system. AP ice. And then we have reverse engineering. So this is where the attacker analyzes the core binary. And the goal is to try to get
information like a source code or libraries and use. And we could do this with tools such as Ida Pro and I. It is actually a popular one in the Mauer reverse engineering aspect as well as a forensic realm. And then finally, we have extraneous functionality. This is where we're talking about things like back doors. Right? So Thebe vela per might have hard coded some credentials in there like a password, for example.
Or they might have even disabled two factor authentication and just forgot to enable it
before the APP was pushed out to the app store. So just a quick, quick question here for you. For this vulnerability to be exploited, the company must expose a web service or a P I call that is consumed by the mobile app. So I gotta be improper platform usage, client code quality or insecure data story. All right, so if you guessed improper platform usage, you are correct.
So in this video, we just briefly cover the OAS top 10 for mobile devices.
Up Next
Penetration Testing and Ethical Hacking

The Penetration Testing and Ethical Hacking course prepares students for industry penetration testing certifications, like CEH. This course walks students through the process of gaining intelligence, scanning and enumerating and hacking the target.

Instructed By