Skip to main content

Posts

Showing posts from September, 2016

Exploiting Software Haking_FORENSICS - Part 1

Live Capture Procedures As we move to a world of cloud based systems, we are increasingly finding that we are required to capture and analyse data over networks. Once, analysing a disk drive was a source of incident analysis and forensic material. Now we find that we cannot access the disk in an increasingly cloud based and remote world requiring the use of network captures. This is not a problem however. The tools that are freely available in both Windows and Linux offer a means to capture traffic and carve out the evidence we require As we move to a world of cloud based systems,we are increasingly finding that we are required to capture and analyse data over networks. To do this, we need to become familiar with the various tools that are available for these purposes. In this article, we look at a few of the more common free tools that will enable you to capture traffic for analysis within your organisation. Once, analysing a disk drive was a source of incident analysis and for

Exploiting Software Haking_DEFENSE PATTERN - Part 3

Android Application Assessment In this article we’ll discuss about steps involved in performing security assessment of an Android based application. We will see use of various tools and methodologies. There are various other methods and tools but steps are very common in nature. There are various tools/ methods to do this kind of assessments. We shall discuss the general and popular approach. Our assessment revolves around the following two methodologies: • Black Box approach • White Box approach First we need to set up the test bed for which we need to download the Andriod SDK. Download the Android SDK tool from http://developer.android. com/sdk/index.html. It includes SDK and AVD (Android Virtual Device). They are necessary for creating the VM and installing emulator. Setting up the AVD and emulator is out of scope for this article but it’s very easy, once you follow the above link. Once the AVD is setup it appears as in the following Figure 1. We have named our AVD as