Forensic Approach To Mobile App Vulnerability Research

By | April 2, 2012

Source: Dark Reading

by John H. Sawyer

In this article “I recently gave a presentation at the SANS Mobile Device Security Summit in Nashville, titled “Smart Bombs: Mobile Application Vulnerabilities and Exploitation.” The talk was a bit of a preview of a talk of the same name that Kevin Johnson, Tom Eston, and I will be giving at OWASP AppSecDC next week. The focus of the SANS presentation was to cover some of the tools and methods I use for analyzing mobile devices for vulnerabilities. I’ll be covering some of those approaches and tools in this and upcoming Evil Bytes blogs.

While some of my methods (i.e., Burp to intercept HTTP[S] traffic) are pretty common among security researchers and penetration testers, I think a few techniques are a bit unique. Why? Well, I’ve developed them based on my experiences as a forensic examiner, network intrusion analyst, and penetration tester. Today, I’m going to start discussing the forensic methods and introduce one particular tool that I’ve adapted from PC-based forensic cases to mobile platforms.”

Leave a Reply