- Видео 54
- Просмотров 1 455 513
Guardsquare
Добавлен 7 дек 2014
Guardsquare offers the most complete approach to mobile application security on the market. Built on the open source ProGuard technology, Guardsquare’s software integrates seamlessly across the development cycle. From app security testing to code hardening to real-time visibility into the threat landscape, Guardsquare solutions provide enhanced mobile application security from early in the development process through publication.
More than 900 customers worldwide across all major industries rely on Guardsquare to help them identify security risks and protect their mobile applications against reverse engineering and tampering.
More than 900 customers worldwide across all major industries rely on Guardsquare to help them identify security risks and protect their mobile applications against reverse engineering and tampering.
The Technical Foundation for Protecting a Mobile App [ENGINEERS EXPLAIN]
There is no single magic bullet for the perfect mobile app security solution for every app, but understanding the different options, and how they work, you can make an informed decision to keep your app safe without giving yourself a headache. An engineering lead at Guardsquare explains the technical foundation for the different mobile app protection techniques from the quickest and least secure, to the most robust, while outlining the trade-offs and considerations with each option.
Просмотров: 182
Видео
Tip #3-Add MAST to Your Mobile AppSec Strategy: What is Mobile Application Security Testing?
Просмотров 1575 месяцев назад
Security testing by itself, will not secure a mobile app. But, security testing alongside a comprehensive security strategy, based on industry standards like MASVS from OWASP, gives you actionable insights to resolve security threats before they become an issue. Learn more about mobile app security testing: hubs.la/Q02yRdp80
VLOG - The Fight against Malware: Code Hardening & Runtime Protection Are Key
Просмотров 1786 месяцев назад
App developers and publishers play a crucial role in addressing malware risk. On top of implementing protection against accessibility services abuse, overlay, and screen recording attacks, the importance of their app’s resilience against static and dynamic analysis attacks should not be understated. Learn more in our blog: hubs.la/Q02wlGwR0
Tip #2-Automate Everything: What is Mobile Application Security Testing?
Просмотров 2246 месяцев назад
You can perform security testing manually, which may require significant time and resources. Instead, focus on finding the right security testing tool that helps you automate the process as much as possible. This can be done with tools like AppSweep, a free automated mobile app security testing tool that’s fully integrated into the development process. This helps you find and resolve issues ear...
Android Malware: How It Works and How to Safeguard Your App against It
Просмотров 3587 месяцев назад
In 2023, mobile malware attacks spiked by more than 50% compared to 2022. As the malware problem continues to grow in scale and sophistication, developers play an increasingly crucial role in ensuring the resiliency of their Android apps against it. Watch this on-demand webinar to learn: Android malware's most common distribution method, attack techniques, and behaviors. Recommended mitigation ...
Tip #1-Shift Testing Left: What Is Mobile Application Security Testing?
Просмотров 1958 месяцев назад
Tip #1-Shift Testing Left: What Is Mobile Application Security Testing?
How to Secure SoftPOS Mobile Apps to Comply with PCI MPoC
Просмотров 2828 месяцев назад
How to Secure SoftPOS Mobile Apps to Comply with PCI MPoC
What is Hooking? [ENGINEERS EXPLAIN]
Просмотров 5859 месяцев назад
What is Hooking? [ENGINEERS EXPLAIN]
MAST Techniques: What is Mobile Application Security Testing?
Просмотров 44611 месяцев назад
MAST Techniques: What is Mobile Application Security Testing?
Anatomy of an App: What is Mobile Application Security Testing?
Просмотров 301Год назад
Anatomy of an App: What is Mobile Application Security Testing?
Introduction: What is Mobile Application Security Testing?
Просмотров 875Год назад
Introduction: What is Mobile Application Security Testing?
Runtime Application Self Protection (RASP): What is Mobile Application Protection?
Просмотров 1,2 тыс.Год назад
Runtime Application Self Protection (RASP): What is Mobile Application Protection?
Polymorphism: What is Mobile Application Protection?
Просмотров 584Год назад
Polymorphism: What is Mobile Application Protection?
Class Encryption: What is Mobile Application Protection?
Просмотров 501Год назад
Class Encryption: What is Mobile Application Protection?
What Are Man at the End Attacks? [ENGINEERS EXPLAIN]
Просмотров 511Год назад
What Are Man at the End Attacks? [ENGINEERS EXPLAIN]
Code Virtualization: What is Mobile Application Protection?
Просмотров 614Год назад
Code Virtualization: What is Mobile Application Protection?
Arithmetic Obfuscation: What is Mobile Application Protection?
Просмотров 752Год назад
Arithmetic Obfuscation: What is Mobile Application Protection?
Control Flow Obfuscation: What is Mobile Application Protection?
Просмотров 742 тыс.Год назад
Control Flow Obfuscation: What is Mobile Application Protection?
Name Obfuscation: What is Mobile Application Protection?
Просмотров 325 тыс.Год назад
Name Obfuscation: What is Mobile Application Protection?
String Encryption: What is Mobile Application Protection?
Просмотров 90 тыс.Год назад
String Encryption: What is Mobile Application Protection?
Introduction: What is Mobile Application Protection?
Просмотров 47 тыс.Год назад
Introduction: What is Mobile Application Protection?
The Four Phases of a Mobile Application Attack
Просмотров 460Год назад
The Four Phases of a Mobile Application Attack
Why Multi-layered Mobile App Security is the Best Approach
Просмотров 1 тыс.2 года назад
Why Multi-layered Mobile App Security is the Best Approach
Find & Fix Android App Security Issues Earlier in the SDLC with AppSweep
Просмотров 3422 года назад
Find & Fix Android App Security Issues Earlier in the SDLC with AppSweep
3 Misconceptions about iOS Mobile App Security
Просмотров 2402 года назад
3 Misconceptions about iOS Mobile App Security
Protecting iOS In-App Purchases from Piracy Through Tweaks
Просмотров 1192 года назад
Protecting iOS In-App Purchases from Piracy Through Tweaks
Shifting Left: Benefits of Implementing Security Throughout the Mobile App Development Process
Просмотров 1402 года назад
Shifting Left: Benefits of Implementing Security Throughout the Mobile App Development Process
Inside the Attack: Understanding How Mobile Applications are Compromised
Просмотров 2222 года назад
Inside the Attack: Understanding How Mobile Applications are Compromised
Why a Comprehensive Approach to Mobile App Security Matters
Просмотров 982 года назад
Why a Comprehensive Approach to Mobile App Security Matters
Keep Rules in the Age of Kotlin - Droidcon London
Просмотров 5392 года назад
Keep Rules in the Age of Kotlin - Droidcon London
Cheer~~~the action of making something obscure, unclear, or unintelligible.😊
brooo better then most edited videos hats off
Thanks!
18:00
Hi! In the first attack you made, you said you repackaged the app. That means that user has to reinstall the app. So you can only do the attack if you have access to the actual device, correct? Nice explanation btw I really enjoyed it!
Thank you for your question! When talking about MiTM attacks, most people will understand it as a network attack where the attacker intercepts traffic from a victim (there are different ways to do so) and eavesdrops on the communication. The goal for the attacker is to listen in on data such as logins, or even edit data such as payments that are made. There's already a lot of techniques to prevent this e.g. browsers have built-in security features warning the users about this and SSL Pinning (without hardening from DG/iXG) will be enough. However, when we're talking about reverse engineering the idea is that the attacker performs a MiTM attack on their own device to listen in how the app communicates with its servers. The goal is to get a better understanding on how the server and app work together. This information can be used to plan a larger attack e.g. customized (modded) apps that make use of the service with additional features which are not desired by the app's developers, cheat in games, bypass license checks, etc.
How I can get the Demo Applications please?
Thanks for your interest-We do not plan to distribute the sample app as it wouldn't be responsible to publicly distribute code samples which demonstrate malware techniques. If you need guidance in implementing the right malware defence techniques for your use case, our team is here to help. You can also find more information regarding malware in our Mobile Application Security Research Center: www.guardsquare.com/mobile-app-security-research-center/malware/overview
Saint-Gobain Nestle sp bradil
Vakdemir Marinho Nascimento
Valdemir Marinho Nascimento
"explained" puttanaccialamadonnaccia
very clear explanation, thank you
Looks Good Amy!!
I just loved this ad.
Great video 📹 👍🏻 👏🏼
What an awesome video and ad. Well done marketing and sales team.
Also, is it possible that it's a False positive.
In theory yes. But we keep a close eye on false positives, and remove them as far as possible. In this case, detecting that SHA-1/MD5 is used somewhere is fairly easy, so I would be surprised if this is a false positive.
Hi Ryan, Thanks for this in-detail tutorial. I have one doubt regarding SHA-1 hashing algorithms. My Appsweep scan is showing issues related to Firebase library. It seems that Firebase sdk internally uses SHA-1 & MD-5 hashing. Could you help me to understand the solution for this vulnerannbility.
Hi. Solving issues in a library is a difficult topic. Depending on the severity there might be a newer version of the library that you can just use that solves it. For SHA-1/MD-5 in Firebase, I am not so sure this is changed with a newer release. Then the big question becomes what these hashing algorithms are used for. There are some use-cases imagineable where it can be tolerated, but if this is e.g., used in sensitive parts (e.g., touching PII), this might be a real problem. Figuring this out is difficult, as you would need to analyze all usages of these insecure algorithms by hand, and then judge if it is ok or not. What might be possible to file that question to the Firebase team directly. Sorry for the late reply, we missed this question. If you want to get in contact with an AppSweep engineer, and get help with scan results for example, the easiest is to use the chat on the bottom right. There we can help much more interactively.
I still don't understand the difference between Proguard and R8
1. Here's a blog written from the creator of ProGuard (and co-founder of Guardsquare) about this very topic back in 2019: www.guardsquare.com/blog/comparison-proguard-vs-r8-october-2019-edition 2. Here's another blog we published just last month discussing how relying on ProGuard or R8 to protect your Android apps is not a comprehensive security approach: www.guardsquare.com/blog/android-security-and-obfuscation-realities-of-r8 3. And if you want to learn more from the engineers at Guardsquare who work on ProGuard, check out our community where you can reach out directly to discuss ProGuard/R8 or many other mobile app security topics: community.guardsquare.com/
@@Guardsquare Thanks
Check Jack Wharton (square) talk
zamn where demo tho?
Here's a link to schedule a one-on-one demo if you're interested in learning more about how we secure mobile apps throughtout the development lifecycle: www.guardsquare.com/live-demo-request
mm this didnt explain much
If you’re looking to learn more about code virtualization and more broadly about multi-layered code obfuscation, here are two other resources that dive a bit deeper: 1. www.guardsquare.com/blog/dexguard-introduces-code-virtualization-android 2. www.guardsquare.com/blog/fortress-your-app-with-multi-layered-code-obfuscation
@@Guardsquare thank you!
@@GuardsquareLina ❤seliku Mama Memutarkan
Amazing thorough explanation, really appreciated!
Cool technology, but even cooler robot 🤗
ChatGPT probably rendering this obsolete
Could you expand on how you think ChatGPT could make obfuscation obsolete? Would you use it to add obfuscation to your code? Or use it to circumvent obfuscated code?
@@Guardsquare If the obfuscation is towards creating a cognitive barrier to overcome, so that if they reverse engineered it they would find a convoluted and hard to understand pile of code, one could provide the obfuscated code and ask it to refactor it, or to describe what is happening in detail. That things were spaghettified or some mathy calculations happened would be resolved quite quickly, since a person wouldn't need to sit down and detangle and map out what's going on.
Thank you for responding. Good reason to use multi-layered, polymorphic solutions that make obfuscation even more complex, and even more needed. A good resource is: www.guardsquare.com/blog/compiler-based-mobile-app-security-vs-app-shielding
@@Guardsquare Good luck.I don't know how far one would be able to get now with a decompiler / stack tracing / AI approach, but I'd surmise the clock is ticking (as it always is, regarding any methods of security)
Doesn't that increase processing requirements?
That's a valid question from a developer's perspective and we have already taken steps to address it, as we believe that security measures do not have to compromise app performance. To learn more, we suggest checking out a recent blog post we wrote on the topic: www.guardsquare.com/blog/balancing-performance-and-security-with-android-baseline-profiles-and-dexguard
Thank you for the very in-depth breakdown, it gave me a better understanding of the whole thing.
High-quality stuff! Love it.
The first attack u tried is one of the two approaches in minute 3:21? or this proxy server attack showed is another approach? can u please tell me how to run that first proxy server attack? Nice video <3
It's a nice useful app, but it can be improved. Coding is great ⭐
Very nice technically in-depth video. Also it was a pleasant surprise to see Objective-C in a video from 2021 haha.
No way this guy is a real person lmfao
🥰😍🥰😍🥰😍😘😍😘
A tip : you can watch series at Kaldrostream. I've been using them for watching lots of of movies these days.
@Eden Ronald definitely, have been watching on Kaldrostream for since november myself :)
6yoosuidod3219
Uug
Fffydz35s w5ada ň
٠تنغخاخةخلابتهةجةنىو😅
Eu gosto de muito de jogo Robin Hood Robin Hood que eu gosto Robin Hood
&!
top😀
1r
😎
Gjmo de vdd vc v.
Nada ver é english
Legal :D