From Collaborative RCE Knowledge Library

Jump to: navigation, search

Mobile Platforms


Item name: Subverting Windows Embedded CE 6 Kernel
Rating: 4.0 (1 vote)
Author: Petr Matousek                        
Home URL: http://www.fnop.org
Last updated: July 1, 2008
Version (if appl.):
Direct D/L link: http://www.fnop.org/public/download/COSEINC/subverting_wince6.pdf
Description: In this talk, the author (ex-member of 29A) presents various ways to subvert Windows Embedded CE 6 kernel to hide certain objects from the user. Architecture and inner mechanisms of the Windows Embedded CE 6 kernel and comparison with Windows CE 5 kernel are discussed first, with a focus on memory management, process management, syscall handling, and security.

Next Petr explains the methods he used for hiding processes, files, and registry keys - mainly direct kernel object manipulations, hooking of handle- and non-handle-based syscalls not only via apiset modifications but also using previously not documented ways. The author also discusses ways to detect rootkits installed on the device. A fully functional prototype rootkits, detection programs and various monitoring utilities are presented and examined.
Also listed in: Windows Mobile Internals Articles
More details: Click here for more details, images, related URLs & comments for this item! (or to update its entry)



Item name: An Analysis of the iKee.B (Duh) iphone Botnet
Rating: 0.0 (0 votes)
Author: Phillip Porras, Hassen Saidi & Vinod Yegneswaran                        
Home URL: http://mtc.sri.com
Last updated: December 14, 2009
Version (if appl.): 1.1
Direct D/L link: http://mtc.sri.com/iPhone/
Description: This article describes big steps in iKee.B analysis. This bot used to spread through jailbroken iPhone devices that had the original SSH password unchanged.
Also listed in: IPhone Malware Analysis Articles
More details: Click here for more details, images, related URLs & comments for this item! (or to update its entry)



Item name: Android Reverse Engineering - A Kick Start
Rating: 0.0 (0 votes)
Author: Dhanesh                        
Home URL: http://securityxploded.com/android_reversing.php
Last updated: November 14, 2010
Version (if appl.):
Direct D/L link: N/A
Description: The title pretty much says it all, get started with Android reversing!

Highlights of the Article:
* Show basic reversing of Andriod with simple crackme example
* Explains about the tools required for Andriod reversing and using them in right sequence.
* Describes in detail dissecting the Andriod code package to reveal the secrets.
Also listed in: Android Reversing Technique Articles, Android Reversing Technique Tutorials
More details: Click here for more details, images, related URLs & comments for this item! (or to update its entry)



Item name: DEX EDUCATION 201 ANTI-EMULATION
Rating: 0.0 (0 votes)
Author: Tim Strazzere                        
Home URL: N/A
Last updated:
Version (if appl.):
Direct D/L link: http://hitcon.org/2013/download/Tim%20Strazzere%20-%20DexEducation.pdf
Description: This is actually in continuance to http://www.woodmann.com/collaborative/knowledge/index.php/Dex_Education:_Practicing_Safe_Dex
The previous article is about Anti-Reversing against some of the Android Malware Analysis tools.
This paper is about Anti-Emulation for Android.
Also listed in: Android Anti Reversing Articles
More details: Click here for more details, images, related URLs & comments for this item! (or to update its entry)



Item name: Dex Education: Practicing Safe Dex
Rating: 0.0 (0 votes)
Author: Tim Strazzere                        
Home URL: N/A
Last updated:
Version (if appl.):
Direct D/L link: http://www.strazzere.com/papers/DexEducation-PracticingSafeDex.pdf
Description: This is probably the first public publication on how Tim deconstruct some of the intricacies of the dex file format and analyze how some of the Android tools parse and manage the dex format. Along the way he observed a number of easily exploitable functionality, documenting specifically why they fail and how to fix them. A proof of concept tool - APKfuscator - that shows how to exploit these flaws.
It introduces some of the basic Anti-Reversing against some of the Android tools that Malware Analyst use to analyse Android Malware.

You can find his POC here.
https://github.com/strazzere/APKfuscator

Also listed in: Android Anti Reversing Articles
More details: Click here for more details, images, related URLs & comments for this item! (or to update its entry)



Item name: Primer on Android OS Reversing
Rating: 0.0 (0 votes)
Author: Nieylana                        
Home URL: http://www.accessroot.com
Last updated: May 21, 2010
Version (if appl.):
Direct D/L link: http://www.accessroot.com/arteam/site/request.php?322
Description: This a tutorial which explains how to reverse Android OS applications. While most apps available are free, there are a few which are interesting to reverse. The video tutorial includes also the required reversing tools and instructions to setup your reversing lab.
Also listed in: Android Reversing Technique Tutorials
More details: Click here for more details, images, related URLs & comments for this item! (or to update its entry)




RSS feed Feed containing all updates and additions for this category.

RSS feed Feed containing all updates and additions for this category, including sub-categories.




No items can be added directly to this category, please rather select one of its sub-categories above to submit an item!

Views