#HITB2024BKK

  Рет қаралды 317

Hack In The Box Security Conference

Hack In The Box Security Conference

Күн бұрын

The popularity of the Flutter mobile application framework has surged in recent years, thanks to its versatility and ease of use. However, because Flutter is still relatively new, accessibility issues frequently arise in applications created with it. Consequently, developers have resorted to hardcoding sensitive information, such as keys and secret credentials, directly into their applications. Unfortunately, this practice poses significant security risks, especially with the emergence of new reverse engineering tools that can compromise supposedly secure data.
One such tool is B(l)utter, designed specifically for reverse engineering Flutter applications. With B(l)utter, developers can extract metadata and analyze compiled code, revealing symbols represented through a combination of pseudo code and assembly instructions. Leveraging this tool, I conducted a statistical analysis of 100 Flutter applications and made alarming discoveries. Among them, seven applications contained hardcoded information, potentially exposing them to exploitation. Shockingly, one of these apps included a private cryptographic key belonging to a widely used application boasting over 5 million users.
These vulnerabilities have serious ramifications since they may provide unauthorized access to private information or services.
In this session, I aim to demonstrate the methodology behind my research. We will delve into the process of gathering Flutter applications, utilizing the B(l)utter tool, and analyzing the decompiled data. Furthermore, I will provide detailed insights into my findings, including developmental stage information, exposed cryptographic keys, access tokens, and API keys. Developers and other stakeholders must be aware of the dangers that hardcoded credentials bring, and they must act quickly to fix these vulnerabilities.
===
I am a penetration tester specializing in mobile security, with an interest in reverse engineering, vulnerability research, and bug bounty programs. Currently, I am conducting research on the vulnerabilities of Flutter mobile applications.

Пікірлер
#HITB2024BKK #COMMSEC D2: Leveraging LLMs to Enhance Insider Threat Investigation Capabilities
34:39
#HITB2024BKK #COMMSEC D1: How a Combination of Bugs in KakaoTalk Compromises User Privacy
36:42
Hack In The Box Security Conference
Рет қаралды 244
Quilt Challenge, No Skills, Just Luck#Funnyfamily #Partygames #Funny
00:32
Family Games Media
Рет қаралды 55 МЛН
UFC 310 : Рахмонов VS Мачадо Гэрри
05:00
Setanta Sports UFC
Рет қаралды 1,2 МЛН
#HITB2024BKK #COMMSEC D1: CoralRaider Targets Victims Data and Social Media Accounts
30:20
Hack In The Box Security Conference
Рет қаралды 177
Netflix Removed React?
20:36
Theo - t3․gg
Рет қаралды 61 М.
FA2024 Week 14: Networking Security (2024-12-05)
42:24
SIGPwny
Рет қаралды 230
#HITB2024BKK #COMMSEC D2: TPMs and the Linux Kernel: A Better Path to Hardware Security
46:04
Hack In The Box Security Conference
Рет қаралды 123
#HITB2024BKK #COMMSEC D1: My First and Last Shellcode Loader
1:10:43
Hack In The Box Security Conference
Рет қаралды 541
#HITB2024BKK #COMMSEC D2: BadUSB Attacks on MacOS: Beyond Using the Terminal and Shell Commands
21:03
#HITB2024BKK #COMMSEC D2: Detecting Botnets via DNS Traffic Analysis Using Machine Learning
34:15
Quilt Challenge, No Skills, Just Luck#Funnyfamily #Partygames #Funny
00:32
Family Games Media
Рет қаралды 55 МЛН