← All talks

ParseDroid: Targeting The Android Development & Research Community

BSides Munich12:0848 viewsPublished 2019-03Watch on YouTube ↗
About this talk
by Alon Boxiner and Eran Vaknin APKTool is one of the most popular tools for reverse engineering third party, closed, binary Android applications. This tool is being vastly used by security researchers and analysts and as part of an automated analysis frameworks and online decompilers. Given these facts, we aimed our research to the products that we use on a daily basis and successfully found some critical vulnerabilities within “APKTool”. We found that “APKTool” is vulnerable to an injection of arbitrary files anywhere in the victim’s filesystem, potentially leading to a remote code execution in both online decompiling services and offline users. Therefore, by attacking this infrastructure, we succeeded in hitting and influencing so many famous products, and it is impossible to estimate the amount of products used and built upon this tool. Additionally, we have found that some of the most popular JAVA IDEs (such as Android Studio, Eclipse or IntelliJ IDEA) are vulnerable to some attack vectors as well. The combination of all of the vulnerabilities discovered creates a new attack surface against Android developers and security researchers. In this talk, we intend to introduce the audience to the research we have carried out and show how it was used to exploit APKTool, Android Studio and online decompilers.