QARK: Android App Exploit and SCA Tool

Presented at AppSec USA 2015, Sept. 24, 2015, 2 p.m. (55 minutes).

Ever wonder why there isn't a metasploit-style framework for Android apps? We did!

Whether you're a developer trying to protect your insecure app from winding up on user devices, an Android n00b or a pentester trying to pwn all the things, QARK is just what you've been looking for!

This tool combines Static Code Analysis with source-sink mapping, teaching by detailing misconfigurations, citing research detailing the issues and automatic exploitation into one, simple to use application!

Our tool will review any Android app, either from source or APK, highlight version specific issues, detail your app's attack surface, inspect all your app components for misconfigurations and allow you to create on-demand proof-of-concept attack applications.


Presenters:

  • Tushar Dalvi - Senior Information Security Engineer, Vulnerability Research & Assessment - LinkedIn
    Tushar loves breaking web applications and ceramic bowls. Tushar Dalvi is a security enthusiast, a pool hustler and currently works as a Senior Information Security Engineer at LinkedIn. He specializes in the area of application security, with a strong focus on vulnerability research and assessment of mobile applications. Previously, Tushar has worked as a security consultant at Foundstone Professional Services (McAfee) and as a Senior developer at ACI Worldwide.
  • Tony Trummer - Staff Information Security Engineer - LinkedIn
    I am a security enthusiast and passionate about Android security in particular. You can talk to me about anything from skateboarding to cosmology.

Links:

Similar Presentations: