Black Endless Mobile Security "Vulnerability"

Hai Yun'an looked at how security happened from the perspective of attackers. The main battlefield for future security will be the cloud. In the future, the mobile market will definitely become the protagonist of our entire life. Because mobile is the protagonist, the theft of mobile security information, as well as the theft of our assets, etc., where there is a protagonist, there will be harm. We see the trend of foreign security development, especially the well-known Owasp in the world.



From the perspective of hacker attacks, analyze the main battlefield of future attacks, because hard applications can be avoided in many ways by reading books, online, and collecting information in the community. But when hackers attack, if you find the data that the attack wants to get, you need to balance the cost of the attack. If the complete analysis brings confusion, I will bring confusion to prevent others from being able to quickly separate the logic between the codes. But hackers also know that you have done a lot of comparisons, and they will change their minds, and they will exploit the flaws of one's programming flaws, because hackers ultimately want to get the information about the connection between the mobile terminal and the final core database, and the user's information. , and asset theft via flaws. Hackers' attacks have evolved from an application to a logic.

Every time a hacker launches an attack, there is a cost. The purpose of protection is to increase the cost of hacking. Whether it is code obfuscation or reinforcement, if the cost increases, the hacker may give up the attack, but he will look for new breakthroughs. This is the business logic design defect in the mobile terminal that I will tell you below, and why the business logic design defect will become a major direction in the future.

  ● The application logic exists like a god, and the old programmers are also doomed, because the development of the business makes the programmers unable to prepare the code quickly.

  ● Security developers also cannot safely avoid application design flaws.

  ● About half of the loopholes in the app itself are business loopholes, and there is no automated procedure for its own logic loopholes to prompt all staff to discover it.

  ● Business logic exploits exploit the flaws of the developers themselves, causing them to escape from various protections, whether code obfuscation, hardening, etc.

Business logic loopholes appear because of rapid business development, different development levels, third-party defects, and lax internal supervision. The most common business logic vulnerability is the problem of account login restrictions. There are also security issues, and password resets will also be found. There are also mobile phone numbers + my verification code, which makes it possible for hackers to use the verification code to crack. Another common security problem is the client application on the App side. .

As our business grows, find another gesture password in the financial industry, as well as in our social sphere. In fact, the security of gesture password is still possible, but there are many unlocking gesture passwords, and there are many ways to modify the gesture password. The most common ones are brute force cracking, and to modify this file to reset the local gesture password.

On many platforms, the sending of security data is closely related to the test interface of our App. Security is actually in all aspects. We should not only pay attention to application vulnerabilities, but also third-party interface vulnerabilities.

At present, Haiyunan has launched the most in-depth and comprehensive APP security testing service in China. Through simple online registration ( www.secidea.com ), you can immediately use it to conduct APP security testing and evaluation, and download the detailed testing analysis report. You have a clear understanding of the security vulnerability status of the application, and you are welcome to experience it.


Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=326083590&siteId=291194637