Teddy Rogers Posted August 17, 2011 Posted August 17, 2011 Honeynet Project Challenge 9Submissions to be submitted by September 4th 2011.With the number of smartphone users growing exponentially (1.6 billion mobile devices units sold in 2010, 19% were smartphones) mobile devices are becoming an attractive platform for cybercriminals. As a security researcher or enthusiast, you need to know your enemy and be able to defend yourself against these new kinds of threats.This challenge offers the exploration of a real smartphone, based on a popular OS, after a security incident.You will have to analyze the image of a portion of the file system, extract all that may look suspicious, analyze the threat and finally submit your forensic analysis. From File System recovery to Malware reverse-engineering and PCAP analysis, this challenge will take you to the world of Mobile Malwares.Questions:1. Write an executive summary of this incident (3 pts)2. Provide the phone brand, model, OS name and version (1 pts)3. Extract any suspicious application (if any). Detail your extraction method. Please provide name and SHA1 for each suspicious app.(4 pts)4. What permissions are requested by the malware(s)? Why it is suspicious ? (1 pts)5. Please provide a solution/s to quickly identify any suspicious API (please define your suspicious API according to your understanding) (8 pts)6. What is the malware's home server URL and where is it located? Where, in the code, is/are stored the command server(s) URL(s)(4 pts)7. What can you say about the communications model between the malware and its C&C server? (2 pts)8. If encryption was used for the communication, which encryption algorithm was used? What was the key used? Explain how you found it. (4 pts)9. Please draw a graph of the decrypted communication flow, found in the pcap, between the malware and the C&C (4 pts)10. What personnal informations were leaked during this incident? A special *secret* information was leaked, Explain how and what it was. (2 pts)11. What particular techniques are used by the malware to harden analysis or to evade detection? What unusual behavior can be noticed? (6 pts)12. Provide a detailled analysis of the malware behavior and features. (10 pts)13. Please provide a method to block (or request permission from Android (similar to UAC concept)) when any suspicious call received from Android (8 pts)https://www.honeynet.org/node/751http://malphx.free.f...es-final.tar.gzTed.
evlncrn8 Posted August 17, 2011 Posted August 17, 2011 Doesnt question 13 give at least one of the answers in question 2?
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now