This week, we will be looking at another Hardcoded issue and how to trace along the App. As we saw last week developers tend to hard code while developing certain functionalities during development phase and sometimes, they are plainly hidden which is difficult to uncover. Let us walk through DIVA – Hardcoded functionality exercise 12. We are not walking through sequentially on this DIVA challenge, rather based on issue to understand and focus.

Above Figures 1 to 3 show the App exercise 12 and error message “Access denied! See you in hell :D” displayed for the invalid vendor key. Let us check the source code decompiled using Jadx.

Click on “HardcodeActivity2” class under “jakhar.aseem.diva” package.

We can see there is a private object djni declared of type DivaJni which can possibly be a class. Followed by a method called “access”. Access method validates the input entered by user against some value and displays if user is granted access or not. But unlike in the previous exercise, it is not comparing straight against another hardcode value in source code.

 

Hardcoded Issues 1

Hardcoded Issue 1

Figure 4: Jadx Source code – Hardcoded Issue 1

 

 

Hardcoded Issues 2

Hardcoded issue 2

Figure 5: Jadx Source code – Hardcoded Issue 2

 

As in Figure 4 and Figure 5, we will compare the previous exercise and current one to investigate further. Hardcoded Issues 1 compares the user input with value “vendorsecretkey”. Whereas Hardcoded Issues2 is comparing user input against this.djni.access (which is possibly a method in djni object. We have seen earlier djni is an object of type DivaJni. DivaJni is a class which can be seen in Jadx source code view.

DivaJni-class-in-Jadx-view

Figure 6: DivaJni class in Jadx view

 

In DivaJni class, a static string variable is declared and assigned value “divajni”. Followed by System.loadLibrary(soName), which implies there is a library divajni in the App. Linux based library modules are compiled with .so extension. We can assume it will be “divajni.so”. On searching through the decompiled sourced, “libdivajni.so” library file can be found under “/diva/diva-beta/lib/x86_64/”. When apk file is decompiled, there will be multiple copies of “libdivajni.so”, but they are for different architecture like x86, x86_64, mips, mips64 etc.

DivaJni-class-in-Jadx-view

Figure 7: library libdivajni.so

Let us run the strings command on library file and analyse the contents.

Output of strings command on libdivajni.

Figure 8: Output of strings command on libdivajni.so

Analysing through the output, it looks mostly related to either:

Description Output values
Library name libdl.so, libc.so, libm.so etc
Method or property or some sort of keyword related .dynsym, .dynstr, .hash etc
Some hardcoded value not related to any of above two points

·  <$!H
· olsdfgad;lh
·  ;*3$”

 

Let us try one by one on the following values as vendor key:

  • <$!H
  • olsdfgad;lh
  • ;*3$”

 

While trying “olsdfgad;lh”,  the app provides access with the  following message “Access granted!, See you on the other side :)”. This implies the value is hardcoded in library. If source code is provided for static analysis, we can find the value under divajni.c under the location:

https://github.com/payatu/diva-android/blob/master/app/src/main/jni/divajni.c

: Original Source code with vendor key hardcoded

Figure 9: Original Source code with vendor key hardcoded

 

There are other ways to analyse the same hardcoded values. Tools like Radare2 and cutter are very helpful. In one of next few weeks’ post, I will provide how to use Radare2 and cutter to analyse this exercise and other challenges.

Remediation: It is recommended to not use any hardcoded values in the code as this provides a way to read the code after decompiling. A possible alternate is to use encryption and KeyStore to mitigate the issue. Make sure the app is using the Android KeyStore and Cipher mechanisms to securely store encrypted information on the device.

We will look into another type of vulnerability in the next post.

Join us in a partnership founded in research, education and execution

Our success is built on protecting our clients’ success. We have a distinguished track record of supporting our clients in building secure by design environments. Our consultants have successfully ushered in new security practices in leading pharmaceutical, energy and retail institutions. Bramfitt has over 50 specialists around the world and we are committed to forging long-term relationships with our clients, providing them with genuine insight and practical advice, and supporting them as they navigate the everchanging security landscape.

Let us be your partner for the next phase of your security journey.

EMEA Headquarters
Tower 42, 25 Old Broad Street London, EC2N 1HN
+44 (0) 208 187 4234
AMER Headquarters
45 Rockefeller Plaza, 20th Floor New York, NY 10111
+1 (800) 468-6046
APAC Headquarters
96 Wanneroo Rd, Yokine WA 6060, Australia
Social
iasme consortium
iasme consortium
cyber essentials
cyber essentials plus
iot security assured
pentest
ukas iso 9001ukas iso 27001
Back to top
Get in touch