Revenge of the Geeks: Hacking Fantasy Sports Sites

Wednesday, November 20 • 2:00 pm - 2:50 pm

In this talk, I’ll show how all my IT security geek friends in the OWASP community can win the Super Bowl! I’ll walk through the anatomy of a hack against popular Fantasy Football and Baseball mobile applications showing every “sneak play” required to control the application. The tools and techniques used in this hack can be applied against any mobile application. These applications leverage rich new formats like JSON and REST to deliver a rich user experience, and are not surprisingly exposing the same familiar vulnerabilities like SQL and command injection, yet are not being effectively tested.

In this particular application, mistakes with the application’s session management enable me to break down the nested communication formats and finally inject targeted payloads to manipulate both team lineups, to make sure my players were on top and to cause my opponents to lose. I also found that I could post false comments on the message board from the victims account.

After we walk through the sack, I mean hack, we’ll abstract these techniques, tie them directly to OWASP best practices, and apply them to other mobile applications so participants will walk away with specific tools and techniques to better understand mobile back-end hacking. Are you ready for some football?

This presentation will:
--Provide overview and details about each of the various formats (JSON, REST, SOAP, GWTk, and AMF) in popular use today
--Provide clear examples of basic mobile app insecurityRevenge of the Geeks: Hacking Fantasy Sports Sites In this talk, I’ll show how all my IT security geek friends in the OWASP community can win the Super Bowl! I’ll walk through the anatomy of a hack against popular Fantasy Football and Baseball mobile applications showing every “sneak play” required to control the application. The tools and techniques used in this hack can be applied against any mobile application. These applications leverage rich new formats like JSON and REST to deliver a rich user experience, and are not surprisingly exposing the same familiar vulnerabilities like SQL and command injection, yet are not being effectively tested. In this particular application, mistakes with the application’s session management enable me to break down the nested communication formats and finally inject targeted payloads to manipulate both team lineups, to make sure my players were on top and to cause my opponents to lose. I also found that I could post false comments on the message board from the victims account. After we walk through the sack, I mean hack, we’ll abstract these techniques, tie them directly to OWASP best practices, and apply them to other mobile applications so participants will walk away with specific tools and techniques to better understand mobile back-end hacking. Are you ready for some football?

This presentation will:

--Provide overview and details about each of the various formats (JSON, REST, SOAP, GWTk, and AMF) in popular use today --Provide clear examples of basic mobile app insecurity

--Demonstrate how to setup an environment to start watching mobile traffic, including how to leverage Wifi Pineapple hardware to set up a local access point

--Demonstrate how to inject malicious characters into these services to find vulnerabilities

--Discuss what tools are available to automate this process and make it a little easier

--Show examples of real vulnerabilities in mobile apps in use today

Attendees will be given a whitepaper with the details of the complete setup demonstrated in the talk.

Speaker:
Dan Kuykendall

Mr. Kuykendall is involved with Web Application Security Consortium, is regular contributor to many open source development projects. He was a founder of the phpGroupWare project and creator of podPress. Dan podcasts to educate the public about web application security issues from his blog at manvswebapp.com and as co-host of An Information Security Place Podcast. He has presented at HouSecCon, B-SidesLA, B-SidesSF, B-Sides Atlanta THOTCON, ToorCon and AppSec USA."

Mr. Kuykendall manages NT OBJECTives’ software development and handles NTO’s relationships with several partner companies. He has an extensive background in web application development and security. Dan joins NT OBJECTives from Foundstone, where he was responsible for the portal interface to the company’s flagship product, FoundScan. Prior to Foundstone, Dan was the founder of the Information Security team in the United States branches of Fortis."