Try   HackMD

Reverse Engineering Project - Uniken Security

Introduction

Uniken Security is an Indian company used by many banks and financial firms to protect their end-user applications by a product called REL-ID.

There is unfortunately very little research literature available about the product or data about how it works.

REL-ID

REL-ID is a end-user security product that does end-device data collection to detect malicious activity to slow down attackers.

Among it's various claims:

The following links explain a bit about how it works:

Available Applications

Android

iOS

Windows

Documentation

Project Details

Uniken uses multiple methods to evade detection and reverse-engineering of APIs, the primary of which is a custom TLS implementation. The project is to reverse-engineer this implementation to get cleartext transmissions for any of the above apps. An explanation of the protocol is needed as well, and a Wireshark plugin that decodes the same will be a bonus.

While the above apps might be easier to work on if you have an account with the corresponding bank, all of them use the network even before you login. This gives an opportunity to understand the protocol even if you can't login to the app. As an example, here is a network capture from the Windows MahaSecure app before it reaches the login screen.

Deliverables

Breaking this into sections so it's easier.

Checkpoint 1

  1. A working disassembly of the application.
  2. With bypasses for any root detections or SSL Pinnings.

Checkpoint 2

  1. An explanation of the Uniken TLS protocol, in markdown format.

Checkpoint 3

  1. A re-implementation of the application in any programming language which successfully logs in.
  2. A Wireshark plugin that automatically decodes Uniken packet dumps.
  • I will setup a Signal group for anyone working on the project.
  • I'm reachable at me@captnemo.in for any queries.
  • In case any vulnerabilities are identified during this work, they will be reported to the appropriate authorities before any publication.
  • While this is totally legal as legitimite security research, publishing reverse-engineered code, or re-implementations of the codebase (deliverable 3) might result in legal action (DMCA or more). As such, publishing working re-implementations is not advised.

Rewards

  1. 10k INR for each of the checkpoints, total across your team.
  2. If the result of Checkpoint 2 is good enough, or if you clear Checkpoint 3, I will help you polish your work to a research paper and help you apply to various security conferences (non-academic, the hacker-y kind).

Timeline

No timelines for the project, you can do this at your own pace. I expect Checkpoint 1 to be quick to reach, but (2) to be much harder.