SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Smartphone Insecurity


           
               Click to edit the outline text
           
                •
                   Georgia
               Click to         Weidman
               formatedit the outline text format
                
                   Second Outline Level
                    Second Outline Level
                     −
                     −   Third Outline Level
                         Third Outline Level
                          
                             Fourth Outline
                              Fourth Outline
Agenda


    Smartphone Security Basics

    Common Attack Vectors and Examples

    Mitigation Strategies

    Common vulnerabilities in 3rd party apps

    Attack strategies against apps

    Secure coding practices for developing apps
                                     
                                         Click to edit the outline text
                                     
                                         formatedit the outline text format
                                         Click to
                                          
                                             Second Outline Level
                                              Second Outline Level
                                               −
                                               −   Third Outline Level
                                                   Third Outline Level
                                                    
                                                       Fourth Outline
                                                        Fourth Outline
What is a smartphone?




                    
                        Click to edit the outline text
                    
                        formatedit the outline text format
                        Click to
                         
                            Second Outline Level
                             Second Outline Level
                              −
                              −   Third Outline Level
                                  Third Outline Level
                                   
                                      Fourth Outline
                                       Fourth Outline
What is a smartphone?




                    
                        Click to edit the outline text
                    
                        formatedit the outline text format
                        Click to
                         
                            Second Outline Level
                             Second Outline Level
                              −
                              −   Third Outline Level
                                  Third Outline Level
                                   
                                      Fourth Outline
                                       Fourth Outline
What’s on your phone


    Personal info



    Work info



    Location info


                              
                                  Click to edit the outline text

    Account info                  formatedit the outline text format
                              
                                  Click to
                                   
                                      Second Outline Level
                                       Second Outline Level
                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline
Do We Need Privacy? (SMS examples)


    “Hi meet me for lunch”



    “Meet me for lunch while my wife is out”



    “Here is your bank account credentials”


                                   
                                       Click to edit the outline text
                                   
                                       formatedit the outline text format
                                       Click to
                                        
                                           Second Outline Level
                                            Second Outline Level
                                             −
                                             −   Third Outline Level
                                                 Third Outline Level
                                                  
                                                     Fourth Outline
                                                      Fourth Outline
Attacks on Privacy (Infrastructure)


                                     Cell Network




                       
                           Click to edit the outline text
                       
                           formatedit the outline text format
                           Click to
                            
                               Second Outline Level
                                Second Outline Level
                                 −
                                 −   Third Outline Level
                                     Third Outline Level
                                       
                                          Fourth Outline
                                           Fourth Outline
Attacks on Privacy (Infrastructure)



                   ? ?                 Cell Network



            io n
         p t
     c ry
  E n
                         
                             Click to edit the outline text
                         
                             formatedit the outline text format
                             Click to
                              
                                 Second Outline Level
                                  Second Outline Level
                                   −
                                   −   Third Outline Level
                                       Third Outline Level
                                         
                                            Fourth Outline
                                             Fourth Outline
Is GSM traffic encrypted?

SMSPDU:07914140540510F1040B915117344588F100
000121037140044A0AE8329BFD4697D9EC37




                         
                             Click to edit the outline text
                         
                             formatedit the outline text format
                             Click to
                              
                                 Second Outline Level
                                  Second Outline Level
                                   −
                                   −   Third Outline Level
                                       Third Outline Level
                                        
                                           Fourth Outline
                                            Fourth Outline
Is GSM traffic encrypted?

SMSPDU:07914140540510F1040B915117344588F100
000121037140044A0AE8329BFD4697D9EC37




                         
                             Click to edit the outline text
                         
                             formatedit the outline text format
                             Click to
                              
                                 Second Outline Level
                                  Second Outline Level
                                   −
                                   −   Third Outline Level
                                       Third Outline Level
                                        
                                           Fourth Outline
                                            Fourth Outline
Is GSM traffic encrypted?

Sending Number: 1-571-435-4881
Data: hellohello




                           
                               Click to edit the outline text
                           
                               formatedit the outline text format
                               Click to
                                 
                                    Second Outline Level
                                     Second Outline Level
                                      −
                                      −   Third Outline Level
                                          Third Outline Level
                                           
                                              Fourth Outline
                                               Fourth Outline
2G(EDGE)


Bad crypto:


          Up to the base station


          Algorithms breakable


                                    Click to edit the outline text
                                        

          No authentication of base format
                                     stations
                                    Click to edit the outline text format
                                        



                                            
                                               Second Outline Level
                                                Second Outline Level
                                                 −
                                                 −   Third Outline Level
                                                     Third Outline Level
                                                      
                                                         Fourth Outline
                                                          Fourth Outline
Attacks on Privacy (Infrastructure)


                                     Cell Network




                       
                           Click to edit the outline text
                       
                           formatedit the outline text format
                           Click to
                                Research by: Chris Pagent
                            
                               Second Outline Level
                                Second Outline Level
                                 −
                                 −   Third Outline Level
                                     Third Outline Level
                                       
                                          Fourth Outline
                                           Fourth Outline
Attacks on Privacy (Infrastructure)


                                     Cell Network




                       
                           Click to edit the outline text
                       
                           formatedit the outline text format
                           Click to
                                Research by: Chris Pagent
                            
                               Second Outline Level
                                Second Outline Level
                                 −
                                 −   Third Outline Level
                                     Third Outline Level
                                       
                                          Fourth Outline
                                           Fourth Outline
Breaking 2G Crypto


Break session key to get on the network


A5/2 trivial to break


Karsten Nohl broke A5/1 in 2009 in minutes


                                 
                                     Click to edit the outline text
                                 
                                     formatedit the outline text format
                                     Click to
                                      
                                         Second Outline Level
                                          Second Outline Level
                                           −
                                           −   Third Outline Level
                                               Third Outline Level
                                                
                                                   Fourth Outline
                                                    Fourth Outline
Attacks on Privacy (Infrastructure)


                                     Cell Network




                       
                           Click to edit the outline text
                       
                           formatedit the outline text format
                           Click to
                                Research by: Chris Pagent
                            
                               Second Outline Level
                                Second Outline Level
                                 −
                                 −   Third Outline Level
                                     Third Outline Level
                                       
                                          Fourth Outline
                                           Fourth Outline
Who cares about EDGE anyway?


    Still deployed



    By default phones will drop back to EDGE



    Is anyone on EDGE right now?


                                   
                                       Click to edit the outline text
                                   
                                       formatedit the outline text format
                                       Click to
                                        
                                           Second Outline Level
                                            Second Outline Level
                                             −
                                             −   Third Outline Level
                                                 Third Outline Level
                                                  
                                                     Fourth Outline
                                                      Fourth Outline
Mitigation Strategies


    Replace 2G



    Option to turn off 2G on phones



    Encrypt data on phones before sending


                                  
                                      Click to edit the outline text
                                  
                                      formatedit the outline text format
                                      Click to
                                       
                                          Second Outline Level
                                           Second Outline Level
                                            −
                                            −   Third Outline Level
                                                Third Outline Level
                                                 
                                                    Fourth Outline
                                                     Fourth Outline
Attacks on Privacy (Platform)




              =
Attackers know how to attack these platforms



                                  
                                      Click to edit the outline text
                                  
                                      formatedit the outline text format
                                      Click to
                                       
                                          Second Outline Level
                                           Second Outline Level
                                            −
                                            −   Third Outline Level
                                                Third Outline Level
                                                 
                                                    Fourth Outline
                                                     Fourth Outline
Rooting/Jailbreaking


    Exploiting kernel/platform flaws



    Client side attacks



    Gain system level privileges similarly to PC platforms


                                       
                                           Click to edit the outline text
                                       
                                           formatedit the outline text format
                                           Click to
                                            
                                               Second Outline Level
                                                Second Outline Level
                                                 −
                                                 −   Third Outline Level
                                                     Third Outline Level
                                                      
                                                         Fourth Outline
                                                          Fourth Outline
JailbreakMe 3.0


    iPhone jailbreak



    Client side flaw in PDF (Mobile Safari)



    Kernel exploit


                                    
                                        Click to edit the outline text
                                    
                                        formatedit the outline text format
                                        Click to
                                         
                                            Second Outline Level
                                             Second Outline Level
                                              −
                                              −   Third Outline Level
                                                  Third Outline Level
                                                   
                                                      Fourth Outline
                                                       Fourth Outline
Rootstrap


    Android app loads kernel exploits



    Loads code dynamically



    Runs native code


                                    
                                        Click to edit the outline text

    Packaged with interesting app       formatedit the outline text format
                                    
                                        Click to
                                         
                                            Second Outline Level
                                             Second Outline Level
                                              −
                                              −   Third Outline Level
                                                  Third Outline Level
                                                   
                                                      Fourth Outline
                                                       Fourth Outline
DroidDream


    Android app in the market



    Rooted phones via kernel exploits



    Stole information


                                  
                                        Click to edit the outline text

    Ran up charges                      formatedit the outline text format
                                  
                                        Click to
                                         
                                            Second Outline Level
                                             Second Outline Level
                                              −
                                              −   Third Outline Level
                                                  Third Outline Level
                                                   
                                                      Fourth Outline
                                                       Fourth Outline
Payload example: SMS botnet




                    
                        Click to edit the outline text
                    
                        formatedit the outline text format
                        Click to
                         
                            Second Outline Level
                             Second Outline Level
                              −
                              −   Third Outline Level
                                  Third Outline Level
                                   
                                      Fourth Outline
                                       Fourth Outline
Payload example: SMS botnet




                    
                        Click to edit the outline text
                    
                        formatedit the outline text format
                        Click to
                         
                            Second Outline Level
                             Second Outline Level
                              −
                              −   Third Outline Level
                                  Third Outline Level
                                   
                                      Fourth Outline
                                       Fourth Outline
Payload example: SMS botnet




                    
                        Click to edit the outline text
                    
                        formatedit the outline text format
                        Click to
                         
                            Second Outline Level
                             Second Outline Level
                              −
                              −   Third Outline Level
                                  Third Outline Level
                                   
                                      Fourth Outline
                                       Fourth Outline
Payload example: SMS botnet




                    
                        Click to edit the outline text
                    
                        formatedit the outline text format
                        Click to
                         
                            Second Outline Level
                             Second Outline Level
                              −
                              −   Third Outline Level
                                  Third Outline Level
                                   
                                      Fourth Outline
                                       Fourth Outline
SMS PDU

SMSPDU:07914140540510F1040B915117344588F100
000121037140044A0AE8329BFD4697D9EC37




                        
                            Click to edit the outline text
                        
                            formatedit the outline text format
                            Click to
                             
                                Second Outline Level
                                 Second Outline Level
                                  −
                                  −   Third Outline Level
                                      Third Outline Level
                                       
                                          Fourth Outline
                                           Fourth Outline
How the Botnet Works


1.   Bot Receives a Message


3.   Bot Decodes User Data


5.   Checks for Bot Key


                              
                                  Click to edit the outline text
7.   Performs Functionality       formatedit the outline text format
                              
                                  Click to
                                   
                                      Second Outline Level
                                       Second Outline Level
                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline
How the Botnet Works


1.   Bot Receives a Message


3.   Bot Decodes User Data


5.   Checks for Bot Key


                              
                                  Click to edit the outline text
7.   Performs Functionality       formatedit the outline text format
                              
                                  Click to
                                   
                                      Second Outline Level
                                       Second Outline Level
                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline
How the Botnet Works


1.   Bot Receives a Message


3.   Bot Decodes User Data


5.   Checks for Bot Key


                              
                                  Click to edit the outline text
7.   Performs Functionality       formatedit the outline text format
                              
                                  Click to
                                   
                                      Second Outline Level
                                       Second Outline Level
                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline
How the Botnet Works


1.   Bot Receives a Message


3.   Bot Decodes User Data


5.   Checks for Bot Key (Swallows Message)


                               
                                   Click to edit the outline text
7.   Performs Functionality        formatedit the outline text format
                               
                                   Click to
                                    
                                       Second Outline Level
                                        Second Outline Level
                                         −
                                         −   Third Outline Level
                                             Third Outline Level
                                              
                                                 Fourth Outline
                                                  Fourth Outline
How the Botnet Works


1.   Bot Receives a Message


3.   Bot Decodes User Data


5.   Checks for Bot Key


                              
                                  Click to edit the outline text
7.   Performs Functionality       formatedit the outline text format
                              
                                  Click to
                                   
                                      Second Outline Level
                                       Second Outline Level
                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline
Demo




 Demo of Botnet Click to edit the outline text
                Payload


                       
                           formatedit the outline text format
                           Click to
                            
                               Second Outline Level
                                Second Outline Level
                                 −
                                 −   Third Outline Level
                                     Third Outline Level
                                      
                                         Fourth Outline
                                          Fourth Outline
Mitigations for Platform Attacks


    Updating



    Better sandboxing



    Vigilance from users


                             
                                 Click to edit the outline text
                             
                                 formatedit the outline text format
                                 Click to
                                  
                                     Second Outline Level
                                      Second Outline Level
                                       −
                                       −   Third Outline Level
                                           Third Outline Level
                                            
                                               Fourth Outline
                                                Fourth Outline
App attacks on privacy




                     
                         Click to edit the outline text
                     
                         formatedit the outline text format
                         Click to
                          
                             Second Outline Level
                              Second Outline Level
                               −
                               −   Third Outline Level
                                   Third Outline Level
                                    
                                       Fourth Outline
                                        Fourth Outline
App Stores


    iPhone
    
        Expensive
    
        Closed
    
        Identity verified




    Android
    
        Cheap               
                                Click to edit the outline text
                                formatedit the outline text format
    
        Self Signed         
                                Click to
                                 
                                    Second Outline Level
                                     Second Outline Level
    
        Open
                                      −
                                      −   Third Outline Level
                                          Third Outline Level
    
        Anonymous                              Fourth Outline
                                               Fourth Outline
                                           
                                           
Android Permission Model


    Specifically request permissions



    Users must accept at install



    Send SMS, Receive SMS, GPS location


                                   
                                       Click to edit the outline text
                                   
                                       formatedit the outline text format
                                       Click to
                                        
                                           Second Outline Level
                                            Second Outline Level
                                             −
                                             −   Third Outline Level
                                                 Third Outline Level
                                                  
                                                     Fourth Outline
                                                      Fourth Outline
App attacks on privacy




Is this system working? Are users
making good decisions about
apps?                 Click to edit the outline text
                              


                              
                                  formatedit the outline text format
                                  Click to
                                   
                                      Second Outline Level
                                       Second Outline Level
                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline
Top Android App of All Time




                     
                         Click to edit the outline text
                     
                         formatedit the outline text format
                         Click to
                          
                             Second Outline Level
                              Second Outline Level
                               −
                               −   Third Outline Level
                                   Third Outline Level
                                    
                                       Fourth Outline
                                        Fourth Outline
Demo




Demo: App Abusing Permissions
                
                    Click to edit the outline text
                
                    formatedit the outline text format
                    Click to
                     
                        Second Outline Level
                         Second Outline Level
                          −
                          −   Third Outline Level
                              Third Outline Level
                               
                                  Fourth Outline
                                   Fourth Outline
App Attacks Mitigations


    Oversight on apps



    Analysis of permissions



    User awareness


                              
                                  Click to edit the outline text
                              
                                  formatedit the outline text format
                                  Click to
                                   
                                      Second Outline Level
                                       Second Outline Level
                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline
Vulnerabilities in Android Apps


    No coding standards for Android apps



    Badly coded apps



    Data Leak


                                  
                                      Click to edit the outline text

    Permission Leak                   formatedit the outline text format
                                  
                                      Click to
                                       
                                          Second Outline Level
                                           Second Outline Level
                                            −
                                            −   Third Outline Level
                                                Third Outline Level
                                                 
                                                    Fourth Outline
                                                     Fourth Outline
Data Leak


    Access to sensitive data



    Insecure storage
    
        sdcard
    
        World readable
    
        Stored in source code

                                
                                    Click to edit the outline text
                                
                                    formatedit the outline text format
                                    Click to
                                     
                                        Second Outline Level
                                         Second Outline Level
                                          −
                                          −   Third Outline Level
                                              Third Outline Level
                                               
                                                  Fourth Outline
                                                   Fourth Outline
Return to the Source


    Free tools available



    Complete source available



    Don’t store secrets here


                                
                                    Click to edit the outline text
                                
                                    formatedit the outline text format
                                    Click to
                                     
                                        Second Outline Level
                                         Second Outline Level
                                          −
                                          −   Third Outline Level
                                              Third Outline Level
                                               
                                                  Fourth Outline
                                                   Fourth Outline
Demo




DEMO: Abusing bad storage practices
                    
                        Click to edit the outline text
                    
                        formatedit the outline text format
                        Click to
                         
                            Second Outline Level
                             Second Outline Level
                              −
                              −   Third Outline Level
                                  Third Outline Level
                                   
                                      Fourth Outline
                                       Fourth Outline
Mitigating this risk


    Store sensitive data privately



    Don’t use the sdcard



    Don’t put secrets in source code


                                     
                                         Click to edit the outline text
                                     
                                         formatedit the outline text format
                                         Click to
                                          
                                             Second Outline Level
                                              Second Outline Level
                                               −
                                               −   Third Outline Level
                                                   Third Outline Level
                                                    
                                                       Fourth Outline
                                                        Fourth Outline
Permission leak through components


    Other apps can call public components



    That’s a reason Android is awesome



    If not used safely, this can be dangerous


                                   
                                       Click to edit the outline text
                                   
                                       formatedit the outline text format
                                       Click to
                                        
                                           Second Outline Level
                                            Second Outline Level
                                             −
                                             −   Third Outline Level
                                                 Third Outline Level
                                                  
                                                     Fourth Outline
                                                      Fourth Outline
Demo




DEMO: Stealing permissions from exposed
components
                       
                           Click to edit the outline text
                       
                           formatedit the outline text format
                           Click to
                            
                               Second Outline Level
                                Second Outline Level
                                 −
                                 −   Third Outline Level
                                     Third Outline Level
                                      
                                         Fourth Outline
                                          Fourth Outline
Mitigating This Risk


    Require permissions to access components



    Use custom permissions



    Don’t have dangerous functionality accessible without
    user interaction
                                   
                                       Click to edit the outline text
                                   
                                       formatedit the outline text format
                                       Click to
                                        
                                           Second Outline Level
                                            Second Outline Level
                                             −
                                             −   Third Outline Level
                                                 Third Outline Level
                                                  
                                                     Fourth Outline
                                                      Fourth Outline
Contact




                Georgia Weidman
    Security Consultant, Researcher, Trainer
    Website: http://www.georgiaweidman.com
Slides: http://www.slideshare.net/georgiaweidman
                            Click to edit the outline text
                                

         Email:georgia@grmn00bs.com
                            formatedit the outline text format
                            Click to
                                



           Twitter: @georgiaweidman Outline Level
                                Second Outline Level
                                    
                                Second
                                    



                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline

Weitere ähnliche Inhalte

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Smartphone Insecurity

  • 1. Smartphone Insecurity  Click to edit the outline text  • Georgia Click to Weidman formatedit the outline text format   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 2. Agenda  Smartphone Security Basics  Common Attack Vectors and Examples  Mitigation Strategies  Common vulnerabilities in 3rd party apps  Attack strategies against apps  Secure coding practices for developing apps  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 3. What is a smartphone?  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 4. What is a smartphone?  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 5. What’s on your phone  Personal info  Work info  Location info  Click to edit the outline text  Account info formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 6. Do We Need Privacy? (SMS examples)  “Hi meet me for lunch”  “Meet me for lunch while my wife is out”  “Here is your bank account credentials”  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 7. Attacks on Privacy (Infrastructure) Cell Network  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 8. Attacks on Privacy (Infrastructure) ? ? Cell Network io n p t c ry E n  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 9. Is GSM traffic encrypted? SMSPDU:07914140540510F1040B915117344588F100 000121037140044A0AE8329BFD4697D9EC37  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 10. Is GSM traffic encrypted? SMSPDU:07914140540510F1040B915117344588F100 000121037140044A0AE8329BFD4697D9EC37  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 11. Is GSM traffic encrypted? Sending Number: 1-571-435-4881 Data: hellohello  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 12. 2G(EDGE) Bad crypto: Up to the base station Algorithms breakable Click to edit the outline text  No authentication of base format stations Click to edit the outline text format    Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 13. Attacks on Privacy (Infrastructure) Cell Network  Click to edit the outline text  formatedit the outline text format Click to Research by: Chris Pagent   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 14. Attacks on Privacy (Infrastructure) Cell Network  Click to edit the outline text  formatedit the outline text format Click to Research by: Chris Pagent   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 15. Breaking 2G Crypto Break session key to get on the network A5/2 trivial to break Karsten Nohl broke A5/1 in 2009 in minutes  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 16. Attacks on Privacy (Infrastructure) Cell Network  Click to edit the outline text  formatedit the outline text format Click to Research by: Chris Pagent   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 17. Who cares about EDGE anyway?  Still deployed  By default phones will drop back to EDGE  Is anyone on EDGE right now?  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 18. Mitigation Strategies  Replace 2G  Option to turn off 2G on phones  Encrypt data on phones before sending  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 19. Attacks on Privacy (Platform) = Attackers know how to attack these platforms  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 20. Rooting/Jailbreaking  Exploiting kernel/platform flaws  Client side attacks  Gain system level privileges similarly to PC platforms  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 21. JailbreakMe 3.0  iPhone jailbreak  Client side flaw in PDF (Mobile Safari)  Kernel exploit  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 22. Rootstrap  Android app loads kernel exploits  Loads code dynamically  Runs native code  Click to edit the outline text  Packaged with interesting app formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 23. DroidDream  Android app in the market  Rooted phones via kernel exploits  Stole information  Click to edit the outline text  Ran up charges formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 24. Payload example: SMS botnet  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 25. Payload example: SMS botnet  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 26. Payload example: SMS botnet  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 27. Payload example: SMS botnet  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 28. SMS PDU SMSPDU:07914140540510F1040B915117344588F100 000121037140044A0AE8329BFD4697D9EC37  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 29. How the Botnet Works 1. Bot Receives a Message 3. Bot Decodes User Data 5. Checks for Bot Key  Click to edit the outline text 7. Performs Functionality formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 30. How the Botnet Works 1. Bot Receives a Message 3. Bot Decodes User Data 5. Checks for Bot Key  Click to edit the outline text 7. Performs Functionality formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 31. How the Botnet Works 1. Bot Receives a Message 3. Bot Decodes User Data 5. Checks for Bot Key  Click to edit the outline text 7. Performs Functionality formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 32. How the Botnet Works 1. Bot Receives a Message 3. Bot Decodes User Data 5. Checks for Bot Key (Swallows Message)  Click to edit the outline text 7. Performs Functionality formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 33. How the Botnet Works 1. Bot Receives a Message 3. Bot Decodes User Data 5. Checks for Bot Key  Click to edit the outline text 7. Performs Functionality formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 34. Demo Demo of Botnet Click to edit the outline text Payload  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 35. Mitigations for Platform Attacks  Updating  Better sandboxing  Vigilance from users  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 36. App attacks on privacy  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 37. App Stores  iPhone  Expensive  Closed  Identity verified  Android  Cheap  Click to edit the outline text formatedit the outline text format  Self Signed  Click to   Second Outline Level Second Outline Level  Open − − Third Outline Level Third Outline Level  Anonymous Fourth Outline Fourth Outline  
  • 38. Android Permission Model  Specifically request permissions  Users must accept at install  Send SMS, Receive SMS, GPS location  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 39. App attacks on privacy Is this system working? Are users making good decisions about apps? Click to edit the outline text   formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 40. Top Android App of All Time  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 41. Demo Demo: App Abusing Permissions  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 42. App Attacks Mitigations  Oversight on apps  Analysis of permissions  User awareness  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 43. Vulnerabilities in Android Apps  No coding standards for Android apps  Badly coded apps  Data Leak  Click to edit the outline text  Permission Leak formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 44. Data Leak  Access to sensitive data  Insecure storage  sdcard  World readable  Stored in source code  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 45. Return to the Source  Free tools available  Complete source available  Don’t store secrets here  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 46. Demo DEMO: Abusing bad storage practices  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 47. Mitigating this risk  Store sensitive data privately  Don’t use the sdcard  Don’t put secrets in source code  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 48. Permission leak through components  Other apps can call public components  That’s a reason Android is awesome  If not used safely, this can be dangerous  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 49. Demo DEMO: Stealing permissions from exposed components  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 50. Mitigating This Risk  Require permissions to access components  Use custom permissions  Don’t have dangerous functionality accessible without user interaction  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 51. Contact Georgia Weidman Security Consultant, Researcher, Trainer Website: http://www.georgiaweidman.com Slides: http://www.slideshare.net/georgiaweidman Click to edit the outline text  Email:georgia@grmn00bs.com formatedit the outline text format Click to  Twitter: @georgiaweidman Outline Level Second Outline Level  Second  − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline

Hinweis der Redaktion

  1. Ubiquitous. Rural areas Saving my battery during a hurricane
  2. Edit and Read SMS, send SMS, receive SMS Modify/delete USB storage contents Prevent phone from sleeping, write sync settings GPS data Services that cost you money Act as account authenticator, manage accounts Read and write to your personal information including contact data Phone calls, read phone state and identity Full network access