mobile sec 2a Flashcards
• Since the launch of the App Store till 2013, over _ apps have
been released for purchase, with a total of over _apps having
been downloaded
800 thou, 40 bil
• Initially Apple Phones not Built ________
for great security.
ios As time passes, 3rd-party apps were executed under a less-privileged user
account named
mobile
code signature verification
security method used in ios
• Apps installed had to be signed by Apple to allow their execution.
• Ultimately, code signature verification was implemented at both load time
(within code responsible for launching an executable) as well as at runtime
(to prevent new code from being added to memory and then executed).
Today iOS has made great gains in terms of its security model ELABORATE
• In fact, the overall App Store–based app distribution process coupled
with the current set of security measures implemented in the
operating system have made iOS one of the most secure consumergrade operating systems available.
• This take on the OShas largely been validated by the relative absence
of known malicious attacks on the platform.
• With so many lines of code, of course iOS has weaknesses & still can
be hacked!
• Apple has toiled at length to prevent their customers from gaining full
access to their own devices. ELABORATE
• Now tools (online-may be malicious!) provide you with the capability to
jailbreak the iPhone.
• Jailbreaking-process of taking full control of an iOS-based device.
• Can be done by using one of several tools available for free online
• End result of a successful jailbreak is that you can tweak your iPhone with
custom themes, install utility apps or extensions to apps, configure the
device to allow remote access via SSH or VNC, install other arbitrary
software, or even compile software directly on the device.
Jailbreaking iPhones -Downsides
First - what jailbreak software does to a device.
• Jailbreak exploits a series of vulnerabilities to take over a device.
• During this process, an attacker could insert or modify something relatively
easily, without a user noticing.
• Fake jailbreak software was released that was designed to tempt eager
users looking to jailbreak versions of iOS for which no free/confirmedworking jailbreak had been released into installing the software.
• Jailbroken phones may also lose some functionality, as vendors have been
known to include checks in their apps that report errors or cause an app to
exit on startup (iBooks is an example of this).
Jailbreaking iPhones -Downsides MORE
Another important aspect of jailbreaking is, as part of the process,
code signature validation is disabled.
• This is one of a series of changes required for users to be able to run
arbitrary code on their devices (one of the goals of jailbreaking).
• Downside - unsigned malicious code is also able to run, increasing the
risk to the user of just such a thing occurring.
• Otherwise, some potential exists for “bricking,” or rendering a device
unusable, during the jailbreak process, and as jailbreaking voids a
device’s warranty, there’s likely no way to bring the device back from
the dead if this happens.
Jailbreaking iPhones -Downsides MORE MORE MORE
Jailbreaking iPhones -Downsides
• Many jailbroken iPhones are susceptible to worms, such as iKee.
• The iKee Worm was at its root only possible because of misconfigured
jailbroken iPhones being connected to the network.
• The first and most obvious countermeasure to an attack of this sort is:
don’t jailbreak your iPhone!
Another important aspect of jailbreaking is, as part of the process,
code signature validation is disabled.
Jailbreaking iPhones -Downsides ekie
- unsigned malicious code is also able to run, increasing the
risk to the user of just such a thing occurring
iKee
m was at its root only possible because of misconfigured
jailbroken iPhones being connected to the network
MITM (Man In The Middle) Attack
In October 2011, at the McAfee FOCUS 11 conference held in Las
Vegas, Stuart McClure and the McAfee TRACE team demonstrated a
series of hacks that included the live hack of an iPad.
• The attack performed involved setting up a MacBook Pro laptop with
2 wireless network interfaces and then configuring one of the
interfaces to serve as a malicious wireless access point (WAP).
• The WAP was given an SSID similar to the SSID for the conference’s
legitimate WAP.
• They did this to show that users could easily be tricked into
connecting to the malicious WAP.
MITM (Contermeasures
• Update your device and to keep it up to date, as outlined in “JBME3.0
Vulnerability Countermeasures.”
• Configure your iOS device to “Ask To Join Networks”, shown next pg
• Don’t connect to unknown wireless networks.
• The likelihood of anyone actually following that advice nowadays is,
of course, near zero (how else are you going to check Facebook while
at Starbucks?!?), but hey, we warned you!
MITM-Don’t Connect to Untrusted Network
• The FOCUS 11 demo showed that by simply connecting to a wireless
network and browsing to a web page it was possible to take complete
control of a device.
• This was possible even over SSL!
• As such, users should know that this can happen and should judge
carefully what networks they connect to, to avoid putting their
devices or sensitive information at risk.