+ All Categories
Home > Technology > iPown - Overview of iPhone security

iPown - Overview of iPhone security

Date post: 16-Jul-2015
Category:
Upload: smeetsm1
View: 179 times
Download: 1 times
Share this document with a friend
Popular Tags:
30
Marc Smeets Hacknet security conference September 9, 2009 HACKNET 2009 iPown Overview of iPhone security IT ADVISORY
Transcript
Page 1: iPown - Overview of iPhone security

Marc Smeets Hacknet security conference

September 9, 2009

HACKNET 2009

iPown Overview of iPhone security

IT ADVISORY

Page 2: iPown - Overview of iPhone security

1

What will we be talking about?

l A little iPhone background

l Known security issues with the iPhone

-  Misc. fixed and non fixed

-  Unlocking / jail breaking

-  Forensics on stored data

l Putting it together

Page 3: iPown - Overview of iPhone security

2

iPhone background

l  3 generations, first released in July 2007

l  Smart phone, running iPhone OS based on regular OS X => UNIX

l  32-bit ARM CPU @ 600MHz, 32GB, WiFi UMTS/HSDPA Q-band GSM, GPS, Bluetooth

l  Around 21 million units sold

l  Each country one official telcom provider

l  3rd party apps available in AppStore* 1.5 billion ‘purchases’

*AppStore heavily regulated by Apple

Page 4: iPown - Overview of iPhone security

3

iPhone background – making it corporate

l  In beginning mainly consumer oriented

l  Apple wants the businesses, businesses want the iPhone Latest software update ‘corporate’ support

-  Exchange (2007), CalDAV, IMAP, LDAP

-  Cisco VPN (also present in precious version)

-  Hardware encryption (3Gs only)

-  Remote wipe functionality

-  Configuration profiles

l  But management tools not yet sufficient (as competitors)

Page 5: iPown - Overview of iPhone security

4

Known security issues

Page 6: iPown - Overview of iPhone security

5

Known security issues - fixed

l  Bypassing PIN code and access parts of phone

-  Tap Emergency call, double tap home button. You are now in the Favorites section. From here you can call everybody, access email, access web sites, etc.

l  Every app runs as root

l  mDNSResponder service runs by default

l  SMS exploit issue as presented at BlackHat Vegas 2009

-  Not only for iPhone, also Android and Windows Mobile

-  Authors presented fuzzing framework for communication between CommCenter daemon and SMS application

Page 7: iPown - Overview of iPhone security

6

Known security issues – not fixed

l  “i-Phone-home” by PinchMedia http://i-phone-home.blogspot.com/2009/07/pinchmedia-anatomy-of-spyware-vendor.html

l Default framework for developers Includes: UDID, model, SW version, country, telephone nr

Page 8: iPown - Overview of iPhone security

7

Known security issues – not fixed

l Local accounts default passwords root : alpine mobile : dottie

l 2 days after release

l 16 sec cracking

Page 9: iPown - Overview of iPhone security

8

Known security issues – not fixed

l Two big issues not fixed by Apple

-  Unlocking and Jailbreaking attempts

-  iPhone forensics from physical access

Page 10: iPown - Overview of iPhone security

9

Unlocking and Jailbreaking

Page 11: iPown - Overview of iPhone security

10

Unlocking and jailbreaking

l The problem : 1. iPhone comes locked to 1 telcom provider 2. iPhone comes jailed to run only allowed apps from AppStore

l People want freedom of choice … or just other apps

l Hackers provide a solution

l Yellowsn0w, PwnageTool, ultrasn0w, redsn0w, etc.

Page 12: iPown - Overview of iPhone security

11

Unlocking and jailbreaking

l  Unlocking* Results in no more SIM lock. Any provider is accepted by phone.

l  Jailbreaking Results in no more only Apple approved software, hurray!

l  Proces: 1. Reboot iPhone into Device Firmware Upgrade (DFU) mode 2. Load modified firmware to bypass Apple’s restrictions 3. Install new Installer.app to easily add non Apple-apps

*Psst… Apple doesn’t really care…

Page 13: iPown - Overview of iPhone security

12

Unlocking and jail breaking

l Booting into DFU mode

l Documented feature for restoring crashed iPhones

l  iTunes can restore all types of firmware (baseband, OS, etc.)

Page 14: iPown - Overview of iPhone security

13

Unlocking and jail breaking

l Update running RAM disk

l Circumvent signed booting mechanism

l Upload new firmware / IPSW

Page 15: iPown - Overview of iPhone security

14

Unlocking and jail breaking

l Custom firmware has new Installer.app

l  Installing SSH is advised so you can add files to iPhone

l Now you start adding new software, ringtones, etc.

Page 16: iPown - Overview of iPhone security

15

iPhone forensics from physical access

Page 17: iPown - Overview of iPhone security

16

iPhone forensics from physical access

l Great work done by Jonathan Zdziarski !

l Main question: what data does your iPhone store?

l Gaining access for forensics (in 2 min.):

-  DFU mode

-  Upload custom firmware

-  SSH over WiFI or USBMUX Make iPhone image to work with

Page 18: iPown - Overview of iPhone security

17

iPhone forensics from physical access

l  So what does your iPhone store?

1. The usual:

-  Address book, email, photos (with GeoTags), call history, etc.

2. The expected (from a forensic point of view):

-  Deleted photo’s, browser cache, details on pairing with devices, etc.

3. The non expected:

-  Deleted voicemail, deleted sms, entered locations with Google maps, detailed call history, etc.

Page 19: iPown - Overview of iPhone security

18

iPhone forensics – where does it store Cont.

l  Disk layout: / : boot partition -ro /private/var : user data ( linked /var to /private/var )

l  SQLite databases store data

l  Binary Property lists store settings, properties and meta data. It is a binary xml file, read/write with plutil.

l  Many DB’s in /var/mobile/Library and /var/root/Library, i.e.: AddressBook.sqlitedb : All contact details CallHistory.db : recent history in DB, full history in file Calendar.sqlitedb : all past eand upcoming events sms.db : all(!) text messages, deleted stay Keychain.db : contain all passwords as normal keychain

(AES 256)

Page 20: iPown - Overview of iPhone security

19

iPhone forensics – where does it store Cont.

l Sqlite3 SMS.db “select * from messages;” | grep TAN

Page 21: iPown - Overview of iPhone security

20

iPhone forensics – where does it store Cont.

Page 22: iPown - Overview of iPhone security

21

iPhone forensics – encrypted disk

l  “Fortunately we have this awesome encrypted disk feature in the newest 3Gs!”

l  Technically yes, in practice … no

l  Disk is encrypted but the iPhone decrypts for you on the fly. It is iTunes’ decision to encrypt backup or not !? Password is stored in the iPhone and decrypts when data sending to iTunes

l  DFU mode, connect to system and run tool to overwrite password section in KeyChain DB. Connect to iTunes. iTunes still thinks its encrypted but there is no password. Hit backup and look in ~/Library/Application Support/MobileSync/Backup

Page 23: iPown - Overview of iPhone security

22

Putting the things together – a.k.a. attacking over the network

Page 24: iPown - Overview of iPhone security

23

Putting the things together – a.k.a. attacking over the network

l What we need: 1. IP level access 2. OS level access 3. Data level access

l How it is possible: 1. Full public IP access via 3G 2. Jailbroken and OpenSSH installed 3. it’s UNIX and we know where to look

Page 25: iPown - Overview of iPhone security

24

Putting the things together – a.k.a. attacking over the network

l May I remind you that people are lazy and don’t think of security !!

l 1. don’t change default passwords

l 2. don’t bother to upgrade once jailbroken

Page 26: iPown - Overview of iPhone security

25

Putting the things together – a.k.a. attacking over the network

Page 27: iPown - Overview of iPhone security

26

Putting the things together – a.k.a. attacking over the network

327 of 599 = 55% -> people that have jailbroken + ssh running 119 of 327 = 36% -> people that are lazy

119 of 599 = 19% of identified mobile phones are jailbroken iphones where you can login with default password

Page 28: iPown - Overview of iPhone security

27

Putting the things together – a.k.a. attacking over the network

Page 29: iPown - Overview of iPhone security

28

Putting the things together – attack scenarios

l  We haven’t even talked about application level exploits (e.g. Safari browser)

l  Anybody who can have your iPhone for a few minutes

l  Two-factor authentication for e-banking

l  Full user tracking with custom i-Phone-home

l  Staged attack into corporate network, its UNIX!

l  Ransomware??

l  SPAM?

l  Do businesses have possibilities for limiting usages of iPhone by their employees? No, employees will try to jailbreak and install stuff.

Page 30: iPown - Overview of iPhone security

29 © 2007 EDP Auditors N.V., a Dutch limited liability company and a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved. Printed in the Netherlands.

Marc Smeets KPMG IT Advisory ICT Security & Control The Netherlands +31 651 366 680 [email protected]

Thank you for listening!


Recommended