+ All Categories
Home > Technology > Smart Bombs: Mobile Vulnerability and Exploitation

Smart Bombs: Mobile Vulnerability and Exploitation

Date post: 23-Jan-2015
Category:
Upload: securestate
View: 1,509 times
Download: 1 times
Share this document with a friend
Description:
Tom Eston has spent quite a bit of time evaluating mobile applications. In this presentation he will provide the audience with a high level understanding of what the risks are, how to evaluate mobile applications and provide examples of how things have been done wrong. Tom has used a variety of the top 25 applications downloaded from the Apple App Store and Google Play to provide real world examples of the problems applications face. Tom has mapped out how these applications are vulnerable to the OWASP Mobile Top 10 security issues.
52
Smart Bombs: Mobile Vulnerability and Exploitation Tom Eston
Transcript
Page 1: Smart Bombs: Mobile Vulnerability and Exploitation

Smart Bombs: Mobile Vulnerability and Exploitation Tom Eston

Page 2: Smart Bombs: Mobile Vulnerability and Exploitation

2 http://youtu.be/cir-MOzVggQ

Grilled Smart Phones

Page 3: Smart Bombs: Mobile Vulnerability and Exploitation

3

Windows Mobile Wins!

Page 4: Smart Bombs: Mobile Vulnerability and Exploitation

Tom Eston

• Manager, SecureState Profiling &

Penetration Team

• Blogger – SpyLogic.net

• Infrequent Podcaster – Security

Justice/Social Media Security

• Zombie aficionado

• I like to break new technology

4

Page 5: Smart Bombs: Mobile Vulnerability and Exploitation

What are we talking about today?

• What’s at risk?

• Tools, Testing and Exploitation

• Common vulnerabilities found in popular apps

(this is the fun part)

• Special thanks to Kevin Johnson and John Sawyer who

helped with this research!

5

Page 6: Smart Bombs: Mobile Vulnerability and Exploitation

What are Smart Bombs?

• We’ve got powerful technology in the palm of

our hands!

• We store and transmit sensitive data

• Mobile devices are being used by:

– Major Businesses (PII)

– Energy Companies (The Grid)

– The Government(s)

– Hospitals (PHI)

– Your Mom (Scary)

6

Page 7: Smart Bombs: Mobile Vulnerability and Exploitation

That’s right…your Mom

7

Page 8: Smart Bombs: Mobile Vulnerability and Exploitation

Testing Mobile Apps

• What are the three major areas for testing?

– File System What are apps writing to the file system? How is data stored?

– Application Layer How are apps communicating via HTTP and Web Services? SSL?

– Transport Layer How are apps communicating over the network? TCP and Third-party APIs

8

Page 9: Smart Bombs: Mobile Vulnerability and Exploitation

OWASP Top 10 Mobile Risks

1. Insecure Data Storage

2. Weak Server Side Controls

3. Insufficient Transport Layer Protection

4. Client Side Injection

5. Poor Authorization and Authentication

9

Page 10: Smart Bombs: Mobile Vulnerability and Exploitation

OWASP Top 10 Mobile Risks

6. Improper Session Handling

7. Security Decisions Via Untrusted Inputs

8. Side Channel Data Leakage

9. Broken Cryptography

10. Sensitive Information Disclosure

10

Page 11: Smart Bombs: Mobile Vulnerability and Exploitation

OWASP Mobile Security Project

• You should get involved! • https://www.owasp.org/index.php/OWASP_Mobile_Security_Project

11

Page 12: Smart Bombs: Mobile Vulnerability and Exploitation

Other Issues

• Privacy of your data!

– Mobile apps talk to many third party APIs (ads)

– What’s collected by Google/Apple/Microsoft?

12

Page 13: Smart Bombs: Mobile Vulnerability and Exploitation

Common Tools

• SSH

• VNC server

• A compiler (gcc / agcc)

• Android SDK (adb!)

• Xcode

• iExplorer (iOS GUI file explorer)

• Jailbroken iDevice

• Rooted Android Device

13

Page 14: Smart Bombs: Mobile Vulnerability and Exploitation

File System Analysis

• Forensic approach

– File system artifacts

– Timeline analysis

– Log analysis

– Temp files

14

Page 15: Smart Bombs: Mobile Vulnerability and Exploitation

Forensic Tools

• Mobile Forensic Tools

– EnCase, FTK, Cellebrite

• Free and/or Open Source

– file, strings, less, dd, md5sum

– The Sleuthkit (mactime, mac-robber)

15

Page 16: Smart Bombs: Mobile Vulnerability and Exploitation

Timelines

• Timelines are awesome

– Anyone know log2timeline?

• Filesystem

– mac-robber

– mactime

• Logs

– Application- &

OS-specific

16

Page 17: Smart Bombs: Mobile Vulnerability and Exploitation

Temp Files

17

Page 18: Smart Bombs: Mobile Vulnerability and Exploitation

Viewing & Searching Files

• cat, less, vi, strings, grep

• SQLite files

– GUI browser, API (Ruby, Python, etc)

• Android apps

– ashell, aSQLiteManager, aLogViewer

18

Page 19: Smart Bombs: Mobile Vulnerability and Exploitation

Application Layer - HTTP

• Tools Used:

– Burp Suite

– Burp Suite

– oh yeah Burp Suite!

19

Page 20: Smart Bombs: Mobile Vulnerability and Exploitation

Why Look at the App Layer?

• Very common in mobile platforms

• Many errors are found within the application

– And how it talks to the back end service

• Able to use many existing tools

20

Page 21: Smart Bombs: Mobile Vulnerability and Exploitation

Misunderstanding Encryption

21

Page 22: Smart Bombs: Mobile Vulnerability and Exploitation

• Really. It’s 2012.

Base64:

TXkgc3VwZXIgc2VjcmV0IGtleSE=

Plaintext:

My super secret key!

22

Base64 Encoding is NOT Encryption!

Page 23: Smart Bombs: Mobile Vulnerability and Exploitation

Want Credentials?

Note: This is actually a hardcoded password in the UPS app…

23

Page 24: Smart Bombs: Mobile Vulnerability and Exploitation

Transport Layer - TCP

• Tools Used:

– Wireshark

– Tcpdump

– NetworkMiner

24

Page 25: Smart Bombs: Mobile Vulnerability and Exploitation

Why look at the transport layer?

• Check to see how network protocols are handled in

the app

• Easily look for SSL certificate or other

communication issues

25

Page 26: Smart Bombs: Mobile Vulnerability and Exploitation

NetworkMiner

• Extracts files/images and more

• Can pull out clear txt credentials

• Quickly view parameters

26

Page 27: Smart Bombs: Mobile Vulnerability and Exploitation

27

Page 28: Smart Bombs: Mobile Vulnerability and Exploitation

TCP Lab Setup

• Run tcpdump directly on the device

• Run Wireshark by sniffing traffic over wireless AP or

network hub setup (lots of ways to do this)

• Import PCAPs into NetworkMiner

28

Page 29: Smart Bombs: Mobile Vulnerability and Exploitation

App Vulnerabilities

• Several examples that we’ve found

• Many from the Top 25 downloaded apps

29

Page 30: Smart Bombs: Mobile Vulnerability and Exploitation

• OAuth Tokens Stored in PLIST file

• Simply copy the PLIST file to another device, you’re

logged in as them!

• I’m finding OAuth tokens in lots of PLIST

files…Dropbox and apps that use Dropbox like

password managers…

30

Facebook

Page 31: Smart Bombs: Mobile Vulnerability and Exploitation

Evernote

• Notebooks are stored in the cloud

• But…caches some files on the device…

• OWASP M1: Insecure Data Storage

31

Page 32: Smart Bombs: Mobile Vulnerability and Exploitation

32

Page 33: Smart Bombs: Mobile Vulnerability and Exploitation

MyFitnessPal • Android app stores sensitive data on the device

(too much data)

33

Page 34: Smart Bombs: Mobile Vulnerability and Exploitation

34

Page 35: Smart Bombs: Mobile Vulnerability and Exploitation

Password Keeper “Lite”

• PIN and passwords stored in clear-text SQLite

database

• So much for the security of your passwords…

35

Page 36: Smart Bombs: Mobile Vulnerability and Exploitation

36

Page 37: Smart Bombs: Mobile Vulnerability and Exploitation

37

Page 38: Smart Bombs: Mobile Vulnerability and Exploitation

38

Page 39: Smart Bombs: Mobile Vulnerability and Exploitation

Draw Something

• Word list

stored on the

device

• Modify to

mess with

your friends

39

Page 40: Smart Bombs: Mobile Vulnerability and Exploitation

LinkedIn

• SSL only for authentication

• Session tokens and data sent over HTTP

• Lots of apps do this

• M3: Insufficient Transport Layer Protection

• Note: This was fixed with the latest version of the app

(for iOS at least)

40

Page 41: Smart Bombs: Mobile Vulnerability and Exploitation

Auth over SSL

Data sent over HTTP

41

Page 42: Smart Bombs: Mobile Vulnerability and Exploitation

42

Page 43: Smart Bombs: Mobile Vulnerability and Exploitation

Pandora

• Registration over HTTP

• User name/Password and Registration info sent over

clear text

• Unfortunately…lots of apps do this

43

Page 44: Smart Bombs: Mobile Vulnerability and Exploitation

44

Page 45: Smart Bombs: Mobile Vulnerability and Exploitation

Hard Coded Passwords/Keys

• Major Grocery Chain “Rewards” Android app

• Simple to view the source, extract private key

• OWASP M9: Broken Cryptography

• Do developers really do this?

45

Page 46: Smart Bombs: Mobile Vulnerability and Exploitation

Why yes, they do!

46

Page 47: Smart Bombs: Mobile Vulnerability and Exploitation

Privacy Issues

• Example: Draw Something App (Top 25)

• UDID and more sent to the following third-party ad

providers:

– appads.com

– mydas.mobi

– greystripe.com

– tapjoyads.com

47

Page 48: Smart Bombs: Mobile Vulnerability and Exploitation

What is UDID?

• Alphanumeric string that uniquely identifies an

Apple device

48

Page 49: Smart Bombs: Mobile Vulnerability and Exploitation

49

Page 50: Smart Bombs: Mobile Vulnerability and Exploitation

Pinterest and Flurry.com

50

Page 51: Smart Bombs: Mobile Vulnerability and Exploitation

51

Page 52: Smart Bombs: Mobile Vulnerability and Exploitation

Conclusions

• Mobile devices are critically common

• Most people use them without thinking of security

• Developers seem to be repeating the past

• Lots of issues besides Mobile Application Security

– BYOD

– The device itself (Jailbreaking/Rooting)

– MDM and Enterprise Management

– The list goes on…

52


Recommended