+ All Categories
Home > Technology > Smart Bombs: Mobile Vulnerability and Exploitation

Smart Bombs: Mobile Vulnerability and Exploitation

Date post: 21-Oct-2014
Category:
View: 8,041 times
Download: 0 times
Share this document with a friend
Description:
Kevin Johnson, John Sawyer and Tom Eston have spent quite a bit of time evaluating mobile applications in their respective jobs. In this presentation they will provide the audience an understanding of how to evaluate mobile applications, examples of how things have been done wrong and an understanding of how you can perform this testing within your organization.This talk will work with applications from the top three main platforms; iOS, Android and Blackberry. Kevin, Tom and John have used a variety of the top 25 applications for each of these platforms to provide real world examples of the problems applications face.
Popular Tags:
60
Mobile Vulnerability and Exploitation John Sawyer InGuardians Tom Eston SecureState Kevin Johnson Secure Ideas
Transcript
Page 1: Smart Bombs: Mobile Vulnerability and Exploitation

Mobile Vulnerability and Exploitation

John Sawyer – InGuardians Tom Eston – SecureState

Kevin Johnson – Secure Ideas

Page 2: Smart Bombs: Mobile Vulnerability and Exploitation

John Sawyer

InGuardians, Inc. - Senior Security

Analyst

DarkReading.com - Author/Blogger

1@stplace - Retired CTF packet

monkey

Winners DEFCON 14 & 15

Avid Mountain Biker…

in Florida.

Page 3: Smart Bombs: Mobile Vulnerability and Exploitation

Tom Eston

Manager, SecureState

Profiling & Penetration Team

Blogger – SpyLogic.net

Infrequent Podcaster –

Security Justice/Social Media

Security

Zombie aficionado

I like to break new technology

Page 4: Smart Bombs: Mobile Vulnerability and Exploitation

Kevin Johnson

Father of Brenna and Sarah

Secure Ideas, Senior Security Consultant

SANS Instructor and Author

SEC542/SEC642/SEC571

Open-Source Bigot

SamuraiWTF, Yokoso, Laudanum etc

Ninja

Page 5: Smart Bombs: Mobile Vulnerability and Exploitation

What are we talking about today?

What’s at risk?

Tools, Testing and Exploitation

Common vulnerabilities found in popular apps

(this is the fun part)

Page 6: Smart Bombs: Mobile Vulnerability and Exploitation

What are Smart Bombs?

We’ve got powerful technology in the

palm of our hands!

We store and transmit sensitive data

Mobile devices are being used by:

Major Businesses (PII)

Energy Companies (The Grid)

The Government(s)

Hospitals (PHI)

Your Mom (Scary)

Page 7: Smart Bombs: Mobile Vulnerability and Exploitation

That’s right…your Mom

Page 8: Smart Bombs: Mobile Vulnerability and Exploitation

Testing Mobile Apps

What are the 3 major areas for testing?

File System What are apps writing to the file system? How is data stored?

Application Layer How are apps communicating via HTTP and Web Services? SSL?

Transport Layer How are apps communicating over the network? TCP and Third-party APIs

Page 9: Smart Bombs: Mobile Vulnerability and Exploitation

OWASP Top 10 Mobile Risks

1. Insecure Data Storage

2. Weak Server Side Controls

3. Insufficient Transport Layer Protection

4. Client Side Injection

5. Poor Authorization and Authentication

Page 10: Smart Bombs: Mobile Vulnerability and Exploitation

OWASP Top 10 Mobile Risks

6. Improper Session Handling

7. Security Decisions Via Untrusted Inputs

8. Side Channel Data Leakage

9. Broken Cryptography

10. Sensitive Information Disclosure

Page 11: Smart Bombs: Mobile Vulnerability and Exploitation

OWASP Mobile Security Project

You should get involved! https://www.owasp.org/index.php/OWASP_Mobile_Security_Project

Page 12: Smart Bombs: Mobile Vulnerability and Exploitation

Other Issues

Privacy of your data!

Mobile apps talk to many third party APIs

(ads)

What’s collected by Google/Apple/Microsoft?

Page 13: Smart Bombs: Mobile Vulnerability and Exploitation

Common Tools

SSH

VNC server

A compiler (gcc / agcc)

Android SDK (adb!)

XCode

Jailbroken iDevice

Rooted Android Device

Page 14: Smart Bombs: Mobile Vulnerability and Exploitation

Filesystem Analysis

Forensic approach

Filesystem artifacts

Timeline analysis

Log analysis

Temp files

Page 15: Smart Bombs: Mobile Vulnerability and Exploitation

Forensic Tools

Mobile Forensic Tools

EnCase, FTK, Cellebrite

Free and/or Open Source

file, strings, less, dd, md5sum

The Sleuthkit (mactime, mac-robber)

Page 16: Smart Bombs: Mobile Vulnerability and Exploitation

Timelines

Timelines are awesome

Anyone know log2timeline?

Filesystem

mac-robber

mactime

Logs

Application- &

OS-specific

Page 17: Smart Bombs: Mobile Vulnerability and Exploitation

Filesystem Timelines

mac-robber

C app

free & open source

must be compiled to run on devices

mactime

Part of The Sleuthkit

runs on Mac, Win, Linux

Page 18: Smart Bombs: Mobile Vulnerability and Exploitation

Compiling mac-robber (Android)

Android

Install arm gcc toolchain

Compile & push via adb

I used Ubuntu, works on MobiSec & Backtrack

Detailed instructions: ○ http://www.darkreading.com/blog/232800148/quick-start-

guide-compiling-mac-robber-for-android-vuln-research.html

Page 19: Smart Bombs: Mobile Vulnerability and Exploitation

Compiling mac-robber (iOS)

iOS (jailbroken)

Download & Install libgcc onto device

Install iphone-gcc

Download & Install C headers/libraries

Page 20: Smart Bombs: Mobile Vulnerability and Exploitation

Running mac-robber (iOS)

iOS & Android via SSH

Android via adb

Then, process each with mactime

Page 21: Smart Bombs: Mobile Vulnerability and Exploitation

Filesystem Timelines

Page 22: Smart Bombs: Mobile Vulnerability and Exploitation

Where is the data?

Page 23: Smart Bombs: Mobile Vulnerability and Exploitation

Temp Files

Page 24: Smart Bombs: Mobile Vulnerability and Exploitation

Gallery Lock Lite

“Protects” your images

Page 25: Smart Bombs: Mobile Vulnerability and Exploitation
Page 26: Smart Bombs: Mobile Vulnerability and Exploitation

Viewing & Searching Files

cat, less, vi, strings, grep

SQLite files

GUI browser, API (Ruby, Python, etc)

Android apps

ashell, aSQLiteManager, aLogViewer

Page 27: Smart Bombs: Mobile Vulnerability and Exploitation

Application Layer - HTTP

Tools Used:

Burp Suite

Burp Suite

oh yeah Burp Suite!

Page 28: Smart Bombs: Mobile Vulnerability and Exploitation

Why Look at the App Layer?

Very common in mobile platforms

Many errors are found within the

application

And how it talks to the back end service

Able to use many existing tools

Page 29: Smart Bombs: Mobile Vulnerability and Exploitation

Launching Burp Suite

Memory!

Page 30: Smart Bombs: Mobile Vulnerability and Exploitation

Misunderstanding Encryption

Page 31: Smart Bombs: Mobile Vulnerability and Exploitation

Want Credentials?

Page 32: Smart Bombs: Mobile Vulnerability and Exploitation

Transport Layer - TCP

Tools Used:

Wireshark

Tcpdump

Network Miner

Page 33: Smart Bombs: Mobile Vulnerability and Exploitation

Why look at the transport layer?

Check to see how network protocols are

handled in the app

Easily look for SSL certificate or other

communication issues

Page 34: Smart Bombs: Mobile Vulnerability and Exploitation

NetworkMiner

Extracts files/images and more

Can pull out clear txt credentials

Quickly view parameters

Page 35: Smart Bombs: Mobile Vulnerability and Exploitation
Page 36: Smart Bombs: Mobile Vulnerability and Exploitation

TCP Lab Setup

Run tcpdump directly on the device

Run Wireshark by sniffing traffic over

wireless AP or network hub setup (lots

of ways to do this)

Import PCAPs into NetworkMiner

Page 37: Smart Bombs: Mobile Vulnerability and Exploitation

App Vulnerabilities

Several examples that we’ve found

Many from the Top 25 downloaded apps

Page 38: Smart Bombs: Mobile Vulnerability and Exploitation

Evernote

Notebooks are stored in the cloud

But…caches some files on the device…

OWASP M1: Insecure Data Storage

Page 39: Smart Bombs: Mobile Vulnerability and Exploitation
Page 40: Smart Bombs: Mobile Vulnerability and Exploitation

MyFitnessPal

Android app stores sensitive data on the

device (too much data)

Page 41: Smart Bombs: Mobile Vulnerability and Exploitation
Page 42: Smart Bombs: Mobile Vulnerability and Exploitation

Password Keeper “Lite”

PIN and passwords stored in clear-text

SQLite database

So much for the security of your

passwords…

Page 43: Smart Bombs: Mobile Vulnerability and Exploitation
Page 44: Smart Bombs: Mobile Vulnerability and Exploitation
Page 45: Smart Bombs: Mobile Vulnerability and Exploitation
Page 46: Smart Bombs: Mobile Vulnerability and Exploitation

Draw Something

Word list stored on the device

Modify to mess with your friends

Page 47: Smart Bombs: Mobile Vulnerability and Exploitation

LinkedIn

SSL only for authentication

Session tokens and data sent over HTTP

Lots of apps do this

M3: Insufficient Transport Layer Protection

Page 48: Smart Bombs: Mobile Vulnerability and Exploitation

Auth over SSL

Data sent over HTTP

Page 49: Smart Bombs: Mobile Vulnerability and Exploitation
Page 50: Smart Bombs: Mobile Vulnerability and Exploitation

Pandora

Registration over HTTP

User name/Password and Registration

info sent over clear text

Unfortunately…lots of apps do this

Page 51: Smart Bombs: Mobile Vulnerability and Exploitation
Page 52: Smart Bombs: Mobile Vulnerability and Exploitation

Hard Coded Passwords/Keys

Major Grocery Chain “Rewards” Android app

Simple to view the source, extract private key

OWASP M9: Broken Cryptography

Do developers really do this?

Page 53: Smart Bombs: Mobile Vulnerability and Exploitation

Why yes, they do!

Page 54: Smart Bombs: Mobile Vulnerability and Exploitation

Privacy Issues

Example: Draw Something App (Top 25)

UDID and more sent to the following

third-party ad providers:

appads.com

mydas.mobi

greystripe.com

tapjoyads.com

Page 55: Smart Bombs: Mobile Vulnerability and Exploitation

What is UDID?

Alpha-numeric string that uniquely

identifies an Apple device

Page 56: Smart Bombs: Mobile Vulnerability and Exploitation
Page 57: Smart Bombs: Mobile Vulnerability and Exploitation

Pinterest and Flurry.com

Page 58: Smart Bombs: Mobile Vulnerability and Exploitation
Page 59: Smart Bombs: Mobile Vulnerability and Exploitation

Conclusions

Mobile devices are critically common

Most people use them without thinking

of security

Developers seem to be repeating the

past

We need to secure this area

Page 60: Smart Bombs: Mobile Vulnerability and Exploitation

Contact Us

John Sawyer

Twitter: @johnhsawyer

[email protected]

Tom Eston

Twitter: @agent0x0

[email protected]

Kevin Johnson

Twitter: @secureideas

[email protected]


Recommended