Securing your Jail broken IPhone. iPhone Worm An iPhone worm has started jumping between jailbroken devices, taking advantage of users who have replaced.

Slides:



Advertisements
Similar presentations
Caf é Net Management System … Prepared By : Shereen Atallah Shereen Atallah Elham AL_Yaseen Elham AL_Yaseen.
Advertisements

Radius based ssh authentication Location of Radius server – radius-server host auth-port 1812 acct-port 1813 key WinRadius – The same config.
Cosc 5/4765 Protecting against ssh attacks And is this secure?
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
For further information computersecurity.wlu.ca
Mr C Johnston ICT Teacher
Chapter One The Essence of UNIX.
IPad Setup – App Store SEARCH APP STORE FOR ISSH AND PURCHASE (AROUND $10)
Network Security Testing Techniques Presented By:- Sachin Vador.
Chapter 9 Security Authentication Insider Attacks Exploiting Code Bugs.
Copyright 2010 Justin C. Klein Keane Using Kojoney Open Source Low Interaction Honeypot to Develop Defensive Strategies and Fingerprint Post-Compromise.
Guide To UNIX Using Linux Third Edition
TRIRIGA Anywhere 10.4 Beta Registration Steps
Chit Fund Software. First we will try to see how to create a (Chit Scheme) 1. Enter the Chit Name 2. Enter Chit Value. 3. Total No. of members in that.
Spendvision Approvals Presentation Julie McConnell Spendvision Administrator.
Kirkwood Scan to Set Up. Scan to Set up 1. Click on Start, Settings, Printers to get this screen.
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Viewer Software Viewer software is a remote viewer software for control the DVR. -This software supports the multiple functions of the network. -It can.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
Ana Chanaba Robert Huylo
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
COEN 252 Computer Forensics
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
How to setup Genesis LC1 and Genesis Flex with the Buffalo Access Point to maximize wireless performance…
Background - hardware User interface devices to system –Mainframe Text mode only Command-line (text mode) interface “Some” menus available (NOT a GUI)
CIS 450 – Network Security Chapter 3 – Information Gathering.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
Enjoy Remote Support WinVNC Introduction A&SIT Ben Wu 11/04/08.
Kali Linx Attacks Jim Nasto. Window 8 Computer On my Windows 8 64 bit OS machine. I started using a Virtual Machine using Hyper V Manager and shared the.
Security at NCAR David Mitchell February 20th, 2007.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Mobile Security iPhone and Android OS. iPhone Security Features Find my iPhone Remote wipe Automated back up at sync Auto lock / passcode lock Wipe after.
Memory & Storage Architecture Seoul National University PuTTY Usage Hyeon-gyu School of Computer Science and Engineering.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Dictionary Attack Chien-Chung Shen
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Retina Network Security Scanner
How to Setup Scan to on most Sharp Models.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Introduction to ev3dev: Setup
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Usability vs. Security: The Everlasting Trade-Off in the Context of Apple iOS Mobile Hotspots Andreas Kurtz, Felix Freiling, Daniel Metz Technical Report.
Part A. Remote Viewing IP Surveillance Camera Application Guide.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
N900 Development Setup Your loving staff. REUSING PHONES.
Ubuntu Checklist. 1.Examine the ReadMe.txt file 2.Manage user and root passwords – sudo passwd change password of username –Change password policies in.
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
Accessing Your Documents from Your Personal Computer.
HotSpot Software helps you control and bill Internet access by redirecting your customers to sign-in or pay on your login page HotSpot software lets you.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Enumeration.
Vulnerability Scanning with Credentials
Common Operating System Exploits
Introduction to Networking
How to Fix HP Printer Server Connection Error 403
When we talk about the process to create Hotmail account, the simple method helps the users to improve the experience. Hotmail is not a common ing.
Netflix Not Working On iPhone? Here’s best guide for you.
How to use the Guest Network on an iPhone
The Effects of Jailbreaking on iPhone Security
Clemson For iOS Devices and Wi-Fi Setup
How to output NW camera picture to external monitor.
Review - week 4 Basic device access security
IP Addresses & Ports IP Addresses – identify a device on a network

Presentation transcript:

Securing your Jail broken IPhone

iPhone Worm An iPhone worm has started jumping between jailbroken devices, taking advantage of users who have replaced the phone's software but failed to create a new root password The worm, dubbed “Ikee,” replaces the phone's wallpaper with a picture of Rick Astley Currently there are four known variants of this worm in the wild. None to date that are considered to be “extremely nefarious”

How it works…. When an iPhone’s default OS is jailbroken an SSH service is started on the phone and is continuously running. Knowing the IP address range for ATT an attacker can scan the net block for the open SSH port and then try and connect using the known default username and password. – Username: root – Password: alpine One of the IP address blocks for ATT: – AS20057 AT&T Wireless Service The “Ikee” worm by default scans the known netblock for the SSH service and then attempts to login to the device and change the background.

How to Secure your Jailbroken iPhone Grab your favorite SSH program SSH to your phone – Note If you haven't SSH to your phone before it may take a while, after the wait there might be a warning about a key fingerprint just accept and Login using username "root" and password "alpine"…. If your lost here grab a hammer and smack your self over the head. You should now be at terminal screen where you need to change your passwd to do so type passwd and you will be prompted to change it. DO IT DO IT…..

What a “Rickrolled” Phone looks like