Hacking Exposed 7 Network Security Secrets & Solutions

Slides:



Advertisements
Similar presentations
© 2003, Cisco Systems, Inc. All rights reserved..
Advertisements

Objectives Overview Define an operating system
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Operating-System Structures
Automated Remote Repair for Mobile Malware Yacin Nadji, Jonathon Giffin, Patrick Traynor Georgia Institute of Technology ACSAC’ 11.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Vijay krishnan Avinesh Dupat  Collection of tools (programs) that enable administrator-level access to a computer or computer network.  The main purpose.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 24 NTFS Permissions and Sharing Printers 1.
Guide To UNIX Using Linux Third Edition
2. Setting Up Your Android Development Environment.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
ANDROID PROGRAMMING MODULE 1 – GETTING STARTED
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
UFCFX5-15-3Mobile Device Development Android Development Environments and Windows.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
A+ Certification Guide Chapter 10 Mobile Devices.
Android Programming. Outline Preparation Create new project Build and Run a project Debug a project Deploy on devices.
Presentation By Deepak Katta
Android Introduction Platform Overview.
MPE+ Access Data Evasi0n iPhone 4s/5 Nexus 4 Market Share Information.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Cyber Patriot Training
Hands-On Microsoft Windows Server 2008
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Android Programming By Mohsen Biglari Android Programming, Part1: Introduction 1 Part1: Introduction By Mohsen Biglari.
Is Your Mobile App Secure. DEF CON 23 Wall of Sheep Sat
Copyright© Jeffrey Jongko, Ateneo de Manila University Android.
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
Explain the purpose of an operating system
Chapter 2: Operating-System Structures. 2.2 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 2: Operating-System Structures Operating.
Android for Java Developers Denver Java Users Group Jan 11, Mike
Android Security Auditing Slides and projects at samsclass.info.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Slides and projects at samsclass.info. Adding Trojans to Apps Slides and projects at samsclass.info.
Wireless and Mobile Security
SCSC 455 Computer Security Chapter 3 User Security.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
Root Access By: Derek Grove. What Do I Mean By Root?  An account that by default has access to all commands and files on a linux or other Unix-like operating.
By Collin Donaldson.   In conventional OS architectures, the user accesses the OS via an account that has certain privileges (admin, guest). They can.
Accelerometer based motion gestures for mobile devices Presented by – Neel Parikh Advisor Committee members Dr. Chris Pollett Dr. Robert Chun Dr. Mark.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Server 2003 { First Steps and Administration} Benedikt Riedel MCSE + Messaging
Xxx Presentation, No 1 Copyright © TAC AB Engineering Classic Networks1.
Fermilab Scientific Computing Division Fermi National Accelerator Laboratory, Batavia, Illinois, USA. Off-the-Shelf Hardware and Software DAQ Performance.
Android. Android An Open Handset Alliance Project A software platform and operating system for mobile devices Based on the Linux kernel Developed by Google.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Module 51 (Mobile Device Fundamentals - Android)
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Mobile Device Development
Mobile Hacking - Fundamentals
WELCOME Mobile Applications Testing
Chapter 2: Operating-System Structures
Rooting Android Created By : Mayank Talwar.
Chapter 2: System Structures
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Android Developer Fundamentals V2
Android Platform, Android App Basic Components
Presentation transcript:

Hacking Exposed 7 Network Security Secrets & Solutions Chapter 11 Mobile Hacking

Outline Hacking Android Hacking iOS Android fundamentals Hacking your Android Hacking other’s Android Hacking iOS How secure is iOS Hacking your iOS Hacking other’s iOS

Hacking Android Android Fundamentals (1/2) Android architecture ARM cross-compiled Linux kernel Native libraries Android runtime (including Dalvik virtual machine) Application framework Applications Software Development Kit (SDK) Android Emulator: prototype, develop, and test Android applications without using a physical device Android Debug Bridge (ADB): a command-line tool for communicating with an emulator or a physical device execution of native apps Dalvik Debug Monitor Server (DDMS): obtain log information through logcat send simulated location data, SMS, and phone calls provide memory management information

Hacking Your Android Android Fundamentals (2/2)

Hacking Your Android Hacking Your Android Rooting “your” Android to get administrative privileges Full control of the device The device may be “bricked” Android Rooting Tools: SuperOne Click, Z4Root, GingerBreak Steps for rooting a Kindle Fire Enable installation of applications from unknown sources Install the Android SDK Add commends in adb_usb.in and android_winusb.inf Connect Kindle Fire with PC through ADB Download rooting files and execute them

Hacking Your Android Apps for Rooted Android Devices Superuser: control which applications can execute with root privileges ROM Manager: install a custom ROM Market Enabler: spoof your location and carrier network to the Android market ConnectBot: execute shell commands remotely Screenshot: obtain device screenshots ES File Manager: copy, paste, cut, create, delete, and rename system files SetCPU: set the CPU clock Juice Defender: save power and extend battery life by managing hardware components

Hacking Your Android Native Apps on Android BusyBox: a set of UNIX tools that allows you to execute useful commands Tcpdump: capture and display packets that are transmitted over a network Nmap: discover hardware and software on a network to identify specific details of the host operating system, open ports, DNS names, and MAC addresses, Ncat: read and write data across networks from the command line for making various remote network connections

Hacking Your Android Trojan Apps A malicious program that disguises legitimate apps by using the same icon or name Reengineer Android applications Manifest.xml: an encoded XML file that defines essential information about the application to the Android Classes.dex: the Dalvik executable where the compiled code resides Tools for Modify an app apktool: unzip and repack the Android application (apk) file SignApk: verify the repacked file Steps Use apktool to unzip an apk file Modify the application name in Mainifest.xml via any editor tool (e.g. notepad) Change icons in the unzipped folder/subfolder User apktool to repack the apk file Sign the verification via SignApk

Hacking Other’s Android Vulnerabilities in Android (1/2) Remote Shell via WebKit Get the latest version of Android Install antivirus software Root an Android remotely: RageAgainstTheCage Data Stealing through a PHP file Temporarily disable JavaScript Use another third-party browser Unmount the “/sdcard” partition to protect the data stored there Remote Shell with Zero Permissions Check the ratings and user reviews to try to identify suspicious applications

Hacking Other’s Android Vulnerabilities in Android (2/2) Exploiting Capability Leaks Check the ratings and user reviews to try to identify suspicious applications URL-sourced Malware (Side-load Applications) Unselect “Unknown Sources” in Settings->Applications Skype Data Exposure Keep applications updated Carrier IQ Use Lookout’s Carrier IQ Detector HTC Logger Get the patch from HTC Cracking the Google Wallet PIN Don’t leave the phone unattended. Use the traditional Android screen lock Do not root the device Install antivirus software

Hacking iOS How Secure Is iOS? Third-party apps are disallowed except under a less privileged user account Apps have to be signed by Apple to execute Code signature verification is at both load time and runtime iOS has made great gains in terms of its security model

Hacking Your iOS Jailbreaking Jailbreak: The process of taking full control of an iOS-based device Allow for using third-party apps Expose yourself to a variety of attack vectors Boot-based Jailbreak Obtain the firmware image (IPSW) Switch the device to Device Firmware Update (DFU) mode Install the IPSW file image to the device Remote Jailbreak Load a specially crafted PDF into the web browser, Safari, to take the control of the browser, and then the operating system

Hacking Other’s iOS Vulnerabilities in iOS Malware infection: JailbreakMe3.0 Keep your operating system and software updated with the latest patches SSH attack: iKee Attacks! Don’t jailbreak your iPhone Change the default credentials for a jailbroken device The FOCUS 11 Man-in-the-Middle Attack Update your device and to keep it up to date Configure the iOS device to “Ask to Join Networks” App store malware: Handy Light, InstaStock Apps should be installed only when absolutely necessary and only from trustworthy vendors Vulnerable apps: bundled and third-party (not on the app store) Keep your device updated with the latest version of iOS, and keep apps updated to their latest versions Physical Access Ensure that all sensitive data on the device has been encrypted

Summary Adapt the behavior and configuration of the device to your purpose/data after evaluation Enable device lock Keep physical control of the device Enable wipe functionality as appropriate using local or remote features Install security software Leave the device home when traveling

Homework Ch11 Due: in printed hardcopy (format: problem, solution with explanation, screen dumps) (60 points) Android Debug Tool Install Android SDK. Connect an Android device or emulator to the host which runs DDMS in the SDK. Dump and explain contents output by logcat in DDMS. (40 points) Select an Android device or emulator (e.g. the one in Android SDK, Bluestacks, and so on), root it. It is recommended to root on an Android emulator to avoid turning your phones "bricked". (20 points) Use document management app (e.g. Root Explorer) to add/remove apk files to/from the folder “/system/app/” in a rooted Android device or emulator, and observe what happens. (20 points) Install the app, AdBlock, in an rooted Android device or emulator and explain how it blocks Ads. (20 points) Install a root-dependent app (except AdBlock) to a rooted Android device or emulator and explain why it needs a root system. (20 points) Select one version of iOS, survey how to jailbreak it, and list the steps.