SlideShare a Scribd company logo
Smart Bombs: Mobile Vulnerability and Exploitation
                                         Tom Eston
Grilled Smart Phones




http://youtu.be/cir-MOzVggQ            2
Windows Mobile Wins!




                       3
Tom Eston

• Manager, SecureState Profiling &
  Penetration Team
• Blogger – SpyLogic.net
• Infrequent Podcaster – Security
  Justice/Social Media Security
• Zombie aficionado
• I like to break new technology



                                     4
What are we talking
              about today?
• What’s at risk?
• Tools, Testing and Exploitation
• Common vulnerabilities found in popular apps
  (this is the fun part)

• Special thanks to Kevin Johnson and John Sawyer who
  helped with this research!


                                                   5
What are Smart Bombs?
• We’ve got powerful technology in the palm of
  our hands!
• We store and transmit sensitive data
• Mobile devices are being used by:
   – Major Businesses (PII)
   – Energy Companies (The Grid)
   – The Government(s)
   – Hospitals (PHI)
   – Your Mom (Scary)

                                                 6
That’s right…your Mom




                        7
Testing Mobile Apps
• What are the three major areas for testing?

   – File System
     What are apps writing to the file system? How is data
     stored?
   – Application Layer
     How are apps communicating via HTTP and Web
     Services? SSL?
   – Transport Layer
     How are apps communicating over the network? TCP
     and Third-party APIs

                                                             8
OWASP Top 10 Mobile Risks
1.   Insecure Data Storage
2.   Weak Server Side Controls
3.   Insufficient Transport Layer Protection
4.   Client Side Injection
5.   Poor Authorization and Authentication




                                               9
OWASP Top 10 Mobile Risks
6. Improper Session Handling
7. Security Decisions Via Untrusted Inputs
8. Side Channel Data Leakage
9. Broken Cryptography
10. Sensitive Information Disclosure




                                             10
OWASP Mobile Security Project

• You should get involved!
• https://www.owasp.org/index.php/OWASP_Mobile_Security_Project




                                                                  11
Other Issues
• Privacy of your data!
   – Mobile apps talk to many third party APIs (ads)
   – What’s collected by Google/Apple/Microsoft?




                                                       12
Common Tools
•   SSH
•   VNC server
•   A compiler (gcc / agcc)
•   Android SDK (adb!)
•   Xcode
•   iExplorer (iOS GUI file explorer)
•   Jailbroken iDevice
•   Rooted Android Device

                                        13
File System Analysis
• Forensic approach
   – File system artifacts
   – Timeline analysis
   – Log analysis
   – Temp files




                                   14
Forensic Tools
• Mobile Forensic Tools
   – EnCase, FTK, Cellebrite
• Free and/or Open Source
   – file, strings, less, dd, md5sum
   – The Sleuthkit (mactime, mac-robber)




                                           15
Timelines
• Timelines are awesome
   – Anyone know log2timeline?
• Filesystem
   – mac-robber
   – mactime
• Logs
   – Application- &
     OS-specific

                                 16
Temp Files




             17
Viewing & Searching Files
• cat, less, vi, strings, grep
• SQLite files
   – GUI browser, API (Ruby, Python, etc)
• Android apps
   – ashell, aSQLiteManager, aLogViewer




                                            18
Application Layer - HTTP
• Tools Used:
   – Burp Suite
   – Burp Suite
   – oh yeah Burp Suite!




                                   19
Why Look at the App Layer?
• Very common in mobile platforms
• Many errors are found within the application
   – And how it talks to the back end service
• Able to use many existing tools




                                                 20
Misunderstanding Encryption




                              21
Base64 Encoding is NOT Encryption!

• Really. It’s 2012.

Base64:

TXkgc3VwZXIgc2VjcmV0IGtleSE=

Plaintext:

My super secret key!

                                      22
Want Credentials?


                    Note: This is
                    actually a
                    hardcoded
                    password in the
                    UPS app…




                                23
Transport Layer - TCP
• Tools Used:
   – Wireshark
   – Tcpdump
   – NetworkMiner




                                 24
Why look at the transport layer?
• Check to see how network protocols are handled in
  the app
• Easily look for SSL certificate or other
  communication issues




                                                      25
NetworkMiner
• Extracts files/images and more
• Can pull out clear txt credentials
• Quickly view parameters




                                       26
27
TCP Lab Setup
• Run tcpdump directly on the device



• Run Wireshark by sniffing traffic over wireless AP or
  network hub setup (lots of ways to do this)

• Import PCAPs into NetworkMiner


                                                          28
App Vulnerabilities
• Several examples that we’ve found
• Many from the Top 25 downloaded apps




                                         29
Facebook
• OAuth Tokens Stored in PLIST file
• Simply copy the PLIST file to another device, you’re
  logged in as them!
• I’m finding OAuth tokens in lots of PLIST
  files…Dropbox and apps that use Dropbox like
  password managers…




                                                         30
Evernote
• Notebooks are stored in the cloud
• But…caches some files on the device…
• OWASP M1: Insecure Data Storage




                                         31
32
MyFitnessPal
• Android app stores sensitive data on the device
  (too much data)




                                                    33
34
Password Keeper “Lite”
• PIN and passwords stored in clear-text SQLite
  database
• So much for the security of your passwords…




                                                  35
36
37
38
Draw Something
• Word list
  stored on the
  device
• Modify to
  mess with
  your friends




                              39
LinkedIn
•   SSL only for authentication
•   Session tokens and data sent over HTTP
•   Lots of apps do this
•   M3: Insufficient Transport Layer Protection

• Note: This was fixed with the latest version of the app
  (for iOS at least)



                                                       40
Auth over SSL




                Data sent over HTTP



                                      41
42
Pandora
• Registration over HTTP
• User name/Password and Registration info sent over
  clear text
• Unfortunately…lots of apps do this




                                                   43
44
Hard Coded Passwords/Keys
•   Major Grocery Chain “Rewards” Android app
•   Simple to view the source, extract private key
•   OWASP M9: Broken Cryptography
•   Do developers really do this?




                                                     45
Why yes, they do!




                    46
Privacy Issues
• Example: Draw Something App (Top 25)
• UDID and more sent to the following third-party ad
  providers:
   – appads.com
   – mydas.mobi
   – greystripe.com
   – tapjoyads.com


                                                       47
What is UDID?
• Alphanumeric string that uniquely identifies an
  Apple device




                                                    48
49
Pinterest and Flurry.com




                           50
51
Conclusions
•   Mobile devices are critically common
•   Most people use them without thinking of security
•   Developers seem to be repeating the past
•   Lots of issues besides Mobile Application Security
     – BYOD
     – The device itself (Jailbreaking/Rooting)
     – MDM and Enterprise Management
     – The list goes on…

                                                         52

More Related Content

PDF
Smart Bombs: Mobile Vulnerability and Exploitation
PDF
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
PDF
Attacking and Defending Apple iOS Devices
PDF
YOW! Connected 2014 - Developing Secure iOS Applications
PPTX
Hacking Mobile Apps
PDF
Malware on Smartphones and Tablets - The Inconvenient Truth
PPTX
iOS Security and Encryption
PDF
Android security and penetration testing | DIVA | Yogesh Ojha
Smart Bombs: Mobile Vulnerability and Exploitation
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Attacking and Defending Apple iOS Devices
YOW! Connected 2014 - Developing Secure iOS Applications
Hacking Mobile Apps
Malware on Smartphones and Tablets - The Inconvenient Truth
iOS Security and Encryption
Android security and penetration testing | DIVA | Yogesh Ojha

What's hot (20)

PDF
Android Hacking
PDF
Mobile Hacking
PDF
iOS backdoors attack points and surveillance mechanisms
PPTX
Android Hacking + Pentesting
PPT
WhatsApp Forensic
PDF
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
PDF
IoT security zigbee -- Null Meet bangalore
PPTX
User's Guide to Online Privacy
PDF
Cyber security
PDF
Ruxmon April 2014 - Introduction to iOS Penetration Testing
PPTX
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
PDF
Cyber safety
PDF
Hacking android apps by srini0x00
PPT
Mobile phone Data Hacking
PDF
CNIT 128 Ch 3: iOS
PPTX
An Introduction To IT Security And Privacy In Libraries
PDF
Mobile Application Pentest [Fast-Track]
PDF
Hacking your Android (slides)
PDF
Android system security
PPTX
An Introduction To IT Security And Privacy In Libraries & Anywhere
Android Hacking
Mobile Hacking
iOS backdoors attack points and surveillance mechanisms
Android Hacking + Pentesting
WhatsApp Forensic
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
IoT security zigbee -- Null Meet bangalore
User's Guide to Online Privacy
Cyber security
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Cyber safety
Hacking android apps by srini0x00
Mobile phone Data Hacking
CNIT 128 Ch 3: iOS
An Introduction To IT Security And Privacy In Libraries
Mobile Application Pentest [Fast-Track]
Hacking your Android (slides)
Android system security
An Introduction To IT Security And Privacy In Libraries & Anywhere
Ad

Similar to Smart Bombs: Mobile Vulnerability and Exploitation (20)

PPT
Mobile Apps Security
PDF
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
PDF
михаил дударев
PPTX
Windows Phone 8 Security and Testing WP8 Apps
PPT
Nomura UCCSC 2009
PPTX
Null mumbai-reversing-IoT-firmware
PPTX
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
PDF
Internet security
PDF
Malware cryptomining uploadv3
PDF
Brief Tour about Android Security
PDF
Luiz eduardo. introduction to mobile snitch
PPSX
Geek Night 15.0 - Touring the Dark-Side of the Internet
PDF
Big Data Approaches to Cloud Security
PDF
Hunting: Defense Against The Dark Arts v2
PDF
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
PDF
Top 10 Threats to Cloud Security
PDF
All Your Security Events Are Belong to ... You!
PDF
All your logs are belong to you!
PPTX
Pentesting iPhone applications
PPT
java-card20232024999999999999999999999999999999999999999999999999999999999999...
Mobile Apps Security
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
михаил дударев
Windows Phone 8 Security and Testing WP8 Apps
Nomura UCCSC 2009
Null mumbai-reversing-IoT-firmware
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Internet security
Malware cryptomining uploadv3
Brief Tour about Android Security
Luiz eduardo. introduction to mobile snitch
Geek Night 15.0 - Touring the Dark-Side of the Internet
Big Data Approaches to Cloud Security
Hunting: Defense Against The Dark Arts v2
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
Top 10 Threats to Cloud Security
All Your Security Events Are Belong to ... You!
All your logs are belong to you!
Pentesting iPhone applications
java-card20232024999999999999999999999999999999999999999999999999999999999999...
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPT
Teaching material agriculture food technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
A Presentation on Artificial Intelligence
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Approach and Philosophy of On baking technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
MYSQL Presentation for SQL database connectivity
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
Understanding_Digital_Forensics_Presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Machine learning based COVID-19 study performance prediction
Reach Out and Touch Someone: Haptics and Empathic Computing
A Presentation on Artificial Intelligence
Network Security Unit 5.pdf for BCA BBA.
Approach and Philosophy of On baking technology
Building Integrated photovoltaic BIPV_UPV.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Review of recent advances in non-invasive hemoglobin estimation
Digital-Transformation-Roadmap-for-Companies.pptx

Smart Bombs: Mobile Vulnerability and Exploitation

  • 1. Smart Bombs: Mobile Vulnerability and Exploitation Tom Eston
  • 4. Tom Eston • Manager, SecureState Profiling & Penetration Team • Blogger – SpyLogic.net • Infrequent Podcaster – Security Justice/Social Media Security • Zombie aficionado • I like to break new technology 4
  • 5. What are we talking about today? • What’s at risk? • Tools, Testing and Exploitation • Common vulnerabilities found in popular apps (this is the fun part) • Special thanks to Kevin Johnson and John Sawyer who helped with this research! 5
  • 6. What are Smart Bombs? • We’ve got powerful technology in the palm of our hands! • We store and transmit sensitive data • Mobile devices are being used by: – Major Businesses (PII) – Energy Companies (The Grid) – The Government(s) – Hospitals (PHI) – Your Mom (Scary) 6
  • 8. Testing Mobile Apps • What are the three major areas for testing? – File System What are apps writing to the file system? How is data stored? – Application Layer How are apps communicating via HTTP and Web Services? SSL? – Transport Layer How are apps communicating over the network? TCP and Third-party APIs 8
  • 9. OWASP Top 10 Mobile Risks 1. Insecure Data Storage 2. Weak Server Side Controls 3. Insufficient Transport Layer Protection 4. Client Side Injection 5. Poor Authorization and Authentication 9
  • 10. OWASP Top 10 Mobile Risks 6. Improper Session Handling 7. Security Decisions Via Untrusted Inputs 8. Side Channel Data Leakage 9. Broken Cryptography 10. Sensitive Information Disclosure 10
  • 11. OWASP Mobile Security Project • You should get involved! • https://www.owasp.org/index.php/OWASP_Mobile_Security_Project 11
  • 12. Other Issues • Privacy of your data! – Mobile apps talk to many third party APIs (ads) – What’s collected by Google/Apple/Microsoft? 12
  • 13. Common Tools • SSH • VNC server • A compiler (gcc / agcc) • Android SDK (adb!) • Xcode • iExplorer (iOS GUI file explorer) • Jailbroken iDevice • Rooted Android Device 13
  • 14. File System Analysis • Forensic approach – File system artifacts – Timeline analysis – Log analysis – Temp files 14
  • 15. Forensic Tools • Mobile Forensic Tools – EnCase, FTK, Cellebrite • Free and/or Open Source – file, strings, less, dd, md5sum – The Sleuthkit (mactime, mac-robber) 15
  • 16. Timelines • Timelines are awesome – Anyone know log2timeline? • Filesystem – mac-robber – mactime • Logs – Application- & OS-specific 16
  • 18. Viewing & Searching Files • cat, less, vi, strings, grep • SQLite files – GUI browser, API (Ruby, Python, etc) • Android apps – ashell, aSQLiteManager, aLogViewer 18
  • 19. Application Layer - HTTP • Tools Used: – Burp Suite – Burp Suite – oh yeah Burp Suite! 19
  • 20. Why Look at the App Layer? • Very common in mobile platforms • Many errors are found within the application – And how it talks to the back end service • Able to use many existing tools 20
  • 22. Base64 Encoding is NOT Encryption! • Really. It’s 2012. Base64: TXkgc3VwZXIgc2VjcmV0IGtleSE= Plaintext: My super secret key! 22
  • 23. Want Credentials? Note: This is actually a hardcoded password in the UPS app… 23
  • 24. Transport Layer - TCP • Tools Used: – Wireshark – Tcpdump – NetworkMiner 24
  • 25. Why look at the transport layer? • Check to see how network protocols are handled in the app • Easily look for SSL certificate or other communication issues 25
  • 26. NetworkMiner • Extracts files/images and more • Can pull out clear txt credentials • Quickly view parameters 26
  • 27. 27
  • 28. TCP Lab Setup • Run tcpdump directly on the device • Run Wireshark by sniffing traffic over wireless AP or network hub setup (lots of ways to do this) • Import PCAPs into NetworkMiner 28
  • 29. App Vulnerabilities • Several examples that we’ve found • Many from the Top 25 downloaded apps 29
  • 30. Facebook • OAuth Tokens Stored in PLIST file • Simply copy the PLIST file to another device, you’re logged in as them! • I’m finding OAuth tokens in lots of PLIST files…Dropbox and apps that use Dropbox like password managers… 30
  • 31. Evernote • Notebooks are stored in the cloud • But…caches some files on the device… • OWASP M1: Insecure Data Storage 31
  • 32. 32
  • 33. MyFitnessPal • Android app stores sensitive data on the device (too much data) 33
  • 34. 34
  • 35. Password Keeper “Lite” • PIN and passwords stored in clear-text SQLite database • So much for the security of your passwords… 35
  • 36. 36
  • 37. 37
  • 38. 38
  • 39. Draw Something • Word list stored on the device • Modify to mess with your friends 39
  • 40. LinkedIn • SSL only for authentication • Session tokens and data sent over HTTP • Lots of apps do this • M3: Insufficient Transport Layer Protection • Note: This was fixed with the latest version of the app (for iOS at least) 40
  • 41. Auth over SSL Data sent over HTTP 41
  • 42. 42
  • 43. Pandora • Registration over HTTP • User name/Password and Registration info sent over clear text • Unfortunately…lots of apps do this 43
  • 44. 44
  • 45. Hard Coded Passwords/Keys • Major Grocery Chain “Rewards” Android app • Simple to view the source, extract private key • OWASP M9: Broken Cryptography • Do developers really do this? 45
  • 46. Why yes, they do! 46
  • 47. Privacy Issues • Example: Draw Something App (Top 25) • UDID and more sent to the following third-party ad providers: – appads.com – mydas.mobi – greystripe.com – tapjoyads.com 47
  • 48. What is UDID? • Alphanumeric string that uniquely identifies an Apple device 48
  • 49. 49
  • 51. 51
  • 52. Conclusions • Mobile devices are critically common • Most people use them without thinking of security • Developers seem to be repeating the past • Lots of issues besides Mobile Application Security – BYOD – The device itself (Jailbreaking/Rooting) – MDM and Enterprise Management – The list goes on… 52