Skip to content

Latest commit

 

History

History
118 lines (107 loc) · 6.53 KB

Module 17 - Hacking Mobile Platform.md

File metadata and controls

118 lines (107 loc) · 6.53 KB

Module 17: Hacking Mobile Platform

Attack Vector

  • OWASP Top10 mobile risks-2016
    • Improper platform usage
    • Insecure data storage
    • Insecure Communication
    • Insecure authentication
    • Insufficient crypto
    • Insecure authorization
    • Client code quality
    • Code tempering
    • Reverse engineering
    • Extraneous functionality
  • Mobile attack vector
    • malware
    • data exfiltration
    • data tampering
    • data loss
  • SMS phishing (Smishing)
  • Agent smith attack
    • persuade the victim to install attacker's app
    • replace legitimate app
    • produce a hugh volume of ads
  • SS7 vulnerabilitiy
    • SS7 is a communication protocol that allows mobile users to exchange communication through another celular network
    • Operated depending on mutual trust between operators without any authentication
    • Exploit this vulnerability to perform a MITM
  • Simjacker: SIM Card attack, a vulnerability associated with a SIM card's S@T browser, a pre-installed software on SIM.

Hacking Android OS

  • Include an OS, middleware, and key applications
  • Android is a linux-based OS
  • Android device administration API: provide device administration features at the system level. Allow developers to create security-aware apps that useful in enterprise setting.
  • Android Rooting
    • Allow users to attain privileged control
    • Involve exploiting security vulnerabilities in the device firmware and copying the SU binary to a location in the current process's PATH and granting it exetuable permission with the chmod command
    • Tools: KingoRoot, One Click Root, TunesGo Root Android Tool
  • Blocking WIFI access using NetCut
  • Identify attack surfaces using drozer
  • Hacking with zANTI and Network Spoofer
  • Launch DoS using LOIC
  • Session hijacking using DroidSheep
  • Hacking with Orbot Proxy : A proxy app that empowers other apps to privately use the Internet
  • Exploiting android device through ADB (Android Debug Bridge) using PhoneSploit
    • ADB: Allow attackers to communicate with the target device
  • Sniffer: FaceNiff
  • Launch MITD (Man in the disk) attack: Lead to the installation of potential malicious app
  • Launch spearphone attack: Allow apps to record loudspeaker data without privileges.
  • Android trojans: Gustuff, xHelper
  • Hacking tools: cSploit, Fing-Network Tools
  • Security tools: Kaspersky mobile av
  • Device tracking tools: google find my device
  • Vulnerability scanners: X-ray
  • Online Android analyzers: Online APK analyzer

Hacking IOS

  • Jailbreaking IOS
    • The process of installing a modified set of kernel patches that allow users to run third-party apps not signed by the OS vendor
    • Provide root access
    • Remove sandbox restrictions
    • Types of jailbreaking
      • Userland exploit: Allow user level access
      • iBoot Exploit: Allow both user level access and iboot level access
      • Bootrom Exploit: Allow both user level access and iboot level access
    • Jailbreaking techniques
      • Untethered jailbreaking: In an untethered jailbreak, if the user turns the device off and back on, the device will start up completely and the kernel will be patched without the help of a computer; in other words, the device will be jailbroken after each reboot.

      • Semi-tethered jailbreaking: In a semi-tethered jailbreak, if the user turns the device off and back on, the device will start up completely. It will no longer have a patched kernel, but it will still be usable for normal functions. To use jailbroken addons, the user needs to start the device with the help of the jailbreaking tool.

      • Tethered jailbreaking: With a tethered jailbreak, if the device starts up on its own, it will no longer have a patched kernel, and it may get stuck in a partially started state; to start it completely and with a patched kernel, it essentially must be "re-jailbroken" with a computer (using the "boot tethered" feature of a jailbreaking tool) each time it is turned on.

      • Semi-untethered Jailbreaking: A semi-untethered jailbreak is similar to a semi-tethered jailbreak. In this type of jailbreak, when the device reboots, the kernel is not patched. However, the kernel can be patched without using a computer; it is patched using an app installed on the device.

    • Jailbreaking IOS 13.2 using Cydia
    • Jailbreaking IOS 13.2 using Hexxa Plus
  • Tools: Apricot , a web-based mirror operating system for all the latest iphones
  • Hacking using Spyzie
  • Hacking network using Network Analyzer Pro
  • IOS trustjacking: A vulnerability that can be exploited to read messages and emails and capture sensitive info from a remote location without the victim's knowledge. Exploit the "ITunes WIFI Sync" feature, where the victim connects their phone to any trusted computer that is already infected by an attacker
  • Malware: Clicker Trojan malware, Trident
  • Hacking tools: Elcomsoft Phone breaker
  • Security Tools: Avira mobile security
  • Tracking tools: Find my iphone

Mobile Device Management (MDM)

  • Solutions: IBM MaaS360, Citrix Endpoint Management
  • BYOD : Bring your own device is a policy that…
  • BYOD Policy implementation:
    • Define requirements
    • Select the device and build a technology portfolio
    • Develop policies
    • Security
    • Support

Mobile Security Guidelines and Tools

  • OWASP Top10 Mobile Controls
    • Identify and protect sensitive data on the mobile device
    • Handle password credentials securely on the device
    • Ensure sensitive data are protected in transit
    • Implement user authentication, authorization, and session management correctly
    • Keep the backend APIs (services) and platform (server) secure
    • Secure data integration with third-party services and applications
    • Pay specific attention to the collection and storage of consent for the collection and use of the user's data
    • Implement controls to prevent unauthorized access to paid-for resources
    • Ensure secure distribution /provisioning of mobile apps
    • Carefully check any runtime interpretation of code for errors
  • Reverse Engineering Mobile app
  • Source code analysis tools: z3A Advanced App Analysis
  • Reverse Engineering Tools: Apktool
  • App repackaging detector
    • repackaging is the process of extracting details of an app from legitimate app stores
    • Promon Shield
  • Protection tools: Lookout Personal, Zimperium's zIPS, BullGuard Mobile Security
  • Anti-spyware: Malwarebytes for Android
  • Pentesting toolkit: ImmuniWeb MobileSuite