OWASP Top 10 Mobile Risks
- M1 - Improper Platform Usage - misuse of features or security controls (Android intents, TouchID, Keychain)
- M2 - Insecure Data Storage - improperly stored data and data leakage
- M3 - Insecure Communication - poor handshaking, incorrect SSL, clear-text communication
- M4 - Insecure Authentication - authenticating end user or bad session management
- M5 - Insufficient Cryptography - code that applies cryptography to an asset, but is insufficient (does NOT include SSL/TLS)
- M6 - Insecure Authorization - failures in authorization (access rights)
- M7 - Client Code Quality - catchall for code-level implementation problems
- M8 - Code Tampering - binary patching, resource modification, dynamic memory modification
- M9 - Reverse Engineering - reversing core binaries to find problems and exploits
- M10 - Extraneous Functionality - catchall for backdoors that were inadvertently placed by coders
Anatomy of a Mobile Attack
Hackers Profit
Mobile Attack Vectors
- Malicious app in stores
- Mobile Application vulnerabilities
- Mobile Malware
- Privacy Issues (Geolocation)
- App sandboxing vulnerabilities
- Protects systems and users by limiting the resources that the app can access to the mobile platform
- Weak data security
- Weak device and app encryption
- Excessive Permissions
- OS and app updates’ issues
- Weak Communication security
- Jailbreaking and rooting
- Physical attacks
- Mobile Spam
- Unsolicited text/email messages sent to mobile devices
- Can contain ads or malicious links
- SMS Phishing Attack
- Acquire personal and financial information by sending SMS
- Acts the same as a phishing attack but instead uses SMS
- Pairing to Open Bluetooth and Wi-Fi Connections
- Allows for eavesdrop and interception of data transmission
- Bluesnarfing and Bluebugging
Hacking Android OS
- Android OS Basic Info
- Developed by google
- Features
- Enabling reuse and replacement of components
- Variety of pre-build UI components
- Open source Blink and Webkit engine
- Media Support
- Rich development enviorment
Hacking IOS
- Apple IOS
- Apples Mobile OS
- Uses direct manipulation and multi touch gestures
- Jailbreaking
- Installing a modified set of kernel patches that allows users to run third party applications not singed by OS vendor
- Provides root access to the OS
- Removes sandbox restrictions
- Types of Jailbreaking
- Userland Exploit - Allows user-level access
- iBoot Exploit - Allows user-level access and iboot-level access
- Bootrom Exploit - Allows user-level access and iboot-level access
- Jailbreaking Techniques
- Untethered Jailbreaking - Allows the device to reboot and the kernel will still be patched
- Semi-tethered Jailbreaking - If the device reboots the kernel will no longer have a patched kernel but will still be usable for normal functions
- Tethered Jailbreaking - If the device reboots the kernel will no longer have a patched kernel and will get stuck in a partially started state
- Jailbreaking Tools
- Cydia - Enables a user to find and install software packages
- Pangu Anzhuang - Online jailbraking app
- Keen Jailbreak - Unofficial semi-tethered tool
- IOS Trojans
- AceDeceiver - Exploits flaw in DRM (Digitals Rights Management)
- Spy/MobileSpy!iPhoneOS - Malware allows and attacker to eavesdrop all incoming and outgoing communications
Securing IOS Devices
Mobile Device Management (MDM)
- Mobile Device Management
- Over-the-air or wired distribution of applications and configurations
- Helps implementing enterprise-wide policies
- Helps deploy and manage software applications across all enterprise mobile devices
- MDM Solutions
- IBM MaaS360 - Cloud platform
- XenMobile - Citrix enterprise MDM
- Bring Your Own Device (BYOD)
- Refers to a policy allowing an employee to bring their personal devices
- BYOD Risks
- BYOD Policy Implementation
- Define your requirements
- Select device of your choice and build a tech portfolio
- Develop policies
- Security
- Support
- BYOD Security Guidelines
Mobile Device Security Guidelines for Administrators
SMS Phishing Countermeasures