Top Banner
Hacking The iPhone Group 17 Shelby Allen Richard Denney
15

Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Hacking The iPhoneGroup 17

Shelby Allen

Richard Denney

Page 2: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Outline Introduction Lab goals Procedure Results Conclusions Defenses References

Page 3: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Introduction Proliferation of mobile devices Popularity of iPhone Soon-to-be released SDK

Page 4: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Lab Goals Show that the iPhone, and by extension all

future mobile devices, are locked away computers and so they should be given the same security precautions as a computer.

Page 5: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Procedure Buffer overflow Copy and edit disk image Install SSH Copy files

Page 6: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Results Installer

Community sources Easy install Easy update

Page 7: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Results MobileFinder

Explore file system Fully functional

Page 8: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Results MobileFinder

Explore file system Fully functional

Page 9: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Results Term-vt100

Terminal that won’t go away

Partial functionality expandable

Page 10: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Results Sysinfo

Task Manager equiv. Can kill processes All processes ran as

root

Page 11: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Conclusions A computer in a mobile device’s body The default user is the only user – root Serious vulnerabilities

Default user name and password All programs ran as root

A vulnerability in any program compromises the entire system

Buffer overflow

Page 12: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Defenses Change user name and password Download newest firmware Same practices as a computer Lobby for better security

Page 13: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Lab Structure Student will:

Jailbreak iPod Touch Load custom applications Explore architecture Evaluate device security

Page 14: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

References For more information on iPod/iPhone hacking,

visit: Instruction guide to hacking iPod Touch

http://forums.macrumors.com/showthread.php?p=4308881&nojs=1

Installer.app Homepage http://iphone.nullriver.com/beta/

Ipod Touch hacking wiki http://www.touchdev.net/wiki/Main_Page

Iphone security evaluation by consulting firm http://www.securityevaluators.com/iphone/

Page 15: Hacking The iPhone Group 17 Shelby Allen Richard Denney.

Questions?