15
Hacking The iPhone Group 17 Shelby Allen Richard Denney

Hacking The iPhone Group 17 Shelby Allen Richard Denney

  • View
    217

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Hacking The iPhone Group 17 Shelby Allen Richard Denney

Hacking The iPhoneGroup 17

Shelby Allen

Richard Denney

Page 2: Hacking The iPhone Group 17 Shelby Allen Richard Denney

Outline Introduction Lab goals Procedure Results Conclusions Defenses References

Page 3: Hacking The iPhone Group 17 Shelby Allen Richard Denney

Introduction Proliferation of mobile devices Popularity of iPhone Soon-to-be released SDK

Page 4: Hacking The iPhone Group 17 Shelby Allen Richard Denney

Lab Goals Show that the iPhone, and by extension all

future mobile devices, are locked away computers and so they should be given the same security precautions as a computer.

Page 5: Hacking The iPhone Group 17 Shelby Allen Richard Denney

Procedure Buffer overflow Copy and edit disk image Install SSH Copy files

Page 6: Hacking The iPhone Group 17 Shelby Allen Richard Denney

Results Installer

Community sources Easy install Easy update

Page 7: Hacking The iPhone Group 17 Shelby Allen Richard Denney

Results MobileFinder

Explore file system Fully functional

Page 8: Hacking The iPhone Group 17 Shelby Allen Richard Denney

Results MobileFinder

Explore file system Fully functional

Page 9: Hacking The iPhone Group 17 Shelby Allen Richard Denney

Results Term-vt100

Terminal that won’t go away

Partial functionality expandable

Page 10: Hacking The iPhone Group 17 Shelby Allen Richard Denney

Results Sysinfo

Task Manager equiv. Can kill processes All processes ran as

root

Page 11: Hacking The iPhone Group 17 Shelby Allen Richard Denney

Conclusions A computer in a mobile device’s body The default user is the only user – root Serious vulnerabilities

Default user name and password All programs ran as root

A vulnerability in any program compromises the entire system

Buffer overflow

Page 12: Hacking The iPhone Group 17 Shelby Allen Richard Denney

Defenses Change user name and password Download newest firmware Same practices as a computer Lobby for better security

Page 13: Hacking The iPhone Group 17 Shelby Allen Richard Denney

Lab Structure Student will:

Jailbreak iPod Touch Load custom applications Explore architecture Evaluate device security

Page 14: Hacking The iPhone Group 17 Shelby Allen Richard Denney

References For more information on iPod/iPhone hacking,

visit: Instruction guide to hacking iPod Touch

http://forums.macrumors.com/showthread.php?p=4308881&nojs=1

Installer.app Homepage http://iphone.nullriver.com/beta/

Ipod Touch hacking wiki http://www.touchdev.net/wiki/Main_Page

Iphone security evaluation by consulting firm http://www.securityevaluators.com/iphone/

Page 15: Hacking The iPhone Group 17 Shelby Allen Richard Denney

Questions?