Managing Jailbreak Threats on Ios Enterprise Mobile Security WHITE PAPER
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Isam: an Iphone Stealth Airborne Malware
iSAM: An iPhone Stealth Airborne Malware Dimitrios Damopoulos, Georgios Kambourakis, and Stefanos Gritzalis Info-Sec-Lab Laboratory of Information and Communications Systems Security, University of the Aegean, Samos, Greece {ddamop,gkamb,sgritz}@aegean.gr http://www.icsd.aegean.gr/info-sec-lab Abstract. Modern and powerful mobile devices comprise an attractive target for any potential intruder or malicious code. The usual goal of an attack is to acquire users’ sensitive data or compromise the device so as to use it as a stepping stone (or bot) to unleash a number of attacks to other targets. In this paper, we focus on the popular iPhone device. We create a new stealth and airborne malware namely iSAM able to wirelessly infect and self-propagate to iPhone devices. iSAM incorporates six different malware mechanisms, and is able to connect back to the iSAM bot master server to update its programming logic or to obey commands and unleash a synchronized attack. Our analysis unveils the internal mechanics of iSAM and discusses the way all iSAM components contribute towards achieving its goals. Although iSAM has been specifically designed for iPhone it can be easily modified to attack any iOS-based device. Keywords: Malware, iPhone, iOS, Jailbreak, Stealth, Airborne, Rootkit. 1 Introduction Mobile devices have evolved and experienced an immense popularity over the last few years. These devices have penetrated the market due to the variety of data services they offer, such as texting, emailing, browsing the Internet, documents editing, listening to music, watching videos and playing games in addition to the traditional voice services. As a result, analysts are expecting a mobile device population of 5 billion by 2015 [1]. -
Beginners Guide to Developing for a Jailbroken Ios Plaxorm
Beginners Guide to Developing for a Jailbroken iOS Plaorm Priya Rajagopal Twier: @rajagp Blog: hp://www.priyaontech.com CocoaHeads, Jan 2012 Jailbreaking is Legal (..at least in the US) Priya Rajagopal, CocoaHeads,2012 Why develop for a jailbroken plaorm? • Develop run-Ume patches (.dylibs) that can be automacally loaded and shared across apps – Link with third part dylibs (eg- BTStack) • Hook into “system” apps and control plaorm behavior – Eg. Mobile Safari, Springboard • UUlize features not exposed through SDK’s public APIs to build something really cool Priya Rajagopal, CocoaHeads,2012 3 Why develop for a jailbroken plaorm? • More control over the plaorm – Terminal window, ssh, scp, rm etc. It’s a unix system. • Don’t need an Apple developer’s license – Self signed apps, pseudo signed apps • You don’t even need a Mac – You can even develop on the phone (Cool!) • Opons : – Distribute through Cydia – Internal Enterprise apps – Personal use. If you can’t find it, you can build it! Priya Rajagopal, CocoaHeads,2012 4 Tethered vs. Untethered Jailbreak • Tethered – You need to tether your device to your PC to reboot it. Quite inconvenient • Untethered – You don’t need to tether your device to your PC to reboot it. • ParUal Untethered – Tethered but you can reboot untethered to enable minimal funcUonality Priya Rajagopal, CocoaHeads,2012 5 Jailbreak Sogware (If its not free, it’s a scam) • RedSn0w (Mac /Windows) • Jailbreakme.com (Web) • PwnageTool (Mac) • GreenPois0n (Mac/Windows) Priya Rajagopal, CocoaHeads,2012 6 Status of iOS Jailbreak -
Jailbreak D'ios
Jailbreak d'iOS Débridage d'iOS Un outil similaire à Blackra1n, Limera1n, est par la suite développé et publié lors de la sortie de la version 4.1 Pour les articles homonymes, voir Jailbreak. d'iOS, malgré un problème présent dans la première ver- sion de cet outil. Le jailbreak d'iOS, également appelé débridage Des outils comme redsn0w, Pwnage Tool et Sn0wbreeze d'iOS, déverrouillage ou déplombage est un proces- ainsi que GreenPois0n, Absinthe (pour l'iPhone 4S et sus permettant aux appareils tournant sous le système l'iPad 2) permettent de jailbreaker les versions plus ré- d'exploitation mobile d'Apple iOS (tels que l'iPad, centes du terminal. l'iPhone, l'iPod touch, et plus récemment, l'Apple TV) d'obtenir un accès complet pour déverrouiller toutes les Depuis le 6 janvier 2013, il est possible de jailbreaker fonctionnalités du système d'exploitation, éliminant ain- les terminaux sous l'iOS 6, et ce jusqu'à la version 6.1.2, si les restrictions posées par Apple. Une fois iOS débri- par le biais d'un outil connu sous le nom d'Evasi0n. Cette dé, ses utilisateurs sont en mesure de télécharger d'autres méthode s’applique pour tous les terminaux supportant applications, des extensions ainsi que des thèmes qui ne IOS 6 mise à part l'Apple TV. Les versions 6.1.2 jus- sont pas proposés sur la boutique d'application officielle qu’à 6.1.6 ont été libéré en janvier 2014 grâce au logiciel d'Apple, l'App Store, via des installeurs comme Cydia. -
Distributed Tuning of Boundary Resources: the Case of Apple's Ios Service System
Ben Eaton, Silvia Elaluf-Calderwood, Carsten Sørensen and Youngjin Yoo Distributed tuning of boundary resources: the case of Apple's iOS service system Article (Published version) (Refereed) Original citation: Eaton, Ben, Elaluf-Calderwood, Silvia, Sorensen, Carsten and Yoo, Youngjin (2015) Distributed tuning of boundary resources: the case of Apple's iOS service system. MIS Quarterly, 39 (1). pp. 217-243. ISSN 0276-7783 Reuse of this item is permitted through licensing under the Creative Commons: © 2015 The Authors CC-BY This version available at: http://eprints.lse.ac.uk/63272/ Available in LSE Research Online: August 2015 LSE has developed LSE Research Online so that users may access research output of the School. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. You may freely distribute the URL (http://eprints.lse.ac.uk) of the LSE Research Online website. SPECIAL ISSUE: SERVICE INNOVATION IN THE DIGITAL AGE DISTRIBUTED TUNING OF BOUNDARY RESOURCES: THE CASE OF APPLE’S IOS SERVICE SYSTEM1 Ben Eaton Department of IT Management, Copenhagen Business School, Copenhagen, DENMARK {[email protected]} Silvia Elaluf-Calderwood and Carsten Sørensen Department of Management, The London School of Economics and Political Science, London, GREAT BRITAIN {[email protected]} {[email protected]} Youngjin Yoo Fox School of Business, Temple University, Philadelphia, PA 19140 UNITED STATES {[email protected]} The digital age has seen the rise of service systems involving highly distributed, heterogeneous, and resource- integrating actors whose relationships are governed by shared institutional logics, standards, and digital technology. -
Blackhatonomics.Pdf
Blackhatonomics This page is intentionally left blank Blackhatonomics An Inside Look at the Economics of Cybercrime Will Gragido Daniel Molina John Pirc Nick Selby Andrew Hay, Technical Editor AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Syngress is an Imprint of Elsevier Acquiring Editor: Steve Elliot Development Editor: Heather Scherer Project Manager: Malathi Samayan Designer: Mark Rogers Syngress is an imprint of Elsevier 225 Wyman Street, Waltham, MA 02451, USA Copyright © 2013 Elsevier, Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Pub- lisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions This book and the individual contributions contained in it are protected under copy- right by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a profes- sional responsibility. -
Protección De Aplicaciones Móviles En Ios
Protección de Aplicaciones Móviles en iOS Trabajo Final de Máster Curso 2017-18 Máster Interuniversitario de Seguridad de las Tecnologías de la Información y de las Comunicaciones (MISTIC) Realizado por: Félix Garcia Lainez Consultor: Pau del Canto Rodrigo Profesor de la Asignatura: Victor García Font Fecha de Entrega: Junio de 2018 TFM - Protección de Aplicaciones Móviles en iOS ! Esta obra está sujeta a una licencia de Reconocimiento- NoComercial-SinObraDerivada 3.0 España de Creative Commons "2 TFM - Protección de Aplicaciones Móviles en iOS Ficha del Trabajo Final! Título del trabajo: Protección de Aplicaciones Móviles en iOS Nombre del autor: Félix Garcia Lainez Nombre del consultor/a: Pau del Canto Rodrigo Nombre del PRA: Victor García Font Fecha de entrega (mm/aaaa): 06/2018 Titulación:: MISTIC Área del Trabajo Final: Trabajo Final de Máster Idioma del trabajo: Castellano Palabras clave Seguridad, Aplicaciones Móviles, iOS "3 TFM - Protección de Aplicaciones Móviles en iOS Resumen! El objetivo de este trabajo ha sido la creación de una guía o manual de referencia para el desarrollo de aplicaciones móviles nativas seguras en iOS.! Para poner en contexto este trabajo, tal y como se describe en los capítulos 2.1 y 2.2 de esta memoria, la gran popularidad que han alcanzado las aplicaciones móviles en los últimos años ha propiciado la aparición de una gran cantidad de riesgos y amenazas asociadas a este tipo de tecnologías. ! Con el objetivo de mitigar y prevenir estos riesgos y amenazas, tal y como se recoge en el capítulo 2.3, el OWASP trató de estandarizar el desarrollo de este tipo de aplicaciones a través de la creación del MASVS [1]. -
Versatile Ipad Forensic Acquisition Using the Apple Camera
CORE Metadata, citation and similar papers at core.ac.uk Provided by Elsevier - Publisher Connector Computers and Mathematics with Applications 63 (2012) 544–553 Contents lists available at SciVerse ScienceDirect Computers and Mathematics with Applications journal homepage: www.elsevier.com/locate/camwa Versatile iPad forensic acquisition using the Apple Camera Connection Kit Luis Gómez-Miralles, Joan Arnedo-Moreno ∗ Internet Interdisciplinary Institute (IN3), Universitat Oberta de Catalunya, Carrer Roc Boronat 117, 08018 Barcelona, Spain article info a b s t r a c t Keywords: The Apple iPad is a popular tablet device presented by Apple in early 2010. The Forensics idiosyncracies of this new portable device and the kind of data it may store open new IPad opportunities in the field of computer forensics. Given that its design, both internal and Cybercrime Digital investigation external, is very similar to the iPhone, the current easiest way to obtain a forensic image is Apple to install an SSH server and some tools, dump its internal storage and transfer it to a remote host via wireless networking. This approach may require up to 20 hours. In this paper, we present a novel approach that takes advantage of an undocumented feature so that it is possible to use a cheap iPad accessory, the Camera Connection Kit, to image the disk to an external hard drive attached via USB connection, greatly reducing the required time. ' 2011 Elsevier Ltd. All rights reserved. 1. Introduction Portable devices have become a very important technology in society, allowing access to computing resources or services in an ubiquitous manner. In this regard, mobile phones have become the clear spearhead, undergoing a great transformation in recent years, slowly becoming small computers that can be conveniently carried in our pockets and managed with one hand. -
Terminos Iphone
Ing. Jhonis Bermudez En el Mundo Iphone Terminos más Comunes en el Mundo IPhone • iPhone 2G o EDGE: Es el iPhone de primera generación que tiene una velocidad de conexion EDGE. • IPhone 3G: iPhone de segunda generación más delgado que el primero y con una velocidad de conexion 3G • IPhone 3GS: iPhone de tercera generación, a diferencia del 3G, posee mejor procesador, mas memoria y mejor cámara. • IPhone 4: iPhone de cuarta generación, rediseñado completamente y con mejoras en todos los sentidos. • iPad: Primera generación del Tablet de Apple • iPod touch 1G: Primera generación de iPod Touch. • iPod Touch 2G: Segunda generación del iPod Touch. • iPod Touch 3G: Tercera generación del iPod touch, más rápido que el 2G. • iDevice: Forma simple de referirse a los dispositivos iPhone iPod Touch e iPad. Terminos iPhone: • Acelerómetro: Dispositivo de forma nativa en el iPhone, iPod touch y iPad, que detecta cualquier movimiento e inclinación del iDevice. • App Store: La App Store es la tienda en línea creada por Apple para descargar aplicaciones para el iPhone, iPod Touch e IPAD. • Base Band: La BaseBand es un subsistema del iPhone que controla todas las funciones que requieren una antena, como ser el teléfono. Un desbloqueo se obtiene cambiando el subsistema. La banda se separa del sistema operativo, posee su propio procesador y su propio firmware. Articulo original: http://www.locuraiphone.net/wiki-locuraiphone/#ixzz1Sc0abRYF Ing. Jhonis Bermudez En el Mundo Iphone • Botón de Inicio: El botón Inicio se encuentra en la parte baja del iDevice, se usa por ejemplo, para cerrar una aplicación. • Botón de encendido: El botón de encendido se encuentra en la parte superior del iDevice, se usa, por ejemplo, para apagar el dispositivo. -
Managing Jailbreak Threats on Ios Enterprise Mobile Security WHITEPAPER
WHITEPAPER Managing Jailbreak Threats on iOS Enterprise Mobile Security WHITEPAPER I. Introduction Apple strongly discourages iOS users from jailbreaking their devices and for good reason: the practice can impair Jailbreakers can easily avoid detection key device functionality, such as OS upgrades, and can 3 also introduce significant security risks, such as the ability using free tools such as xCon or to download and execute unvetted and potentially FLEX4 that fool standard jailbreak malicious applications. detection tests. Nonetheless, many people ignore these risks and jailbreak their devices to unlock capabilities or content that Apple otherwise prohibits on iOS. A range of free tools and tutorials have made jailbreaking widely accessible, even to non-technical users. Consequently, an estimated 7.5% II. The Path to Jailbreaking of all iPhones, more than 30 million devices worldwide, are jailbroken. Jailbreaking is especially prevalent in China Motivation where an estimated 13% of all iPhones are jailbroken1. A wide variety of Apple-restricted iOS customisations and content might incentivise a user to jailbreak their device, Jailbreaking entails removing restrictions on iOS by such as: modifying system kernels to allow read and write access to the file system. This form of administrative privilege • Enabling app-multitasking with split-screen views escalation permits custom software installation and device • Locking individual apps with Touch ID behaviour modification. • Creating mobile wifi hotspots without paying While Apple diligently patches new jailbreak vulnerabilities, additional carrier charges it’s a constant game of Whack-A-Mole with the jailbreaking community racing to find new vulnerabilities whenever • Unlocking the phone to use the device internationally Apple releases iOS upgrades. -
Seven Deadliest USB Attacks.Pdf
Syngress is an imprint of Elsevier 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK Seven Deadliest USB Attacks © 2010, Elsevier, Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility. To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein. -
Ebook Sobre Jailbreak Y Cydia
eBookJailbreak.es Autor: @DavidRandulfe eBook sobre Jailbreak y Cydia El eBook que estabas esperando para aprovechar el Jailbreak al máximo eBookJailbreak.es © - Todos los Derechos Reservados Esta prohibida la copia, modificación de textos y enlaces y la extracción de contenidos bajo ningún medio o sistema independientemente de su finalidad. © David Randulfe - Todos los Derechos Reservados Página 1! eBookJailbreak.es Autor: @DavidRandulfe Agradecimientos Quería antes de nada agradecer a la gente que ha colaborado conmigo en la creación de este eBook ya sea aportando cosas como dando ideas o sugiriendo secciones o tutoriales por lo que paso a citarlos a -Pablo Asekas (@PabloAsekas) continuación: -Antonio Durán (@matrix_i4) -Gonzalo Arilla (@gadc333) -Hugo (@iHache_Hugo) -Antonio Expósito (@Antonioexp) -José Antonio (@jar77jar) -Diego Rodriguez (@DiegoGaRoQui) -Luis Manuel Villanueva (@Lu1sma) Si has obtenido este eBook sobre el Jailbreak y Cydia de forma ilegal por favor dirígete a la página oficial http://ebookjailbreak.es y realiza la compra del eBook de forma oficial por tan solo 2,99€, ya que he puesto ese precio accesible a todos para evitar temas de pirateria y además ha llevado mucho trabajo su realización y escritura. © David Randulfe - Todos los Derechos Reservados Página 2! eBookJailbreak.es Autor: @DavidRandulfe 1. Sobre el eBook ....................................................................................................... Página 4 2. Historia del Jailbreak en iOS .................................................................................. -
Zedrick A. Maldonado Burgos Advisor: Jeffrey Duffany, Ph.D Department Electrical and Computer Engineering & Computer Science Department
Jailbreak and Mobile Security Author: Zedrick A. Maldonado Burgos Advisor: Jeffrey Duffany, Ph.D Department Electrical and Computer Engineering & Computer Science Department Abstract Methodology Results and Discussion Conclusions In these modern times mobile devices are part of the everyday life of The research was outline by looking at the timeline of the We see the install of a modern third-party store for third party Exploiting the vulnerabilities of a system is something that will be present each individual. These devices contain a major part of each user modifications that have been realized during the years on mobile applications, tweaks and tools called Cydia. This store was created by for years to come. Security will keep getting better as vulnerabilities are information in comparison to their personal computers. On a mobile devices. These modifications were installed on mobile devices by Jay Freeman known as Saurik. This store is able add online repositories discovered and are published. By being public knowledge, these flaws are device people can access their bank account and make transactions jailbreak methods such as visiting a website that when the slide to such as to make available stores to download free applications that are put into consideration at the end user level when they are to make a with ease and eliminating lines in the bank as the mobile devices are unlock was done inside it ran a code on the device therefore paid apps on the App Store. The tweaks available in these stores make purchase. By manufactures working on new security updates mobile always connected to a network.