Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

IOS Security Basics - NULL/ OWASP/G4H Meet

717 views

Published on

Basic IOS Security internals .
1 . Secure Boot
2 . Full Disk Encryption
3 . Application Sandbox
4 . Network Traffic

Published in: Technology
  • Be the first to comment

  • Be the first to like this

IOS Security Basics - NULL/ OWASP/G4H Meet

  1. 1. IOS SECURITY BASICS @antojosep007
  2. 2. @WHOAMI  ANTO JOSEPH  Security Engineer @ Citrix  Passionate about Mobile Security Research  Past : Developer / SysAdmin  Speaker / Trainer @ HITB AMS / NullCon / GroundZero / c0c0n etc  Contributes to OWASP Mobile Security Guide / Checklist
  3. 3. SECURE BOOT  1. Read only boot rom  2. LLB  3. iBoot  1 . Recovery ( DFU)  2. Kernel  Load Drivers  Start Daemons
  4. 4. APP SANDBOX  Mac based  Confined to App Directory  Some IOS versions how ever allowed access to arbitrary locations including /private/var/mobile/Media/Photos/
  5. 5. FDE  First to Introduce it in the Market  Solves Data at Rest Problem  Device KEY + User Passcode = File Sys Key  File Sys Key used to Decrypt File Meta Data  File Meta Data has per file key
  6. 6. KEYCHAIN  Can Store Secret Information here  Mediated through securityd daemon  Can Specify events when the keychain data should be avaliable  Jailbroken device = NO KEYCHAIN SECURITY  Use Keychain Dumper from Cydia
  7. 7. JAILBREAKING  Required to run unsigned code in the device  Required for security testing  Required for Modifying the Device  Required for Awesomeness !!
  8. 8. PANGU / EVASION
  9. 9. APPSEC ESSENTIALS ( FS )  Use iExplorer / iFunBox to Explore the App SandBox  Check Plist Files  Check Binary Cookies  Check Screenshots  Check Keyboard Cache ( Autocomplete data may go in here )  Check for Sqlites  Check for Sensitive Data Elsewhere
  10. 10. APPSEC ESSENTIALS ( NETWORK)  Use a standard HTTP proxy to Intercept Traffic  Install Proxy Certificate on the device  Change proxy settings in WIFI settings  Install SSL TRUST KILLER for Certificate Pinning Bypass if needed  Use ipTables to intercept non-http traffic
  11. 11. DEMO TIME
  12. 12. QUESTIONS ?
  13. 13. THANKS

×