SlideShare a Scribd company logo
Submit Search
Upload
Login
Signup
Throw It in the River: Towards Real Live Actual Smartphone Security
Report
Georgia Weidman
Follow
Information Security Consultant
Oct. 12, 2011
•
0 likes
•
1,796 views
1
of
36
Throw It in the River: Towards Real Live Actual Smartphone Security
Oct. 12, 2011
•
0 likes
•
1,796 views
Download Now
Download to read offline
Report
Business
Technology
Georgia Weidman
Follow
Information Security Consultant
Recommended
Transparent Smartphone Spying
Georgia Weidman
4.2K views
•
29 slides
Transparent Botnet C&C for Smartphones over SMS
Georgia Weidman
2.1K views
•
39 slides
Defcon 22-robert-rowley-detecting-defending-against-surveill
Priyanka Aash
2.7K views
•
40 slides
Mbs f41 b
SelectedPresentations
177 views
•
8 slides
Defcon 22-weston-hecker-burner-phone-ddos
Priyanka Aash
3.5K views
•
40 slides
Securing Wireless Cellular Systems
ACMBangalore
4.6K views
•
47 slides
More Related Content
What's hot
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
Luca Bongiorni
19.6K views
•
22 slides
CellSIM OS Overview 1.0
Vladimir Nagin
2.2K views
•
19 slides
IVR Solutions at the Enterprise Level
CallFire
1.3K views
•
29 slides
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Priyanka Aash
3.7K views
•
58 slides
Secur Digital Presentation 22jul10 Frm Show
fmitchell
187 views
•
18 slides
ANDROID SECURITY
yogeshraut090
163 views
•
21 slides
What's hot
(8)
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
Luca Bongiorni
•
19.6K views
CellSIM OS Overview 1.0
Vladimir Nagin
•
2.2K views
IVR Solutions at the Enterprise Level
CallFire
•
1.3K views
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Priyanka Aash
•
3.7K views
Secur Digital Presentation 22jul10 Frm Show
fmitchell
•
187 views
ANDROID SECURITY
yogeshraut090
•
163 views
2600Hz - Detecting and Managing VoIP Fraud
2600Hz
•
4.6K views
Voxeo Summit Day 2 - Securing customer interactions
Voxeo Corp
•
959 views
Similar to Throw It in the River: Towards Real Live Actual Smartphone Security
Sierraware virtual phone
Sierraware
583 views
•
20 slides
Understanding Telecom SIM and USIM/ISIM for LTE
ntel
62.2K views
•
95 slides
Assurity seminar 24 jan
Jason Kong
387 views
•
27 slides
Home automation
Finalyear Projects
331 views
•
7 slides
Infonetics and Stoke webinar: Security at the speed of VoLTE
Mary McEvoy Carroll
1.1K views
•
29 slides
J-Telecom_V2
Jihad Dib
239 views
•
26 slides
Similar to Throw It in the River: Towards Real Live Actual Smartphone Security
(20)
Sierraware virtual phone
Sierraware
•
583 views
Understanding Telecom SIM and USIM/ISIM for LTE
ntel
•
62.2K views
Assurity seminar 24 jan
Jason Kong
•
387 views
Home automation
Finalyear Projects
•
331 views
Infonetics and Stoke webinar: Security at the speed of VoLTE
Mary McEvoy Carroll
•
1.1K views
J-Telecom_V2
Jihad Dib
•
239 views
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
drctan
•
834 views
Securing mobile population for White Hats
Vladimir Jirasek
•
615 views
Secure VoIP - DroidCon 2015
Marco Pozzato
•
359 views
Pentesting Mobile Applications (Prashant Verma)
ClubHack
•
3.4K views
LeadDesk telephone technology
LeadDesk
•
3.2K views
Mobile Device Mismanagement
breenmachine
•
2K views
NEW TRENDS IN MOBILE NETWORKING
krishna kalpana
•
901 views
Mobile code mining for discovery and exploits nullcongoa2013
Blueinfy Solutions
•
1K views
Securing hand held computing devices
jraja01
•
552 views
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
Bjorn Hjelm
•
323 views
Working of Cyanogen mod
allwin thomas
•
65 views
Designing Secure Mobile Apps
Denim Group
•
3.3K views
Caller ID Android Application
Smitakshi Sen
•
706 views
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
Alan Quayle
•
45 views
Recently uploaded
Top 10 Tax Return Strategies
DoshiAccountants1
18 views
•
2 slides
How to properly use SEO, branding and brand protection to lower your CPA (4).pdf
IvanaFlynn1
41 views
•
44 slides
RISKS & BENEFITS OF SUPPLIER CONSOLIDATION IN IT PROCUREMENT
Markit
26 views
•
13 slides
BREAK THROUGH THE NOISE.pdf
Bloomerang
223 views
•
30 slides
EQX Corporate Presentation
Equinox Gold Corp.
329 views
•
28 slides
VC AI Deep Dive: Embracing the Potential, Addressing the challenges, and Pinp...
saastr
23 views
•
29 slides
Recently uploaded
(20)
Top 10 Tax Return Strategies
DoshiAccountants1
•
18 views
How to properly use SEO, branding and brand protection to lower your CPA (4).pdf
IvanaFlynn1
•
41 views
RISKS & BENEFITS OF SUPPLIER CONSOLIDATION IN IT PROCUREMENT
Markit
•
26 views
BREAK THROUGH THE NOISE.pdf
Bloomerang
•
223 views
EQX Corporate Presentation
Equinox Gold Corp.
•
329 views
VC AI Deep Dive: Embracing the Potential, Addressing the challenges, and Pinp...
saastr
•
23 views
Companny Profile 2022.pdf
apandimnpi
•
30 views
Media Kit
CJHaight
•
777 views
13. Gary Dessler - Human resource management (2020).pdf
min chan myae
•
89 views
Why can't we all Just get along?
Emily Webber
•
97 views
Social Media Presentation.pptx
LuanWise1
•
122 views
Reports_ Best Practices.pdf
Bloomerang
•
84 views
140 Book Marketing Ideas to Help Authors Increase Sales
Adrienne Jack
•
53 views
Decoding the 2023 Market: The Art and Science of Scaling GTM with ICONIQ Growth
saastr
•
17 views
SaaStr Fan Fav: The Latest 2023 Napkin Reveal with Christoph Janz
saastr
•
20 views
Emerson_SETHMATTISON.pdf
SethMattison1
•
553 views
Where German Tech Unicorn Founders Should Go Public
Christian Dahlen
•
54 views
SWOT Analaysis - Dr. Emmanuel Dotong.pdf
Dotong Consulting
•
84 views
2023 Sep - Utilizing Marketing Automation and Artificial Intelligence - Green...
Boundify
•
30 views
NewBase 14 September 2023 Energy News issue - 1656 by Khaled Al Awadi.pdf
Khaled Al Awadi
•
20 views
Throw It in the River: Towards Real Live Actual Smartphone Security
1.
Throw It in
the River? Towards Real Live Actual Smartphone Security Georgia Weidman © Georgia Weidman 2011 1
2.
Agenda • Problems and
Potential Solutions –Encryption –Applications –Updates –User Awareness © Georgia Weidman 2011 2
3.
Notes • This talk
focuses on Android and iPhone • Briefly touches on Windows Mobile and Blackberry • Radio based topics cover only GSM © Georgia Weidman 2011 3
4.
Encryption © Georgia
Weidman 2011 4
5.
Encryption Problems • Encryption
between phone and base station: – 2G: • Up to the base station to encrypt or not encrypt • Stream cipher A5/1 • Broken (Karsten Nohl Blackhat USA 2010) – 3G: • Encrypted • Stream cipher KASUMI(A5/3) • Conceptually broken © Georgia Weidman 2011 5
6.
Interception • Possible to
get phones to attach to a rogue base station • 2G rogue base station (Chris Pagent Defcon 2010) • Intercept all traffic while phone still works normally © Georgia Weidman 2011 6
7.
The Path of
Least Resistance • 4G/3G/2G are not backward compatible • Current phones still have 2G radio • Default is to use both 2G and 3G • When 3G not available phones will use 2G • 3G can be jammed to force phones to fall back © Georgia Weidman 2011 7
8.
Mitigation 1: Turn
off 2G • Forcing 2G use only is an available setting on modern smartphones • Forcing 3G+ only is not on iPhone or Android (seems to be on Blackberry) • We need to see this setting made available and default © Georgia Weidman 2011 8
9.
Mitigation #2: Encrypt
before Using • Telephony data sent over GSM is encoded not encrypted • Only encryption is the stream encryption • Smartphones have the resources and tools to add encryption (openssl etc.) © Georgia Weidman 2011 9
10.
Case Study: SMS SMS-Deliver
PDU Field Value Length of SMSC 07 Type of Address (SMSC) 91 Service Center Address (SMSC) 41 40 54 05 10 F1 SMS Deliver Info 04 Length of Sender Number 0B Type of Sender Number 91 Sender Number 51 17 34 45 88 F1 Protocol Identifier 00 Data Coding Scheme 00 Time Stamp 01 21 03 71 40 04 4A User Data Length 0A User Data E8 32 9B FD 46 97 D9 EC 37 © Georgia Weidman 2011 10
11.
Case Study: SMS SMS-Deliver
PDU Field Value Length of SMSC 07 Type of Address (SMSC) 91 Service Center Address (SMSC) 41 40 54 05 10 F1 SMS Deliver Info 04 Length of Sender Number 0B Type of Sender Number 91 Sender Number 51 17 34 45 88 F1 Protocol Identifier 00 Data Coding Scheme 00 Time Stamp 01 21 03 71 40 04 4A User Data Length 0A User Data E8 32 9B FD 46 97 D9 EC 37 © Georgia Weidman 2011 11
12.
Case Study: SMS •
Given an intercepted PDU 7bit GSM encoding is reversible • All data is recoverable • Ex: From: <redacted> Message: hellohello • Crafting a spoofed SMS-Send PDU is also possible © Georgia Weidman 2011 12
13.
Why We Care
about SMS? • Two Factor Authentication/ Account verification – Sends SMS with OTP – Verify with SMS on account setup • Mobile Banking – One time passwords for banking sent to customer’s over SMS – Balance reporting – Electronic bill paying © Georgia Weidman 2011 13
14.
Why We Care
about SMS • Vendor text messages Congrats <vendor> has this awesome product to protect your phone Go <here> to download it. – Links to a 3rd party app store – How do I know this came from <vendor>? Example: T-mobile Mobile Security © Georgia Weidman 2011 14
15.
Encrypting SMS • Intercept
SMS after the application send the message/before it goes to modem • Encrypt it and adjust SMS-Send PDU • Upon arrival decrypt with the key for the sender number • Then send to user application © Georgia Weidman 2011 15
16.
Demo Encrypted SMS on
Android © Georgia Weidman 2011 16
17.
Applications Software that runs
on the smartphones © Georgia Weidman 2011 17
18.
Android Apps Store •
Anyone can write an app and upload to the Android market • $25 signup fee • Anonymous signup possible • No certificate authority/self signed apps © Georgia Weidman 2011 18
19.
iPhone App Store •
Must have a developer certificate to even run code on your own device • $99/year • Identity is verified • All code is reviewed and signed before upload to the store © Georgia Weidman 2011 19
20.
iPhone Security Protections •
Mandatory code signing/ apps cannot load new code at runtime • ASLR on system binaries and some apps in 4.3 and later • Individual apps sandboxed with MAC for system permissions etc. © Georgia Weidman 2011 20
21.
Android Security Protections •
User must accept application permissions upon install © Georgia Weidman 2011 21
22.
Android Insecurity • Can
load new code at runtime (Twilight Botnet, Rootstrap app) • Sandbox is flawed, any app can exploit a kernel vulnerability • Apps can have any permissions they want if user will approve them (DroidDream) © Georgia Weidman 2011 22
23.
iPhone Insecurity • Not
all apps are compiled with full ASLR • Patches for apps go through slow review process © Georgia Weidman 2011 23
24.
Software Updates • Smartphones
are subject to security flaws • Ex: Sendpage Linux Kernel exploit • Software updates address security issues © Georgia Weidman 2011 24
25.
How Smartphones Update •
Android – Pushes updates out over the air • iPhone – Updates through iTunes – Can update when attached to a computer with iTunes • Windows Mobile – Updates through Windows Mobile Activesync – Can update when attached to a computer with Activesync • Blackberry – Check for updates at Blackberry website – Download updates to computer – Connect phone to computer and run updates © Georgia Weidman 2011 25
26.
Why are Android
Updates Slow? • Google puts out the new version • Google releases source to other platform makers • Platform makers port new version with custom UI, apps, etc. • Previous updates have taken over 6 months © Georgia Weidman 2011 26
27.
Android’s Way on
Other Platforms • A simple solution for alerting user’s to updates over the air • System application checks currently installed firmware version • Periodically calls out to update server for current updated version • If update is available instructs the user to plug in and update © Georgia Weidman 2011 27
28.
Demo Update Application on
iPhone © Georgia Weidman 2011 28
29.
User Awareness Fails •
Great strides in computer user awareness • Not seeing the same with smartphones • With smartphones users have even more to lose © Georgia Weidman 2011 29
30.
Too Many App
Permissions • Android apps can request any permissions they want. • Up to the user to decide to decide if app is safe • Foursquare would need GPS but not SMS • Is this system working? © Georgia Weidman 2011 30
31.
Top Downloaded Android
App of all time © Georgia Weidman 2011 31
32.
Facebook App • Edit
and Read SMS, send SMS, receive SMS • Modify/delete USB storage contents • Prevent phone from sleeping, write sync settings • GPS data • Services that cost you money • Act as account authenticator, manage accounts • Read and write to your personal information including contact data • Phone calls, read phone state and identity • Full network access © Georgia Weidman 2011 32
33.
Jailbreaking Gone Wild •
Original Android G1 jailbreak: go to home screen, hit enter twice, type telnetd … • Current iPhone and Android Jailbreaks: Go to this website and say yes to running this unknown binary by an unknown person • It roots the phone, what else does it do? © Georgia Weidman 2011 33
34.
Raising User Awareness •
Stop with those “our apps are better/download all our apps” commercials • Ethical root/jailbreak programs should inform users of the risks • Smartphone security training in organizations © Georgia Weidman 2011 34
35.
Contact
Georgia Weidman Neohapsis Inc. Email: georgia@grmn00bs.com Georgia.weidman@neohapsis.com Website: http://www.grmn00bs.com Twitter: @vincentkadmon Code and Slides on website © Georgia Weidman 2011 35
36.
Selected Bibliography • Chris
Pagent “Practical Cellphone Spying” Defcon 2010: http://www.tombom.co.uk/cellphonespying.od • Karsten Nohl “Attacking Phone Privacy” Blackhat USA 2010: https://media.blackhat.com/bh-us-10/whitepapers/Nohl/BlackHat-USA- 2010-Nohl-Attacking.Phone.Privacy-wp.pdf • John Oberheide and Jach Lanier “Team JOCH vs. Android” Shmoocon 2011: http://jon.oberheide.org/files/shmoo11-teamjoch.pdf • Dino Dai Zovi “Apple iOS Security Evalution” Blackhat USA 2011: https://media.blackhat.com/bh-us- 11/DaiZovi/BH_US_11_DaiZovi_iOS_Security_WP.pdf © Georgia Weidman 2011 36