SlideShare a Scribd company logo
1 of 10
The iOS Secure Boot
You Maybe Secure , If You Have An IPhone. Ashish Jha (Security Analyst)
6/18/2017 1
Socially Connect With Me:
Facebook: https://www.facebook.com/ashish.v.jha
Directly Mail me : ashishjha120@gmail.com
Connect on LinkedIn: https://www.linkedin.com/in/ashish-j-4260969a
“When One Teaches Two Learn”
- Robert Heinlein
6/18/2017 2
What This Presentation Is About?
This Presentation is made with a view, To make the readers have a grasp of the “IOS” Operating Systems
secure booting process how it works, why we really say iPhones are “secure” , Well as far as security is
concerned nothing is much secure but the Apple Team has worked immensely on their platform to provide
security to their potential customers, That maybe the reason of their success.
This is for all those who are just kick starting in the dazzling world of mobile penetration testing and hacking
into mobile devices.
First it’ll be explaining all about IOS then we’ll dive into the pool of the secure booting process of the OS.
I’ve made my efforts to make you get some valuable piece of content here, And you may enjoy it.
Thank you!
6/18/2017 3
What The Heck is iOS?
IOS is short for “IPhone os”, the most widely used mobile operating system
used across the globe , it is the os created by Apple Inc. It is not only used in
mobile phones but also in the apple’s iPod touch & IPad. The current version of
the os is iOS 10. which was released on September 13, 2016.
The iOS mainly runs on ARM architectural hardware. Up till the release of the
iOS 7 , all the previous releases use to run on the 32-bits ARM processors
But with the release of iOS 7 , they made the os with the support of 64-bit
ARMv8-A processors.
More Knowledge: What is the (Advanced RISC Machine)ARM ?
- ARM makes 32-bit and 64-bit RISC multi-core processors.
- RISC processors are designed to perform a smaller number of types of
computer instructions so that they can operate at a higher speed,
performing more millions of instructions per second (MIPS)
6/18/2017 4
Some Features of The iOS?
The iOS is loaded with tons of features which makes it’s users life really easy and sophisticated as well.
Some of the features of the iOS are:
Multitasking: It is really needy as well as important to make something which is multitasking, meaning it can
make up to 5-7 tasks or more at same time. The apple makes this possible by make support of some awesome
background APIS(applications programming interface).
Some are :
1. Background audio
2. Task completions
3. Fast app switching.
4. Background location.
5. Background updates.
Siri: You may not have found a great person who just listens to you and give you all what you want,
Well apple has done that for you Siri is a personal assistant and navigator which is an application, It takes
users voice commands and interprets. 6/18/2017 5
iOS Security Model
The iOS security model is something which is
worth learning. This is the only reason of iPhones
being so secure.
The Security Model
Today we are only going to discuss the secure
Boot chani.
Security Model
Secure Boot Chain
Code Signing
Process-level Sandboxing
Data-at-rest Encryption
Generic Native Language exploit Mitigations:
1. Address Space Layout Randomization
2. Non-executable Memory
3. Stack-smashing Protection
6/18/2017 6
Secure Boot Chain
“Secure Boot Chain” – is used to describe the process by which firmware is initialized and loaded on the iOS
devices at boot time. We can consider it as the first layer of security of the platform.
It is considered as the most sophisticated and important step to check whether any file or component is being
modified or not.
The secure boot chain goes like this:
1. When an iOS device is turned on , The processor executes the boot ROM which is the read only code that
is built in the processor at the time of manufacturing.
2. The boot ROM contains the public key for the Apple’s Root CA, Which is used to verify the integrity of
the further steps of the boot chain That is the Low-level Bootloader(LLB).
3. The LLB Performs many setup tasks including locating the iBoot image flash memory.
4. LLB maintains the secure boot chain by verifying the signature of the iBoot images and if the signature
doesn’t matches the iBoot boots into recovery mode.
5. If the signature matched then , The iBoot which is the second stage bootloader is then responsible for
verifying and loading the kernel, which then loads the UI for the users.
6/18/2017 7
Secure Boot Chain
Boot ROM LLB iBoot iOS Kernel
The Secure Boot Chain
6/18/2017 8
No More Technical Explanation
Yes I know it is a bit hard to get around with the secure boot process, Please don’t worry it is the same for all
the beginners. Now let me make it easy for you to understand with a basic example.
Say for an instance you booked a hotel table yesterday night for having a lunch today with your Friend, You
booked it and got a ticket for it (Now the ticket is the LLB). You reached the hotel and the manager askes
you for you ticket to verify the booking and he verifies(Now the manger is Root CA), Now it has a number on
your ticket which is your table number(Now the table number on your ticket is the signature and the table
is the iBoot), You search and find the table that has the number same as the table number on the ticket ,
Done you go, sit and order your tasty food, the same way as the iBoot verifies the kernel and loads the iOS UI
It was just an example to make it clear, the concept in your mind , You can understand it as you, By making an
example.
6/18/2017 9
Thank You Geeks For Having A look.
Some of My Slides:
Learn Error Based SQL-Injection.
https://www.slideshare.net/pavj/error-based-sql-injection-76382267
ASHISH JHA
6/18/2017 10

More Related Content

What's hot

XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsThe Linux Foundation
 
Memory management
Memory managementMemory management
Memory managementcpjcollege
 
Volatile memory
Volatile memoryVolatile memory
Volatile memorySimon Paul
 
Booting of Computer System
Booting of Computer SystemBooting of Computer System
Booting of Computer SystemArzath Areeff
 
BIOS basic input output system
BIOS basic input output systemBIOS basic input output system
BIOS basic input output systemVipul Buchade
 
Motherboard arch. & component
Motherboard arch. & componentMotherboard arch. & component
Motherboard arch. & componentRahul Yadav
 
Chapter 1: Introduction to Operating System
Chapter 1: Introduction to Operating SystemChapter 1: Introduction to Operating System
Chapter 1: Introduction to Operating SystemShafaan Khaliq Bhatti
 
Linux booting Process
Linux booting ProcessLinux booting Process
Linux booting ProcessGaurav Sharma
 
Cache Memory Computer Architecture and organization
Cache Memory Computer Architecture and organizationCache Memory Computer Architecture and organization
Cache Memory Computer Architecture and organizationHumayra Khanum
 
Basic computer and RAM troubleshooting
Basic computer and RAM troubleshootingBasic computer and RAM troubleshooting
Basic computer and RAM troubleshootingLeah Gonzales
 
Google SafetyNet API
Google SafetyNet APIGoogle SafetyNet API
Google SafetyNet APISana Rahim
 

What's hot (20)

XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
 
iOS PPT
iOS PPTiOS PPT
iOS PPT
 
How to build a computer
How to build a computerHow to build a computer
How to build a computer
 
Memory management
Memory managementMemory management
Memory management
 
Volatile memory
Volatile memoryVolatile memory
Volatile memory
 
Ipc in linux
Ipc in linuxIpc in linux
Ipc in linux
 
ROM BIOS & POST
ROM BIOS & POSTROM BIOS & POST
ROM BIOS & POST
 
Booting of Computer System
Booting of Computer SystemBooting of Computer System
Booting of Computer System
 
BIOS basic input output system
BIOS basic input output systemBIOS basic input output system
BIOS basic input output system
 
Boot process
Boot processBoot process
Boot process
 
Boot process: BIOS vs UEFI
Boot process: BIOS vs UEFIBoot process: BIOS vs UEFI
Boot process: BIOS vs UEFI
 
Motherboard arch. & component
Motherboard arch. & componentMotherboard arch. & component
Motherboard arch. & component
 
Chapter 1: Introduction to Operating System
Chapter 1: Introduction to Operating SystemChapter 1: Introduction to Operating System
Chapter 1: Introduction to Operating System
 
computer form factor
 computer form factor computer form factor
computer form factor
 
Linux booting Process
Linux booting ProcessLinux booting Process
Linux booting Process
 
Hard Disk Componets
Hard Disk ComponetsHard Disk Componets
Hard Disk Componets
 
Cache Memory Computer Architecture and organization
Cache Memory Computer Architecture and organizationCache Memory Computer Architecture and organization
Cache Memory Computer Architecture and organization
 
Secondary Storage
Secondary StorageSecondary Storage
Secondary Storage
 
Basic computer and RAM troubleshooting
Basic computer and RAM troubleshootingBasic computer and RAM troubleshooting
Basic computer and RAM troubleshooting
 
Google SafetyNet API
Google SafetyNet APIGoogle SafetyNet API
Google SafetyNet API
 

Similar to iOS secure boot

iOS development made easy
iOS development made easyiOS development made easy
iOS development made easyAdrian Thompson
 
Saravanan iOS vs Android
Saravanan iOS vs AndroidSaravanan iOS vs Android
Saravanan iOS vs Androidsaravanansdec94
 
Saravanan iOS vs Android
Saravanan iOS vs AndroidSaravanan iOS vs Android
Saravanan iOS vs Androidsaravanansdec94
 
iOS Application Development Step by Step to develop an iOS App.pdf
iOS Application Development Step by Step to develop an iOS App.pdfiOS Application Development Step by Step to develop an iOS App.pdf
iOS Application Development Step by Step to develop an iOS App.pdfJPLoft Solutions
 
iOS Ecosystem @ Fiera del Radioamatore Pordenone
iOS Ecosystem @ Fiera del Radioamatore PordenoneiOS Ecosystem @ Fiera del Radioamatore Pordenone
iOS Ecosystem @ Fiera del Radioamatore PordenoneKlaus Lanzarini
 
iOS Hacking: Advanced Pentest & Forensic Techniques
iOS Hacking: Advanced Pentest & Forensic TechniquesiOS Hacking: Advanced Pentest & Forensic Techniques
iOS Hacking: Advanced Pentest & Forensic TechniquesÖmer Coşkun
 
CONFidence 2015: iOS Hacking: Advanced Pentest & Forensic Techniques - Omer S...
CONFidence 2015: iOS Hacking: Advanced Pentest & Forensic Techniques - Omer S...CONFidence 2015: iOS Hacking: Advanced Pentest & Forensic Techniques - Omer S...
CONFidence 2015: iOS Hacking: Advanced Pentest & Forensic Techniques - Omer S...PROIDEA
 
Presentation about Bios
Presentation about BiosPresentation about Bios
Presentation about BiosNaveedmte
 
Enterprise ipad Development with notes
Enterprise ipad Development with notesEnterprise ipad Development with notes
Enterprise ipad Development with notesjaxarcsig
 
iOSDevUK Conference- DevOps for iOS Apps
iOSDevUK Conference- DevOps for iOS AppsiOSDevUK Conference- DevOps for iOS Apps
iOSDevUK Conference- DevOps for iOS AppsShashikant Jagtap
 
Ramon Pastor of Rogomi inc on Trends in iOS Development at DevCon Summit 2013...
Ramon Pastor of Rogomi inc on Trends in iOS Development at DevCon Summit 2013...Ramon Pastor of Rogomi inc on Trends in iOS Development at DevCon Summit 2013...
Ramon Pastor of Rogomi inc on Trends in iOS Development at DevCon Summit 2013...DEVCON
 
Learn How to Get Started with iOS App Development.pptx
Learn How to Get Started with iOS App Development.pptxLearn How to Get Started with iOS App Development.pptx
Learn How to Get Started with iOS App Development.pptx75waytechnologies
 
Ios operating system
Ios operating systemIos operating system
Ios operating systemTIB Academy
 

Similar to iOS secure boot (20)

iOS development made easy
iOS development made easyiOS development made easy
iOS development made easy
 
Saravanan iOS vs Android
Saravanan iOS vs AndroidSaravanan iOS vs Android
Saravanan iOS vs Android
 
Saravanan iOS vs Android
Saravanan iOS vs AndroidSaravanan iOS vs Android
Saravanan iOS vs Android
 
iOS Application Development Step by Step to develop an iOS App.pdf
iOS Application Development Step by Step to develop an iOS App.pdfiOS Application Development Step by Step to develop an iOS App.pdf
iOS Application Development Step by Step to develop an iOS App.pdf
 
Android & IOS
Android & IOSAndroid & IOS
Android & IOS
 
Apple's ios
Apple's iosApple's ios
Apple's ios
 
iOS Ecosystem @ Fiera del Radioamatore Pordenone
iOS Ecosystem @ Fiera del Radioamatore PordenoneiOS Ecosystem @ Fiera del Radioamatore Pordenone
iOS Ecosystem @ Fiera del Radioamatore Pordenone
 
MSR iOS Tranining
MSR iOS TraniningMSR iOS Tranining
MSR iOS Tranining
 
iOS
iOSiOS
iOS
 
iOS Hacking: Advanced Pentest & Forensic Techniques
iOS Hacking: Advanced Pentest & Forensic TechniquesiOS Hacking: Advanced Pentest & Forensic Techniques
iOS Hacking: Advanced Pentest & Forensic Techniques
 
CONFidence 2015: iOS Hacking: Advanced Pentest & Forensic Techniques - Omer S...
CONFidence 2015: iOS Hacking: Advanced Pentest & Forensic Techniques - Omer S...CONFidence 2015: iOS Hacking: Advanced Pentest & Forensic Techniques - Omer S...
CONFidence 2015: iOS Hacking: Advanced Pentest & Forensic Techniques - Omer S...
 
Presentation about Bios
Presentation about BiosPresentation about Bios
Presentation about Bios
 
This Is Of SAM
This Is Of SAMThis Is Of SAM
This Is Of SAM
 
Mobile operating system
Mobile operating systemMobile operating system
Mobile operating system
 
Enterprise ipad Development with notes
Enterprise ipad Development with notesEnterprise ipad Development with notes
Enterprise ipad Development with notes
 
iOSDevUK Conference- DevOps for iOS Apps
iOSDevUK Conference- DevOps for iOS AppsiOSDevUK Conference- DevOps for iOS Apps
iOSDevUK Conference- DevOps for iOS Apps
 
Ramon Pastor of Rogomi inc on Trends in iOS Development at DevCon Summit 2013...
Ramon Pastor of Rogomi inc on Trends in iOS Development at DevCon Summit 2013...Ramon Pastor of Rogomi inc on Trends in iOS Development at DevCon Summit 2013...
Ramon Pastor of Rogomi inc on Trends in iOS Development at DevCon Summit 2013...
 
Learn How to Get Started with iOS App Development.pptx
Learn How to Get Started with iOS App Development.pptxLearn How to Get Started with iOS App Development.pptx
Learn How to Get Started with iOS App Development.pptx
 
Android vs ios
Android vs iosAndroid vs ios
Android vs ios
 
Ios operating system
Ios operating systemIos operating system
Ios operating system
 

Recently uploaded

What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 

Recently uploaded (20)

What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 

iOS secure boot

  • 1. The iOS Secure Boot You Maybe Secure , If You Have An IPhone. Ashish Jha (Security Analyst) 6/18/2017 1
  • 2. Socially Connect With Me: Facebook: https://www.facebook.com/ashish.v.jha Directly Mail me : ashishjha120@gmail.com Connect on LinkedIn: https://www.linkedin.com/in/ashish-j-4260969a “When One Teaches Two Learn” - Robert Heinlein 6/18/2017 2
  • 3. What This Presentation Is About? This Presentation is made with a view, To make the readers have a grasp of the “IOS” Operating Systems secure booting process how it works, why we really say iPhones are “secure” , Well as far as security is concerned nothing is much secure but the Apple Team has worked immensely on their platform to provide security to their potential customers, That maybe the reason of their success. This is for all those who are just kick starting in the dazzling world of mobile penetration testing and hacking into mobile devices. First it’ll be explaining all about IOS then we’ll dive into the pool of the secure booting process of the OS. I’ve made my efforts to make you get some valuable piece of content here, And you may enjoy it. Thank you! 6/18/2017 3
  • 4. What The Heck is iOS? IOS is short for “IPhone os”, the most widely used mobile operating system used across the globe , it is the os created by Apple Inc. It is not only used in mobile phones but also in the apple’s iPod touch & IPad. The current version of the os is iOS 10. which was released on September 13, 2016. The iOS mainly runs on ARM architectural hardware. Up till the release of the iOS 7 , all the previous releases use to run on the 32-bits ARM processors But with the release of iOS 7 , they made the os with the support of 64-bit ARMv8-A processors. More Knowledge: What is the (Advanced RISC Machine)ARM ? - ARM makes 32-bit and 64-bit RISC multi-core processors. - RISC processors are designed to perform a smaller number of types of computer instructions so that they can operate at a higher speed, performing more millions of instructions per second (MIPS) 6/18/2017 4
  • 5. Some Features of The iOS? The iOS is loaded with tons of features which makes it’s users life really easy and sophisticated as well. Some of the features of the iOS are: Multitasking: It is really needy as well as important to make something which is multitasking, meaning it can make up to 5-7 tasks or more at same time. The apple makes this possible by make support of some awesome background APIS(applications programming interface). Some are : 1. Background audio 2. Task completions 3. Fast app switching. 4. Background location. 5. Background updates. Siri: You may not have found a great person who just listens to you and give you all what you want, Well apple has done that for you Siri is a personal assistant and navigator which is an application, It takes users voice commands and interprets. 6/18/2017 5
  • 6. iOS Security Model The iOS security model is something which is worth learning. This is the only reason of iPhones being so secure. The Security Model Today we are only going to discuss the secure Boot chani. Security Model Secure Boot Chain Code Signing Process-level Sandboxing Data-at-rest Encryption Generic Native Language exploit Mitigations: 1. Address Space Layout Randomization 2. Non-executable Memory 3. Stack-smashing Protection 6/18/2017 6
  • 7. Secure Boot Chain “Secure Boot Chain” – is used to describe the process by which firmware is initialized and loaded on the iOS devices at boot time. We can consider it as the first layer of security of the platform. It is considered as the most sophisticated and important step to check whether any file or component is being modified or not. The secure boot chain goes like this: 1. When an iOS device is turned on , The processor executes the boot ROM which is the read only code that is built in the processor at the time of manufacturing. 2. The boot ROM contains the public key for the Apple’s Root CA, Which is used to verify the integrity of the further steps of the boot chain That is the Low-level Bootloader(LLB). 3. The LLB Performs many setup tasks including locating the iBoot image flash memory. 4. LLB maintains the secure boot chain by verifying the signature of the iBoot images and if the signature doesn’t matches the iBoot boots into recovery mode. 5. If the signature matched then , The iBoot which is the second stage bootloader is then responsible for verifying and loading the kernel, which then loads the UI for the users. 6/18/2017 7
  • 8. Secure Boot Chain Boot ROM LLB iBoot iOS Kernel The Secure Boot Chain 6/18/2017 8
  • 9. No More Technical Explanation Yes I know it is a bit hard to get around with the secure boot process, Please don’t worry it is the same for all the beginners. Now let me make it easy for you to understand with a basic example. Say for an instance you booked a hotel table yesterday night for having a lunch today with your Friend, You booked it and got a ticket for it (Now the ticket is the LLB). You reached the hotel and the manager askes you for you ticket to verify the booking and he verifies(Now the manger is Root CA), Now it has a number on your ticket which is your table number(Now the table number on your ticket is the signature and the table is the iBoot), You search and find the table that has the number same as the table number on the ticket , Done you go, sit and order your tasty food, the same way as the iBoot verifies the kernel and loads the iOS UI It was just an example to make it clear, the concept in your mind , You can understand it as you, By making an example. 6/18/2017 9
  • 10. Thank You Geeks For Having A look. Some of My Slides: Learn Error Based SQL-Injection. https://www.slideshare.net/pavj/error-based-sql-injection-76382267 ASHISH JHA 6/18/2017 10