SlideShare a Scribd company logo
Pentesting iPhone & iPad Apps
    #Days 2011 – October 28
                                1
Who are we?



• Annika Meyer
   President, co-founder of ADVTOOLS
• Sebastien Andrivet
   Director, co-founder of ADVTOOLS




                                        2
ADVTOOLS

• Swiss company founded in 2002 in
  Geneva
• Specialized in Information Security
  & Problems Diagnosis
   Pentesting
   Security Audits
   Forensics
   Training


                                        3
Agenda

• Overviews
• Previous researches
• iPhone/iPad application pentest
   Our methodology
• Live demonstrations
• Q&A




                                    4
iOS Application Types

• Web Applications
   HTML + CSS + Javascript
   Run inside Safari
• Native Applications:
   Written in Objective-C (+ C/C++)
   Compiled into CPU code: ARM for actual
    devices, x86 for iOS Simulator
• MonoTouch, Adobe Flash, …
   Written in high-level language
   Compiled into CPU code
                                             5
iOS Applications

• Distributed as “.ipa” files
   in fact simply zip files
• Deployed as “.app” directories
   like on Mac OS X
• Executable code is:
   encrypted with FairPlay DRM (AES)
   signed with Apple’s signature
   decryption with GDB or Crackulous


                                        6
Objective-C

• Objective-C = C + Smalltalk
• Object oriented language
• Created in early 1980s by Stepstone
• Objective-C 2.0 released with Leopard
  (Mac OS X 10.5)
• Can be mixed with C and C++




                                          7
Reverse Engineering

• Not so obvious at first:
    ARM instruction set
    Objective-C & objc_msgSend
    Generated code sometimes strange
    Few (working) scripts and tools
• Finally not so difficult
• Your best friend:
    Hex-Rays IDA Pro (Win, Mac, Linux)


                                          8
Data storage

• plist files (Property lists)
    Used and abused
    Binary (depreciated) or XML
• Sqlite 3
    From time to time
• Keychain
• Binary data files (aka unknown)



                                    9
iTunes & Backups

• Every time you connect your device to
  your computer, a backup is made
• Contains almost all data
• By default, not encrypted.
• To mitigate security problems:




                                          10
Previous researches

•   In general, out of date
•   Often inaccurate
•   But contain interesting information
•   We will give here only some examples




                                           11
Foundstone (McAfee / Intel)




http://www.mcafee.com/us/resources/white-papers/foundstone/wp-pen-
testing-iphone-ipad-apps.pdf                                         12
Nicolas Seriot




http://seriot.ch/resources/talks_papers/iPhonePrivacy.pdf   13
TippingPoint (now HP)




http://dvlabs.tippingpoint.com/blog/2009/03/06/reverse-engineering-iphone-14
appstore-binaries
ARTeam




http://www.accessroot.com/arteam/site/download.php?view.222   15
http://www.accessroot.com/arteam/site/download.php?view.308
Pentesting iOS Applications

•   Step 1: Preparing a device
•   Step 2: Preparing a workstation
•   Step 3: Preparing a network
•   Step 4: Pentesting
•   Step 5: Report




                                      16
Step 1: Preparing a device

• Dedicated iPhone or iPad
• Jailbreaking
    Easier if you jailbreak
    Forbidden by Apple if you are a developer
    Dangerous: jailbreaking is disabling most of the
     security features of iOS
• Install tools



                                                    17
Tools

•   APT 0.7 Strict      •   network-cmds
•   adv-cmds            •   nmap
•   Darwin CC Tools     •   OpenSSH
•   GNU Debugger        •   tcpdump
•   inetutils           •   top
•   lsof                •   wget
•   MobileTerminal
•   netcat

                                           18
iOS Default Passwords

• By default, there are two users:
   root
   mobile
• Passwords = alpine
• Be sure to change them:
   passwd
   passwd mobile




                                     19
Step 2 : Workstation

• Windows:
   OK
• Mac OS X (Lion or Snow Leopard)
   Better
• Linux, FreeBSD, …
   Good luck!
   Possible but you will need a Windows to run
    some tools (virtual machine…)


                                                  20
Some Tools
• Windows:
   SecureCRT or Putty, WinSCP
   plist Editor for Windows
• Mac OS X:
   ssh, SecureCRT, Cyberduck
   XCode
• Windows / Mac:
   SQLite Database Browser
   Apple iPhone Configuration Utility
   Wireshark
   Burp, Webscarab …
   IDA Pro (+ ARM decompiler)

                                         21
Our Tools

• ADVsock2pipe
   Remote network captures (Windows)
• ADVinterceptor 2.0
   Communications interception
   DNS & Web Servers
• Available on GitHub under GPLv3
   https://github.com/ADVTOOLS




                                        22
Step 3: Network

Wifi                     Internet


        Firewall



                   LAN




                                    23
Step 4: Pentesting

• Step A: Install app. from iTunes
• Step B: Reconnaissance (passive)
   B.1: Network capture
   B.2: Interception
   B.3: Artifacts
   B.4: Decrypt + Reverse engineering
• Step C: Attack (active)
   C.1: Interception + tampering


                                         24
B.1: Network Capture




tcpdump
    +
           tcp
  netcat
                                Windows
                 ADVsock2pipe
                                  pipe

                                          25
B.2: Interception
  Proxy method




        Proxy


                Burp Suite Pro
                 WebScarab
                      …          26
B.2: Interception
  ADVinterceptor




      DNS
      HTTP
      HTTPS   ADVinterceptor 2
                (DNS Server,
      etc.     Web Server,…)
                                 27
Inject SSL Certificates

• Root from Burp or ADVinterceptor
• Use Apple iPhone Configuration




                                     28
Demos


                3G+Wifi              Internet
                             2G/3G
      Wifi



             Wifi


                                  SSH Client
VNC Client           Shell       (SecureCRT)



                                           29
      Windows 7 on Mac Book
Q&A




      30
Thank you

To contact us:
annika@advtools.com
sebastien@advtools.com

Twitter:
@AndrivetSeb
@ADVTOOLS


www.advtools.com
                         31

More Related Content

More from Area41

Rob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesRob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesArea41
 
Halvar Flake: Why Johnny can’t tell if he is compromised
Halvar Flake: Why Johnny can’t tell if he is compromisedHalvar Flake: Why Johnny can’t tell if he is compromised
Halvar Flake: Why Johnny can’t tell if he is compromisedArea41
 
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...Area41
 
hashdays 2011: Mikko Hypponen - Keynote
hashdays 2011: Mikko Hypponen - Keynotehashdays 2011: Mikko Hypponen - Keynote
hashdays 2011: Mikko Hypponen - KeynoteArea41
 
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...Area41
 
hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...
hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...
hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...Area41
 
hashdays 2011: Christian Bockermann - Protecting Databases with Trees
hashdays 2011: Christian Bockermann - Protecting Databases with Treeshashdays 2011: Christian Bockermann - Protecting Databases with Trees
hashdays 2011: Christian Bockermann - Protecting Databases with TreesArea41
 
hashdays 2011: Ange Albertini - Such a weird processor - messing with x86 opc...
hashdays 2011: Ange Albertini - Such a weird processor - messing with x86 opc...hashdays 2011: Ange Albertini - Such a weird processor - messing with x86 opc...
hashdays 2011: Ange Albertini - Such a weird processor - messing with x86 opc...Area41
 
hashdays 2011: Jean-Philippe Aumasson - Cryptanalysis vs. Reality
hashdays 2011: Jean-Philippe Aumasson - Cryptanalysis vs. Realityhashdays 2011: Jean-Philippe Aumasson - Cryptanalysis vs. Reality
hashdays 2011: Jean-Philippe Aumasson - Cryptanalysis vs. RealityArea41
 

More from Area41 (9)

Rob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesRob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost Stories
 
Halvar Flake: Why Johnny can’t tell if he is compromised
Halvar Flake: Why Johnny can’t tell if he is compromisedHalvar Flake: Why Johnny can’t tell if he is compromised
Halvar Flake: Why Johnny can’t tell if he is compromised
 
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
hashdays 2011: Tobias Ospelt - Reversing Android Apps - Hacking and cracking ...
 
hashdays 2011: Mikko Hypponen - Keynote
hashdays 2011: Mikko Hypponen - Keynotehashdays 2011: Mikko Hypponen - Keynote
hashdays 2011: Mikko Hypponen - Keynote
 
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
 
hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...
hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...
hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...
 
hashdays 2011: Christian Bockermann - Protecting Databases with Trees
hashdays 2011: Christian Bockermann - Protecting Databases with Treeshashdays 2011: Christian Bockermann - Protecting Databases with Trees
hashdays 2011: Christian Bockermann - Protecting Databases with Trees
 
hashdays 2011: Ange Albertini - Such a weird processor - messing with x86 opc...
hashdays 2011: Ange Albertini - Such a weird processor - messing with x86 opc...hashdays 2011: Ange Albertini - Such a weird processor - messing with x86 opc...
hashdays 2011: Ange Albertini - Such a weird processor - messing with x86 opc...
 
hashdays 2011: Jean-Philippe Aumasson - Cryptanalysis vs. Reality
hashdays 2011: Jean-Philippe Aumasson - Cryptanalysis vs. Realityhashdays 2011: Jean-Philippe Aumasson - Cryptanalysis vs. Reality
hashdays 2011: Jean-Philippe Aumasson - Cryptanalysis vs. Reality
 

Recently uploaded

Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Transforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UXTransforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UXUXDXConf
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 

Recently uploaded (20)

Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Transforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UXTransforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UX
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 

hashdays 2011: Annika Meyer & Sebastien Andrivet - Pentesting iPhone & iPad Applications

  • 1. Pentesting iPhone & iPad Apps #Days 2011 – October 28 1
  • 2. Who are we? • Annika Meyer  President, co-founder of ADVTOOLS • Sebastien Andrivet  Director, co-founder of ADVTOOLS 2
  • 3. ADVTOOLS • Swiss company founded in 2002 in Geneva • Specialized in Information Security & Problems Diagnosis  Pentesting  Security Audits  Forensics  Training 3
  • 4. Agenda • Overviews • Previous researches • iPhone/iPad application pentest  Our methodology • Live demonstrations • Q&A 4
  • 5. iOS Application Types • Web Applications  HTML + CSS + Javascript  Run inside Safari • Native Applications:  Written in Objective-C (+ C/C++)  Compiled into CPU code: ARM for actual devices, x86 for iOS Simulator • MonoTouch, Adobe Flash, …  Written in high-level language  Compiled into CPU code 5
  • 6. iOS Applications • Distributed as “.ipa” files  in fact simply zip files • Deployed as “.app” directories  like on Mac OS X • Executable code is:  encrypted with FairPlay DRM (AES)  signed with Apple’s signature  decryption with GDB or Crackulous 6
  • 7. Objective-C • Objective-C = C + Smalltalk • Object oriented language • Created in early 1980s by Stepstone • Objective-C 2.0 released with Leopard (Mac OS X 10.5) • Can be mixed with C and C++ 7
  • 8. Reverse Engineering • Not so obvious at first:  ARM instruction set  Objective-C & objc_msgSend  Generated code sometimes strange  Few (working) scripts and tools • Finally not so difficult • Your best friend:  Hex-Rays IDA Pro (Win, Mac, Linux) 8
  • 9. Data storage • plist files (Property lists)  Used and abused  Binary (depreciated) or XML • Sqlite 3  From time to time • Keychain • Binary data files (aka unknown) 9
  • 10. iTunes & Backups • Every time you connect your device to your computer, a backup is made • Contains almost all data • By default, not encrypted. • To mitigate security problems: 10
  • 11. Previous researches • In general, out of date • Often inaccurate • But contain interesting information • We will give here only some examples 11
  • 12. Foundstone (McAfee / Intel) http://www.mcafee.com/us/resources/white-papers/foundstone/wp-pen- testing-iphone-ipad-apps.pdf 12
  • 15. ARTeam http://www.accessroot.com/arteam/site/download.php?view.222 15 http://www.accessroot.com/arteam/site/download.php?view.308
  • 16. Pentesting iOS Applications • Step 1: Preparing a device • Step 2: Preparing a workstation • Step 3: Preparing a network • Step 4: Pentesting • Step 5: Report 16
  • 17. Step 1: Preparing a device • Dedicated iPhone or iPad • Jailbreaking  Easier if you jailbreak  Forbidden by Apple if you are a developer  Dangerous: jailbreaking is disabling most of the security features of iOS • Install tools 17
  • 18. Tools • APT 0.7 Strict • network-cmds • adv-cmds • nmap • Darwin CC Tools • OpenSSH • GNU Debugger • tcpdump • inetutils • top • lsof • wget • MobileTerminal • netcat 18
  • 19. iOS Default Passwords • By default, there are two users:  root  mobile • Passwords = alpine • Be sure to change them:  passwd  passwd mobile 19
  • 20. Step 2 : Workstation • Windows:  OK • Mac OS X (Lion or Snow Leopard)  Better • Linux, FreeBSD, …  Good luck!  Possible but you will need a Windows to run some tools (virtual machine…) 20
  • 21. Some Tools • Windows:  SecureCRT or Putty, WinSCP  plist Editor for Windows • Mac OS X:  ssh, SecureCRT, Cyberduck  XCode • Windows / Mac:  SQLite Database Browser  Apple iPhone Configuration Utility  Wireshark  Burp, Webscarab …  IDA Pro (+ ARM decompiler) 21
  • 22. Our Tools • ADVsock2pipe  Remote network captures (Windows) • ADVinterceptor 2.0  Communications interception  DNS & Web Servers • Available on GitHub under GPLv3  https://github.com/ADVTOOLS 22
  • 23. Step 3: Network Wifi Internet Firewall LAN 23
  • 24. Step 4: Pentesting • Step A: Install app. from iTunes • Step B: Reconnaissance (passive)  B.1: Network capture  B.2: Interception  B.3: Artifacts  B.4: Decrypt + Reverse engineering • Step C: Attack (active)  C.1: Interception + tampering 24
  • 25. B.1: Network Capture tcpdump + tcp netcat Windows ADVsock2pipe pipe 25
  • 26. B.2: Interception Proxy method Proxy Burp Suite Pro WebScarab … 26
  • 27. B.2: Interception ADVinterceptor DNS HTTP HTTPS ADVinterceptor 2 (DNS Server, etc. Web Server,…) 27
  • 28. Inject SSL Certificates • Root from Burp or ADVinterceptor • Use Apple iPhone Configuration 28
  • 29. Demos 3G+Wifi Internet 2G/3G Wifi Wifi SSH Client VNC Client Shell (SecureCRT) 29 Windows 7 on Mac Book
  • 30. Q&A 30
  • 31. Thank you To contact us: annika@advtools.com sebastien@advtools.com Twitter: @AndrivetSeb @ADVTOOLS www.advtools.com 31