SlideShare a Scribd company logo
Transparent Smartphone Spying

        Georgia Weidman
Agenda
• Smartphone Overview

• Evil Applications

• Evil Jailbreaks

• Baseband Spying

• Mitigation Strategies
What is a Smartphone?
Data Stored and Transmitted
• Personal info

• Work info

• Location info

• Account info
Privacy of Transmitted Data
• Mobile communication standards

• Encoding vs. Encryption

• Attacks against privacy
Privacy Matters: Text Messages
• “Hi meet me for lunch”

• “Meet me for lunch while my wife is out”

• “Here are your bank account credentials”
Privacy Required Examples
• Vendor text messages
  – Vendor advertisements
  – Provider messages


• Mobile banking
  – Balance sheet
  – Electronic bill paying
  – One time passwords
Evil Applications
Application Stores
• iPhone
  –   Expensive
  –   Identity Verified
  –   Closed
  –   Certificate Authority

• Android
  –   Cheap
  –   Open
  –   Anonymous
  –   Self signed
Application Protections: iPhone
• ASLR

• Mandatory code signing

• No dynamic code loading

• Sandboxed
Applications Protections: Android
• Users accept permissions
Our Text Message Example
• Permission to read text message(SMS)
  database

• Specific permission to send text
  message(SMS) messages

• Without user consent, application cannot
  access this information
Is this system working to protect users?

Are users making good decisions about
        application permissions?
Top Android App of all Time
Demo



Demo: Application abusing
       permissions
Abusing the Android Sandbox
• Load exploit code at runtime

• Safe application becomes malicious
  application

• In the wild: DroidDream

• In the lab: Rootstrap
Evil Jailbreak
Jailbreaking
• Get root privileges

• Expand feature set

• Run unapproved (3rd party apps)
Jailbreaking Gone Wild
• Run this code

• It jailbreaks your phone

• What else does it do?
So I’ve exploited a phone, what now?
Baseband Spying
• Read all data sent/receive by the phone

• Intercept data before it reaches the
  user/before it is sent
How an GSM is sent and received




                                  22
How an GSM is sent and received




            © Georgia Weidman 2011   23
How an GSM is sent and received




            © Georgia Weidman 2011   24
Malicious Proxy
• Intercept data

• Send data

• Alter data

• Botnet functionality
Demo



Demo: Stealing Text Messages
Mitigation Strategies
• User Awareness

• Encryption

• Updating

• Code signing
Contact

Georgia Weidman, Security Consultant
           Neohapsis, Inc.
   Email: georgia@grmn00bs.com
  georgia.weidman@neohapsis.com
 Website: http://www.neohapsis.com
     http://www.grmn00bs.com
      Twitter: @vincentkadmon
Selected Bibliography

• John Oberheide and Jach Lanier “Team JOCH vs. Android”
  Shmoocon 2011: http://jon.oberheide.org/files/shmoo11-
  teamjoch.pdf

• Charlie Miller and Collin Mulliner “Fuzzing the Phone in
  Your Phone” Blackhat USA 2009:
  http://www.blackhat.com/presentations/bhusa-
  09/MILLER/BHUSA09-Miller-FuzzingPhone-PAPER.pdf

• Dino Dai Zovi “Apple iOS Security Evalution” Blackhat USA
  2011: https://media.blackhat.com/bh-us-
  11/DaiZovi/BH_US_11_DaiZovi_iOS_Security_WP.pdf

More Related Content

Viewers also liked

transparent electronics ppt
transparent electronics ppttransparent electronics ppt
transparent electronics ppt
Arya Viswanath
 
transparent electronics
transparent electronicstransparent electronics
transparent electronics
Shiven Vashisht
 
Transparent electronics
Transparent electronicsTransparent electronics
Transparent electronics
Aakash Varma
 
Transparent electronics
Transparent electronicsTransparent electronics
Transparent electronics
Jeffrey Funk
 
Transparent electronics
Transparent electronics Transparent electronics
Transparent electronics
Sai Viswanath
 
Transparent electronics by kirti kansal
Transparent electronics by kirti kansalTransparent electronics by kirti kansal
Transparent electronics by kirti kansalTechnocratz
 
transparent electronics
transparent electronicstransparent electronics
transparent electronics
ekta pandey
 
Electronic pill
Electronic pillElectronic pill
Electronic pill
b4ujos
 
Presentation on mobile phones
Presentation on mobile phonesPresentation on mobile phones
Presentation on mobile phonessirtwinkles
 
iOS 5.0 Concept preview
iOS 5.0 Concept previewiOS 5.0 Concept preview
iOS 5.0 Concept preview
appletips
 
Rolltop
RolltopRolltop
Rolltop
SAjawal Awan
 
Citea eng
Citea engCitea eng
Citea eng
ELAN CITE
 
Products presentation INNOVATION THESSALONIKI
Products presentation INNOVATION THESSALONIKIProducts presentation INNOVATION THESSALONIKI
Products presentation INNOVATION THESSALONIKIACTIONLINE, HIGH FIDELITY
 
Phantom Inventory
Phantom Inventory Phantom Inventory
Phantom Inventory
ThreadSol
 
TSW Analytical: HALO Service - A NEW BETTER WAY IN GEOCHEMICAL EXPLORATION
TSW Analytical: HALO Service - A NEW BETTER WAY IN GEOCHEMICAL EXPLORATIONTSW Analytical: HALO Service - A NEW BETTER WAY IN GEOCHEMICAL EXPLORATION
TSW Analytical: HALO Service - A NEW BETTER WAY IN GEOCHEMICAL EXPLORATION
Cameron Scadding
 
Google Project ara presentation
Google Project ara presentationGoogle Project ara presentation
Google Project ara presentation
Uttam Singh Bhagaur
 
Roll top the future of laptops
Roll top  the future of laptopsRoll top  the future of laptops
Roll top the future of laptopsChaitanya Areti
 

Viewers also liked (20)

transparent electronics ppt
transparent electronics ppttransparent electronics ppt
transparent electronics ppt
 
transparent electronics
transparent electronicstransparent electronics
transparent electronics
 
Transparent electronics
Transparent electronicsTransparent electronics
Transparent electronics
 
Transparent electronics
Transparent electronicsTransparent electronics
Transparent electronics
 
Transparent electronics
Transparent electronics Transparent electronics
Transparent electronics
 
Transparent electronics by kirti kansal
Transparent electronics by kirti kansalTransparent electronics by kirti kansal
Transparent electronics by kirti kansal
 
transparent electronics
transparent electronicstransparent electronics
transparent electronics
 
Electronic pill
Electronic pillElectronic pill
Electronic pill
 
Presentation on mobile phones
Presentation on mobile phonesPresentation on mobile phones
Presentation on mobile phones
 
iOS 5.0 Concept preview
iOS 5.0 Concept previewiOS 5.0 Concept preview
iOS 5.0 Concept preview
 
Rolltop
RolltopRolltop
Rolltop
 
Erica
EricaErica
Erica
 
Citea eng
Citea engCitea eng
Citea eng
 
Products presentation INNOVATION THESSALONIKI
Products presentation INNOVATION THESSALONIKIProducts presentation INNOVATION THESSALONIKI
Products presentation INNOVATION THESSALONIKI
 
Phantom Inventory
Phantom Inventory Phantom Inventory
Phantom Inventory
 
TSW Analytical: HALO Service - A NEW BETTER WAY IN GEOCHEMICAL EXPLORATION
TSW Analytical: HALO Service - A NEW BETTER WAY IN GEOCHEMICAL EXPLORATIONTSW Analytical: HALO Service - A NEW BETTER WAY IN GEOCHEMICAL EXPLORATION
TSW Analytical: HALO Service - A NEW BETTER WAY IN GEOCHEMICAL EXPLORATION
 
Google Project ara presentation
Google Project ara presentationGoogle Project ara presentation
Google Project ara presentation
 
Roll top the future of laptops
Roll top  the future of laptopsRoll top  the future of laptops
Roll top the future of laptops
 
Roll laptop
Roll laptopRoll laptop
Roll laptop
 
Rolltop
RolltopRolltop
Rolltop
 

Similar to Transparent Smartphone Spying

Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
Mitesh Katira
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
Rocket Matter, LLC
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
Mobile Apps Security
Mobile Apps SecurityMobile Apps Security
Mobile Apps Security
Xavier Mertens
 
ANDROID SECURITY
ANDROID SECURITYANDROID SECURITY
ANDROID SECURITY
yogeshraut090
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
Andris Soroka
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Xavier Mertens
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital Worldalxdvs
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
Sina Manavi
 
Seven Simple Steps to Online Security
Seven Simple Steps to Online SecuritySeven Simple Steps to Online Security
Seven Simple Steps to Online Security
Conn Ó Muíneacháin
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacycdunk12
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
Symosis Security (Previously C-Level Security)
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
Geoffrey Vaughan
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
Security Innovation
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maalHarsimran Walia
 

Similar to Transparent Smartphone Spying (20)

Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Mobile Apps Security
Mobile Apps SecurityMobile Apps Security
Mobile Apps Security
 
ANDROID SECURITY
ANDROID SECURITYANDROID SECURITY
ANDROID SECURITY
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Seven Simple Steps to Online Security
Seven Simple Steps to Online SecuritySeven Simple Steps to Online Security
Seven Simple Steps to Online Security
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

Transparent Smartphone Spying

Editor's Notes

  1. ContactsEmails (work emails too)PicturesLocationCredentials to online applicationsMore
  2. Encryption security in transit varies 2G is broken (Blackhat 2009 Karsten Kohl broke session key in minutes with 1TB storage and 2 nice video cards) Example of interception (Chris PagentDefcon 2010 with his rogue access point}
  3. “Hi meet me for lunch” -- privacy not so important“Meet me for lunch while my wife is out” -- privacy more important“Here is your bank account credentials” -- privacy required
  4. iPhoneMust have a developer certificate to even run code on your own device$99/yearIdentity is verifiedAll code is reviewed and signed before upload to the store AndroidAnyone can write an app and upload to the Android market$25 signup fee Anonymous signup possibleNo certificate authority/self signed apps (3rd party store apps run too)
  5. Mandatory code signing/ apps cannot load new code at runtime (specific dispensation for browsers, etc.)ASLR on system binaries and some apps in 4.3 and laterIndividual apps sandboxed with MAC for system permissions etc.
  6. Android apps can request any permissions they want. Up to the user to decide to decide if app is safeFoursquare would need GPS but not SMS
  7. Edit and Read SMS, send SMS, receive SMSModify/delete USB storage contentsPrevent phone from sleeping, write sync settingsGPS dataServices that cost you moneyAct as account authenticator, manage accountsRead and write to your personal information including contact dataPhone calls, read phone state and identityFull network access
  8. Any app can use kernel exploits to gain root privileges Any app can load new code at runtimeCan load new shellcode as it becomes availableDroidDream:Trojaned apps on the Android App Store Used known root methods to gain root privilegesSends phone info: IMEI, IMSI, etc. offsightRootstrap:Zach Lanier and Jon OberheideShmoocon 2011Rootstrap app downloads new exploits as they become availablePackaged with Twilight ad app to encourage downloads
  9. Original Android G1 jailbreak: go to home screen, hit enter twice, type telnetd …Current iPhone and Android Jailbreaks: Go to this website and say yes to running this unknown binary by an unknown personIt roots the phone, what else does it do?