31
iOS MITM Attack Technology and effects sieg.in 1

Troshichev i os mitm attack

Embed Size (px)

Citation preview

Page 1: Troshichev   i os mitm attack

iOS MITM Attack Technology and effects

sieg.in 1

Page 2: Troshichev   i os mitm attack

sieg.in 2

Page 3: Troshichev   i os mitm attack

Boot validation

• CA – Apple Certificate Authority

• SIGN – Signature

sieg.in 3

Page 4: Troshichev   i os mitm attack

Files Protection

sieg.in 4

Page 5: Troshichev   i os mitm attack

Classic provisioning

sieg.in 5

Page 6: Troshichev   i os mitm attack

Actual provisioning

sieg.in 6

Page 7: Troshichev   i os mitm attack

Because “Apple Root CA” fingerprint hardcoded into iOS and have to be 61:1E:5B:66:2C:59:3A:08:FF:58:D1:4A:E2:24:52:D1:98:DF:6C:60

Why we can’t create fake signature?

sieg.in 7

Page 8: Troshichev   i os mitm attack

SSL

sieg.in 8

Page 9: Troshichev   i os mitm attack

Certificate Authority Storage

Few from 186 are quite interesting :

– C=US, O=U.S. Government, OU=DoD, OU=PKI, CN=DoD CLASS 3 Root CA

– C=JP, O=Japanese Government, OU=ApplicationCA

– C=CN, O=China Internet Network Information Center, CN=China Internet Network Information Center EV Certificates Root

sieg.in 9

Page 10: Troshichev   i os mitm attack

Certificate authentication

sieg.in 10

Page 11: Troshichev   i os mitm attack

I want my CA in your iOS

sieg.in 11

Page 12: Troshichev   i os mitm attack

Ways to install CA in iOS

o Safari

o Email attachment

o MDM

With configuration profile

Can be installed with Safari

sieg.in 12

Page 13: Troshichev   i os mitm attack

Attack

sieg.in 13

Page 14: Troshichev   i os mitm attack

Mobileconfig contains

WiFi settings (pass, SSID) for “Gate”

CA

Proxy Settings, if we want victim’s traffic even it has left attack range. (Only for iOS6)

iCloud backup (enable it, if not)

sieg.in 14

Page 15: Troshichev   i os mitm attack

Mobileconfig installation

sieg.in 15

Page 16: Troshichev   i os mitm attack

Looks bad =(

sieg.in 16

Page 17: Troshichev   i os mitm attack

Let’s take a look on default CA list...

sieg.in 17

Page 18: Troshichev   i os mitm attack

COMODO trial certificate

• You only need valid [email protected] mail for confirmation

• Can be used for signing

sieg.in 18

Page 19: Troshichev   i os mitm attack

How to sign

sieg.in 19

Page 20: Troshichev   i os mitm attack

Looks much better

sieg.in 20

Page 21: Troshichev   i os mitm attack

SSL Defeated But we want more

sieg.in 21

Page 22: Troshichev   i os mitm attack

How to get files from device

sieg.in 22

Page 23: Troshichev   i os mitm attack

Elcomsoft Phone Password Breaker

sieg.in 23

Page 24: Troshichev   i os mitm attack

Once again

sieg.in 24

Page 25: Troshichev   i os mitm attack

What’s in backup?

• SMS • Private photo • Emails • Application data • And more …

sieg.in 25

Page 26: Troshichev   i os mitm attack

Files done But we want more

sieg.in 26

Page 27: Troshichev   i os mitm attack

Apple Push Notification Service

sieg.in 27

Page 28: Troshichev   i os mitm attack

Fake! Fake! Fake!

sieg.in 28

Page 29: Troshichev   i os mitm attack

Wipe Tragedy (act 1/1)

sieg.in 29

Page 30: Troshichev   i os mitm attack

Summary

User only have to tap ‘Install’ two times to make us able to :

– Sniff all his SSL traffic (cookies,passwords, etc)

– Steal his backup (call log, sms log, photos and application data)

– Send him funny push messages or just wipe device

sieg.in 30

Page 31: Troshichev   i os mitm attack

sieg.in 31

sieg.in [email protected]

@siegin