HackerHalted Yury Chemerkin 2014
HackerHalted Yury Chemerkin 2014
HackerHalted Yury Chemerkin 2014
• Wild Security Concepts :: < Data Protection Concepts, Best Practices >
User/Credentials
Search request info by name/location/etc.
Like, Comments + friend username per
check-ins
Badges + description and who unlocked it
• Mail.Ru Money
• Captured in traffic
– Account & Credentials
• Username = login, password, token, payment password, account id
• Transfer details, linked credit card number (first 6 & last 4 digits)
• Stored locally
• linked credit card number (first 6 & last 4 digits)
Outlines: Fails
App Type/Protection In-Rest In-Memory In-Transit
Rarely Encrypted /
Built-in apps Plain-Text Plain-Text
SSL/HTTPS
/data/data/ru.lynx.aero/shared_prefs/activities.main.MainActivity.xml
<?xml version='1.0' encoding='utf-8' standalone='yes' ?>
<map>
<string name="phone">9851719122</string>
<long name="cardExpiryDate" value="1472723015507" />
<long name="scheduleChangesDate" value="1411638096257" />
<long name="scheduleLastUpdateDate" value="1411638096692" />
<string name="password">XXXXXXX</string>
<string name="cardHolder">Yury Chemerkin</string>
<string name="email">[email protected]</string>
<string name="userId">7-7011656</string>
<string name="layout">phone</string>
<string name="login">xxxxxxxxxxxxxx</string>
<string name="language">ru</string>
<string
name="deviceId">bEBDPM1dCdDAPA9……K7iF9_lnAFKLgEE7VHdDCXbyww</string>
<string name="cardNumber">1234567890123456</string>
</map>
53
Outlines: iOS
• Credentials stored/ transferred in plaintext locally.
• Data stored in a keychain without additional protection or
encryption
• Data usually stored or transferred structured file type that
simplify an analysis
• Signature-based encryption that helps to quickly decrypt
data
• Avoiding protection mechanism in iOS that leads to pure
protection eventually
• Data stored in SQLite databases usually not encrypted
• Application data could be access without jailbreak
• Keys may be hardcoded
Outlines: Snapshots in iOS
55
Outlines: WinRT
• Credentials stored or transferred in plaintext locally.
• Data usually stored or transferred structured file type
that simplify an analysis
• Signature-based encryption helps quickly decrypt data
(depends on dynamically linked libraries)
• Data stored in SQLite databases usually not encrypted
• Keys may be hardcoded or put in data folder
• Applications could be analyzed on Windows 8 (full
edition rather than WinRT that’s only mobile OS
edition) via known methods like a desktop applications
Outlines: Network / Sniffing the traffic
57
EMM FEATURES : Vendors
[ EMM FRAMEWORK ]
EMM (Enterprise Mobile Management) 3rd Party Solutions to EMM
PACKAGED/WRAPPED APPLICATIONS
QUANTITY OF APPLICATION CHALLENGE ( OBVIOUSLY > 100 )
COOPERATION WITH APPLICATION VENDOR
SEPARATION OF PERSONAL, WORK, AND SUSPICIOUS APP
SERIOUSLY DIFFERENCE ON APP INTERFACES PER EACH OS WITH THE SAME APP
VPN
ENCRYPTION
ACCESS RESTRICTION (GEO, CREDENTIALS)
EMM FAILS :: MIM
Website offers no details on how those extra levels of security will be implemented, but..
How was the idea for the Blackphone Who should be buying a Blackphone?
conjured up? There are clearly industries that are
Large market of folks who didn't want already predisposed to seek privacy,
to build their own car, but they such as stockbrokers, attorneys,
wanted a good car senior executives
Why should users want to have a Why is this phone safer than what's
Blackphone? Security Center currently out there?
At $629 is the total package. It's safer because it's more usable
Lot of security magic to stop leaks out Every bit of information the phone
Who is buying the Blackphone? sends out is encrypted whether it's a
45 percent of orders have come from call or a text. No one can offers it now
Europe and 38 percent from North BYOD/Enterprise?
America Absolutely, even MDM tools
Blackphone is gathering as little How secure is the Blackphone?
information as possible on who is Anybody who claims that anything is
buying its product hackproof is clearly selling snake oil
Black Phone - Software
The Blackphone is an announced smartphone developed by SGP Technologies, that will
provide encryption for phone calls, emails, texts, and internet browsing.
Silent Circle Apps 3rd-party Apps
Silent Phone Disconnect Secure Wireless
Silent Text SpiderOak Blackphone Edition
Silent Contacts Kismet Smart Wi-Fi Manager
Encrypted Contacts, splitted for personal & Alike any other app on AppStore or
business uses GooglePlay,WorkBalance MDM Solution
VoIP for encrypted Calls VoIP is everywhere for the less price
Smart WiFi Manager to prevent attacks Gather Geo, Network Data, AutoLearn
BlackPhone gathers little info on who is buying it Name, Address, Payment method, Personal or
Enterprise
Black Phone: Pros & Cons
Storages SpiderOak Is that only one?
Provider Encrypted storage Personal Encryption2
Amazon S3 / AWS + +
Box (PreBuild on BlackBerry) + +
CrashPlan + +
ElephantDrive + +
Handy Backup + +
IASO Backup + +
Jungle Disk + +
KeepVault + +
MediaFire + +
MEGA + +
Norton Zone + +
OwnDrive + +
SpiderOak + +
Sync + +
TeamDrive + +
Wuala + +
Black Phone: Pros & Cons
PrivatOS Enhancement Android Default BlackBerry iOS
Web Search Anonymous Trackable Both & Flexible Both
Many, with privacy disabled
Bundled Apps Few, and all privacy-enabled by default Least privilege access control On-Demand Access
Frequent secure updates Supplied infrequently after Frequent secure updates Frequent secure updates
Updates from Blackphone directly carrier blessing from BlackBerry directly from Apple directly
Requires use of centralized
Remote Wipe & Anti Theft Anonymous (??) cloud account Cloud account Cloud account
Delivering secure & privacy
Delivering privacy as a Personal data mining for as a default valued feature
Business Model premium, valued feature tracking and marketing last 20+ years
Music, App, Games :)
Weak MDM
Management MDM Features/Samsung enhanced MDM, MAM, MEM, MIM,… MDM, MAM, MEM, MIM,…
Y.O.B.A. hacking