31
iOS MITM Attack Technology and effects sieg.in 1

iOS MITM Attack

  • Upload
    siegin

  • View
    3.499

  • Download
    3

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: iOS MITM Attack

iOS MITM Attack Technology and effects

sieg.in 1

Page 2: iOS MITM Attack

sieg.in 2

Page 3: iOS MITM Attack

Boot validation

• CA – Apple Certificate Authority

• SIGN – Signature

sieg.in 3

Page 4: iOS MITM Attack

Files Protection

sieg.in 4

Page 5: iOS MITM Attack

Classic provisioning

sieg.in 5

Page 6: iOS MITM Attack

Actual provisioning

sieg.in 6

Page 7: iOS MITM Attack

Because “Apple Root CA” fingerprint hardcoded into iOS and have to be 61:1E:5B:66:2C:59:3A:08:FF:58:D1:4A:E2:24:52:D1:98:DF:6C:60

Why we can’t create fake signature?

sieg.in 7

Page 8: iOS MITM Attack

SSL

sieg.in 8

Page 9: iOS MITM Attack

Certificate Authority Storage

Few from 186 are quite interesting :

– C=US, O=U.S. Government, OU=DoD, OU=PKI, CN=DoD CLASS 3 Root CA

– C=JP, O=Japanese Government, OU=ApplicationCA

– C=CN, O=China Internet Network Information Center, CN=China Internet Network Information Center EV Certificates Root

sieg.in 9

Page 10: iOS MITM Attack

Certificate authentication

sieg.in 10

Page 11: iOS MITM Attack

I want my CA in your iOS

sieg.in 11

Page 12: iOS MITM Attack

Ways to install CA in iOS

o Safari

o Email attachment

o MDM

With configuration profile

Can be installed with Safari

sieg.in 12

Page 13: iOS MITM Attack

Attack

sieg.in 13

Page 14: iOS MITM Attack

Mobileconfig contains

WiFi settings (pass, SSID) for “Gate”

CA

Proxy Settings, if we want victim’s traffic even it has left attack range. (Only for iOS6)

iCloud backup (enable it, if not)

sieg.in 14

Page 15: iOS MITM Attack

Mobileconfig installation

sieg.in 15

Page 16: iOS MITM Attack

Looks bad =(

sieg.in 16

Page 17: iOS MITM Attack

Let’s take a look on default CA list...

sieg.in 17

Page 18: iOS MITM Attack

COMODO trial certificate

• You only need valid [email protected] mail for confirmation

• Can be used for signing

sieg.in 18

Page 19: iOS MITM Attack

How to sign

sieg.in 19

Page 20: iOS MITM Attack

Looks much better

sieg.in 20

Page 21: iOS MITM Attack

SSL Defeated But we want more

sieg.in 21

Page 22: iOS MITM Attack

How to get files from device

sieg.in 22

Page 23: iOS MITM Attack

Elcomsoft Phone Password Breaker

sieg.in 23

Page 24: iOS MITM Attack

Once again

sieg.in 24

Page 25: iOS MITM Attack

What’s in backup?

• SMS • Private photo • Emails • Application data • And more …

sieg.in 25

Page 26: iOS MITM Attack

Files done But we want more

sieg.in 26

Page 27: iOS MITM Attack

Apple Push Notification Service

sieg.in 27

Page 28: iOS MITM Attack

Fake! Fake! Fake!

sieg.in 28

Page 29: iOS MITM Attack

Wipe Tragedy (act 1/1)

sieg.in 29

Page 30: iOS MITM Attack

Summary

User only have to tap ‘Install’ two times to make us able to :

– Sniff all his SSL traffic (cookies,passwords, etc)

– Steal his backup (call log, sms log, photos and application data)

– Send him funny push messages or just wipe device

sieg.in 30

Page 31: iOS MITM Attack

sieg.in 31

sieg.in [email protected]

@siegin

Alexey Troshichev