Mobile SSL Failures. Tony Trummer Tushar Dalvi
|
|
|
- Johnathan Armstrong
- 10 years ago
- Views:
Transcription
1 ABSTRACT SSL and TLS are the most widely used protocols for securing data on the Internet between mobile devices and their supporting remote servers. Most people are aware of the encryption these protocols provide, but the authenticity aspect is often overlooked. Our research, focused primarily SSL/TLS usage on the Android operating system and applications, with some additional research on ios and Windows 8 mobile. Mobile SSL Failures Tony Trummer Tushar Dalvi WiFi networks, partly by design, to reduce cellular network traffic usage. We believe this makes them more susceptible to Man-in-the-Middle attacks, compared to most types of common computing platforms. Our research covers common implementation errors related to SSL/TLS certificate validation, lack of encryption and insecurely implemented features such as SSL session caching. OVERVIEW OF OUR RESULTS We believe our research has demonstrated that there are systemic issues, largely opaque, to all but the most technical users. These are with the manner in which SSL/TLS is implemented, certificate validation is performed in applications and to a lesser degree, failure to encrypt sensitive data. While we are not the first to investigate SSL/TLS issues on mobile devices, we demonstrate methods by which implementations, intended to make these protocols more resource efficient, open mobile devices up to the possibility of novel attacks. Keywords SSL, TLS, HTTPS, vulnerabilities, Android, ios, Windows Mobile, mobile application security, certificate validation, SSL session cache INTRODUCTION Our research has uncovered that numerous well-known organizations responsible for publishing many of the most popular mobile applications have failed to properly protect data, transmitted by their applications, from interception and eavesdropping, via man-in-the-middle attacks or passive network sniffing. This data included authentication tokens, passwords, credit card numbers and personally identifiable information (PII). We believe this is mainly due to simple human error, compounded by inadequate quality assurance and security review practices. Further, we believe the roll your own mentality for mobile applications, is a particularly dangerous one, which assumes a level of uniform technical security proficiency, which beyond the current state in most organizations. In a broader sense, we believe this approach also fails to leverage the lessons learned and communal knowledge acquired from decades of browser security vulnerabilities. Commonly used in web browsing, SSL and TLS have served as the standard means for securely transferring data across untrusted networks such as the Internet. They are commonly used for general purpose computing, where one or more of the parties, or IP addresses, is not known prior to the connection and the connections are generally transient. Whereas solely symmetric encryption, is commonly deployed between two or more previously known endpoints where shared secrets can be exchanged prior to the initial connection being made. One of the main drivers for the ubiquitous adoption of SSL/TLS is the fact that it facilitates the ability for two parties, having no established relationship with one another, to rely on presumed indifferent, trusted third-party certificate authorities to validate the identities of one, or both of the communicating parties. Mobile devices are by their nature transient, connecting to many different networks, even within the same day, including automatically connecting to some remembered SSIDs for In a brief, non-exhaustive examination, we discovered many of the most popular applications failed to either validate that certificates were signed by trusted Certificate Authorities and/or that the hostnames on the received certificates matched the host they were attempting to contact, on certificates that were from trusted CAs. Since many organizations are accustomed to the development paradigms related to web applications, in many cases, they appear to mistakenly carry over the same thought processes into their mobile development practices. As pointed out by Moxie Marlinspike [6], there is really no reason for mobile applications to use third-party certificate authorities at all. By forgoing their use, many of the vulnerabilities we discovered would be eliminated altogether. Lastly, we discovered the ability to perform nearly undetectable, albeit limited, MitM attacks against mobile devices leveraging the fact that they implement SSL session caching mechanisms to increase efficiency. This was made possible due to the fact that these mechanisms, by design,
2 only check the certificate validity on the initial connection, but the both the application and operating systems fail to properly invalidate sessions when a certificate has been removed from a device. This presents an opportunity for a would-be attacker. While this vulnerability is not unique to mobile devices, it's exploitation is substantially more likely on a mobile device. OVERVIEW OF SSL HANDSHAKE Disabling trusted CA validation is routinely accomplished, in Android apps, by creating a custom X509TrustManger interface that ignores any CertificateException exceptions raised. Separately, SSL certificate errors can also be disabled in WebViews via the SslErrorHandler class, by invoking the proceed() method [15]. The basic flow of the SSL Handshake is that first the client will send a Client Hello message, to which the server will reply with a Server Hello message. It is at this point that certificate validation occurs as well as a check of cryptographic parameters. After this, the client sends a secret key encrypted with the server's public key and optionally a client certificate. The remainder is irrelevant to our topic. This should not be taken to be an exhaustive explanation. See Section 5.5 for additional detail [4] SSL CERTIFICATE VALIDATION Upon receiving a server's certificate, a client will verify whether the CA name on the certificate is a trusted CA, or traverse up the hierarchy of trusted CAs until it finds a trusted CA that issued the untrusted CA's certificate. If it fails to identify a trusted CA in the chain, validation will fail. If it does find a match, it will then verify the certificate's signature, using the public key, to ensure it was actually signed by the private key of the CA. SSL SESSION CACHING Following a successful, full SSL handshake, in which certificate validation is performed and cipher suites are exchanged, the server and client can cache a session identifier. This allows subsequent connections to skip the certificate validation and cipher suite exchange, speeding up the process and saving computer resources on both ends. By default, this cached session has a lifetime determined by the server's configuration. FAILED TO VALIDATE CA WAS TRUSTED The applications in this section all failed to validate a certificate received with the correct hostname was actually issued from a trusted CA. This would make exploitation simple, as they would accept a certificate, with the correct hostname (in most cases), signed by any CA, trusted or not. In our testing, we used the BurpSuite application's Proxy feature with the Generate CA-signed per-host certificates setting, without first installing the PortSwigger CA certificate on our devices. Nearly all of the examples below would have allowed for interception and decryption of passwords and/or credit card numbers. In a few cases it may have been limited to authentication tokens, PII and/or allowed for malicious content injection, but for legal reasons, we do not wish to distinguish exactly, unless otherwise noted. 1. Hootsuite 2. ClubLocal 3. Pocket 4. OKCupid 5. Sylphone (a Salesforce Partner) 6. Slack 7. Pocket 8. StumbleUpon 9. Uber 10. <name withheld for legal reasons> 11. Pizza Hut 12. Walgreens 13. CostCo 14. SouthWest Airlines 15. Staples 16. Sears 17. Macy's 18. Office Depot 19. Kmart 20. itunes Connect 21. Android's Google Cloud Messaging Microsoft Skype 23. Cisco Webex 24. TimeWarner Cable 25. Piwik 26. Piwik2 27. CNNMoney 28. NewEgg 29. Zappos 30. SecureAuth OTP 31. Authy 32. SafeNet (VPN client) 33. SplashID 34. SonicWALL Mobile Connect 35. Cisco Technical Support 36. Kayako (helpdesk software) 37. Honeywell TC 38. Bing (login) 39. Outlook.com 40. US Bank 41. ADP 42. CapitalOne Spark Pay 43. Amazon Kindle 1 May have been discovered independently in [1], but Boneh did not recall when asked informally
3 FAILED TO VALID HOSTNAME MATCHED FAILED TO ENCRYPT All of the applications in the following list, failed to validate that the certificate actually matched the hostname they were contacting. This was tested using Burpsuite's Proxy with the Use a Custom Certificate setting enabled and providing a certificate issued by StartSSL for rather than whatever hostname they were trying to reach. Any duplications from the previous list, mean either they were vulnerable to both or had different vulnerabilities on different platforms (eg. ios vs. Android). Disabling of hostname validation is routinely accomplished, in Android apps, by creating a HostnameVerifier interface which always returns true. Again, SSL certificate errors can also be disabled in WebViews via the SslErrorHandler class, by invoking the proceed() method [15]. 1. Yahoo! Mail 2. Yahoo! Screen (ipad and iphone) 3. GoDaddy 4. Microsoft Lync 2010 and Slack 6. Cisco OnPlus (remote access) 7. Serve AMEX 8. MA SolarWinds 9. WesternDigital MyCloud 10. Cisco Webex 11. Intuit Tax Online Accountant 12. Intuit TurboTax Snap Tax 13. American Express BlueBird 14. Ask 15. WesternUnion 16. MedScape (medical information) 17. WordPress 18. myat&t 19. AT&T U-Verse 20. AT&T Global Network Client 21. Orbitz 22. Huntington Mobile (Bank) 23. AMC (Theaters) 24. Kayak 25. Weibo 26. Angie's List Mobile 27. Oracle Now 28. Dominos Pizza 29. Swivel Secure (OTP) 30. Groupon 31. Citrix Receiver 32. OfficeMax 33. OK Cupid The following lists contains apps that failed to encrypt sensitive data, such as credit cards, passwords and/or authentication tokens/cookies. 1. RockBot Passwords Full credit card information 2. Angie's List Business Center Passwords 3. Skype Auth cookies over plain-text HTTP 4. Quora Auth cookies over plain-text HTTP 5. Cisco WebEx Passwords 2 6. <name withheld for now - legal> Millions of installations Passwords Credit cards, including CVV, full PAN and expiration In fairness, we'd like to highlight that although, we did not perform as much testing on Windows 8 (mobile), none of the applications we did test, showed this behavior. We are uncertain at the time of this paper, what the explanation is for this. It could be that Microsoft has more stringent requirements for checking apps into their store, something unique in their coding or build processes or simply chance. We did also notice on our Windows 8 test device from Verizon, there was a device level toggle to disable certificate validation, which we've incorporated in our recommendations as a good practice to help avoid human error being baked into the code. While the Windows 8 (mobile) environment seemed to display the best overall results, we'd like to point out that determining what certificates are actually installed on a device would be next to impossible for an ordinary user. Since certificates can be installed from clicking on an attachment, this seems to us to be a dangerous combination. We'd like to see the list of installed certificates made more accessible. CONSEQUENCES While we feel we've enumerated some of the technical security risks of these types of vulnerabilities throughout this paper, we wanted to highlight a recent decision on a case related to this topic. On March 28 th, The FTC released a statement that they had settled a case against Fandango and Credit Karma, where certificate validation failures in their 2 This was due to a redirect from HTTPS to HTTP
4 mobile apps was listed as one of the main complaints [14]. Additionally, due to security assurances they made to consumers, regarding their use of SSL, there were allegations stating they had misrepresented the security of their mobile apps. 3 The results of this were that both Fandango and Credit Karma are to establish comprehensive security programs and undergo independent security assessments every other year for the next 20 years. While there were no direct financial penalties, in the form of fines, the costs of additional oversight and legal fees will undoubtedly be significant and far greater than any conceivable benefit gained from allowing certificate validation to be disabled in development. SSL/TLS SESSION CACHING During our research, we noticed that after rebooting an Android device, via either the Restart or Power Off options and subsequently powering it back on, we were repeatedly still able to see encrypted traffic from some applications, such as Google Maps, being intercepted by our proxy, despite not being vulnerable to attacks mentioned elsewhere in this paper. Unlike in the previous scenarios, the proxy's CA certificate had been installed and trusted when a connection was initially made from the apps, but subsequently removed prior to reboot. Upon discovering this, we tested the same applications on ios and they exhibited the same behavior when a previously installed CA certificate was removed, but only up to the point that the device was rebooted. This implied that the tested applications must have been using file based storage on Android, but not on ios, which we have since confirmed [2][7]. Digging deeper and with help from the Android security team, it was determined this was due to SSL/TLS session caching. Android has a class named SSLSessionCache which [14] implements a File-based cache...which can span executions of the application [3]. This also means that it can persist when there is no power to the device. Because, in both cases, there is no visible indication to the user that there was a previously installed certificate, on most Android and ios devices, an attacker, with the ability to install and remove certificates on the device, could instantiate a network connection with any application using this feature and, in effect, create a staged MitM attack. Due to the persistence feature in Android, this could potentially allow installation of invisible certificates anywhere in the supply chain, possibly in the same manner that malicious Netflix apps appeared earlier this year on 3 ngo-credit-karma-settle-ftc-charges-they-deceived-consumers brand new devices [5]. At the time of this paper, we are currently unaware of any reasonable programmatic means to install certificates via a malicious application, on non-rooted devices, that does not require user interaction and therefore social engineering. Remote certificate installation without user interaction is an area of active research for us. Additionally, it is assumed that any remote social engineering attacks would work regardless of the vulnerabilities outlined in this paper, thereby negating their relevance to this topic. Despite the fact that physical access is currently thought to be required, we feel this is a plausible attack, specifically, because physical control of mobile devices can be harder to maintain when generally compared to fixed assets. With regards to screen-locking being a further deterrent to physical attacks, in a recent study [13] Google found that 52% of users used a simple slide or gesture to unlock their devices. Even if reasonably complex screen-lock passwords or drawings are implemented, researchers have shown these can be determined with 68% accuracy [10]. Finally, there have been numerous bypasses historically, including in the last year [8][9]. We believe there are several plausible scenarios where an individual may be compelled or social engineered into relinquishing control of their device, if even for a short time, and having a session staged on it. Examples could include having your device seized while being detained by law enforcement or governmental agencies, losing the device or having it stolen, only to have it miraculously returned later or if the device is purchased second-hand. Additionally, a session could be staged anytime prior to a device being first given to a user, either by their cellular carrier or IT department. We have confirmed the ability for persisting sessions in excess of 24 hours and are currently researching the feasibility of increasing session cache timeouts, to arbitrarily high values, to create an enduring MitM situation. A duration of about 2 years, is assumed sufficient to persist for any individual owner, in most cases. This would presumably align with cell phone contract renewals and is well within the maximum DNS TTL [11]. Additionally, we believe it is reasonable to assume that because the certificate validation only occurs on the initial handshake any of these connections, this ability to endlessly cache sessions would allow for certificates that are revoked or expired to remain active indefinitely. This is an area of ongoing research for us. We believe this leaves maintaining the MitM position as the main obstacle to wide-spread abuse. It is assumed this would require some means to consistently poison DNS responses, by modify the hosts file, changing the DNS server settings or possibly configuring a VPN on the device. If the device were
5 rooted, this obstacle is easily overcome, but is believed to be non-trivial on non-rooted devices, provided the adversary is not a governmental entity, an ISP or in the supply chain. As an example, in 2013 Nokia was found to be performing a massive MitM on their customer's traffic. 4 when acquiring a new device. Disable all automatic connections to WiFi networks, especially those that are easily guessed by attackers. For SmartPhone OS developers Some interesting possibilities, for the most determined of attackers, could be using a drone similar to the Snoopy [12] drone, to follow the victim pretending to be a trusted SSID or strategically placed hot-spots in areas they are likely to use their apps. A recently published article claims that researchers have discovered novel attacks that make cracking WPA2 security [17] possible. If accurate, this may make obtaining or maintaining MitM position significantly easier. Force a visual indicator, similar to the browser padlock on all secure connections. Remove the ability to disable certificate validation from the developer's hands. Alternatively, make the ability to ignore certificates a toggle on the device and/or emulator, rather than in the code. Clear all SSL/TLS session caches when a certificate is removed from a device, or force a reboot in ios. Force an app to get permission from the user before allowing it to disable certificate validation. App store owners RECOMMENDATIONS For Organizations Perform static code analysis for all submitted applications to ensure they do not have certificate validation disabled prior to releasing them. Refuse to accept any that do not. Train development, quality assurance and security staff on the importance of SSL certificate validation and how to test for it. Implement policies to prohibit disabling these validations in code at any point in the release process. Invest in moving away from the use of public CAs in mobile applications or at a minimum implement certificate pinning. For Developers Remove the need for certificate authorities altogether by locally verifying the received certificate. If that is not possible, consider implementing certificate pinning and add your test servers' certificates to the list of trusted certificates, rather than disabling certificate validation globally. If none of these options work for your organization, install a trusted CA certificate, from your development environment, on your development device or emulator, which only take a few seconds. Weigh the risk/reward scenarios cautiously before implementing any SSL session caching functionality in client apps, especially if they are persistent across reboots. For Security and QA Testers Ensure certficate validation is included in part of your pre-release testing. Familiarize yourself with how this is defeated in code for the platforms you support and perform pre-release code reviews for this specific issue. For the Public Never trust that an application is as safe as a browser, until such a time as there are mandatory visual indicators that warn of potential issues, similar to the way the padlock works in a browser. Uninstall any pre-installed applications you can, 4 ngo-credit-karma-settle-ftc-charges-they-deceived-consumers RELATED WORK Independent of this work, Georgiev, et al. [1], provided an in-depth look at certificate validation issues related to non-browser software, including mobile applications, but focusing on mainly mobile banking apps. By contrast, our work includes a survey of the common nature of this issue, across numerous types of apps, citing numerous specific examples. Additionally, our research focuses exclusively on mobile applications and operating systems, not a broader discussion. Finally, their paper makes no mention of attacks against session caching or failing to encrypt data all together. Independent of this work, H. Shacham, et al. [2], make reference to potential weaknesses for cached certificates, but appear to assume a compromise of PKI as a whole is necessary and neglect to consider client-side attacks. Independent of this work, IOActive published a blog post describing very similar findings, but appears to focus on mobile banking apps on ipad and iphone. In contrast, we did not focus on any apps in particular, other than the fact that their needed to be a reasonable expectation that sensitive data was transmitted by them. Additionally, the majority of our research was focused on Android. Additionally, they did not mention any findings around session caching. CONCLUSION The main takeaway from this paper would be that organizations need to ensure they are not actively defeating client-side security mechanisms in mobile applications, even during the development process. As more and more Internet traffic moves towards mobile platforms, organizations need to re-think the way mobile applications are developed, deployed and tested. While mobile applications may commonly implement HTTP, they
6 are not traditional web applications and present unique security issues. Following the advice from Moxie Marlinspike [6] by either locally validating the certificate or implementing certificate pinning, would eliminate most of these certificate related vulnerabilities and has the added benefits of potentially limiting exposure to compromised certificate authorities. REFERENCES [1] M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, V. Shmatikov. The Most Dangerous Code in the World. stracts/ssl-client-bugs.html, 2012 [2] H. Shacham, D. Boneh, E. Rescorla. Client Side Caching for TLS. s/fasttrack.html [3] How SSLSessionCache class caches sessions droid/net/sslsessioncache.html [4] How SSL Handshake works [5] Pre-installed malware turns up on new phones einstalled-malware-turns-up-on-new-phones.html [6] Your app shouldn't suffer SSL's problems city-is-broken-in-ssl-but-your-app-ha/ [7] TLS Session Cache on ios a/qa1727/_index.html [8] New Samsung flaw allows 'total bypass' of Android lock screen ows-total-bypass-of-android-lock-screen / [9] Another lock screen bypass reported in ios 7 [10] Smudge attack k [11] Clarifications to the DNS Specification [12] 'Snoopy' drone which can can hack your phone and steal all your data let loose in London cience/technology/snoopy-drone-can-hack-y our [13] Over half of Android users fail to lock their phones id=16577 [14] Fandango, Credit Karma Settle FTC Charges that They Decieved Consumers By Failing to Securely Transmit Sensitive Person Information ases/2014/03/fandango-credit-karma-settle -ftc-charges-they-deceived-consumers [15] SslErrorHandler droid/webkit/sslerrorhandler.html [17] WPA2 wireless security cracked curity-cracked.html [18]Nokia 'hijacks' mobile browser traffic, decrypts HTTPS data -browser-traffic-decrypts-https-data /
The Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL Failures Who are these guys? Tony Trummer - Staff Security Engineer aka SecBro Tushar Dalvi - Sr. Security Engineer & Pool Hustler A Private Little War Our employer generally
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.
Best Practice Guide (SSL Implementation) for Mobile App Development 流 動 應 用 程 式 (SSL 實 施 ) 最 佳 行 事 指 引 香 港 電 腦 事 故 協 調 中 心 ] Jointly published by [ 專 業 資 訊 保 安 協 會 ] Hong Kong Computer Emergency Response
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
Project X Mass interception of encrypted connections
Project X Mass interception of encrypted connections What? SSL/TLS interception TOR interception ...a thorny path Common Issues Public Key Pinning avoids rogue CA to sign certs Common Issues Google and
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Extended SSL Certificates
Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is
Tips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
Spring Hill State Bank Mobile Banking FAQs
Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
SSL Certificate Verification
SSL Certificate Verification Websense Content Gateway v7.8.x Websense Content Gateway SSL Certificate Verification October, 2013 R221013781 Copyright 1996-2013 Yahoo, Inc., and Websense, Inc. All rights
SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust
SSL Interception Proxies Jeff Jarmoc Sr. Security Researcher Dell SecureWorks and Transitive Trust About this talk History & brief overview of SSL/TLS Interception proxies How and Why Risks introduced
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
iphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Trust Digital Best Practices
> ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or
Resco Mobile CRM Security
Resco Mobile CRM Security Out-of-the-box Security 1. Overview The Resco Mobile CRM application (client) communicates directly with the Dynamics CRM server. The communication uses standard Dynamic CRM Web
UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION. Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny
132 3089 UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION COMMISSIONERS: Edith Ramirez, Chairwoman Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny In the Matter of DOCKET
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
SSL implementieren aber sicher!
SSL implementieren aber sicher! Karlsruher Entwicklertag 2014 21.05.2014 Dr. Yun Ding SSL in the news 2011 2012 2013 2014 BEAST CRIME Lucky 13 Compromised CAs RC4 biases BREACH DRBG Backdoor Apple goto
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
AndroSSL: A Platform to Test Android Applications Connection Security
AndroSSL: A Platform to Test Android Applications Connection Security François Gagnon, Marc-Antoine Ferland, Marc-Antoine Fortier, Simon Desloges, Jonathan Ouellet, and Catherine Boileau Cybersecurity
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
The Evil Twin problem with WPA2-Enterprise. Ludwig Nussel <[email protected]> SUSE Linux Products GmbH
The Evil Twin problem with WPA2-Enterprise Ludwig Nussel SUSE Linux Products GmbH Version 1.1 April 19, 2010 Contents 1 Introduction 1 2 WPA2 Enterprise 2 2.1 Overview..............................
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Testing the OWASP Top 10 Security Issues
Testing the OWASP Top 10 Security Issues Andy Tinkham & Zach Bergman, Magenic Technologies Contact Us 1600 Utica Avenue South, Suite 800 St. Louis Park, MN 55416 1 (877)-277-1044 [email protected] Who Are
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
Realize Greater Profits As An Authorized Reseller Of Network Solutions nsprotect Secure SSL Certificates
Network Solutions Secure Services Realize Greater Profits As An Authorized Reseller Of Network Solutions nsprotect Secure s The Federal Trade Commission (FTC) estimates that 3.2 million US citizens every
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
BlackBerry Business Cloud Services. Administration Guide
BlackBerry Business Cloud Services Administration Guide Published: 2012-07-25 SWD-20120725193410416 Contents 1 About BlackBerry Business Cloud Services... 8 BlackBerry Business Cloud Services feature overview...
SSL Server Rating Guide
SSL Server Rating Guide version 2009j (20 May 2015) Copyright 2009-2015 Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication.
Internet Banking System Web Application Penetration Test Report
Internet Banking System Web Application Penetration Test Report Kiev - 2014 1. Executive Summary This report represents the results of the Bank (hereinafter the Client) Internet Banking Web Application
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
Enterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
A Study of SSL Proxy Attacks on Android and ios Mobile Applications
A Study of SSL Proxy Attacks on Android and ios Mobile Applications John Hubbard, Ken Weimer, Yu Chen Department of Electrical and Computer Engineering, Binghamton University, SUNY, Binghamton, NY 13902
Remote Access Security
Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
Implementation Vulnerabilities in SSL/TLS
Implementation Vulnerabilities in SSL/TLS Marián Novotný [email protected] ESET, spol. s r.o. Bratislava, Slovak Republic Abstract SSL/TLS protocol has become a standard way for establishing a secure communication
Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1
Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1 October 15, 2012 The following user messages appear on the AnyConnect client GUI. A description follows each message, along with recommended
Secure Sockets Layer (SSL) / Transport Layer Security (TLS)
Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 19 th November 2014 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously
Installation and usage of SSL certificates: Your guide to getting it right
Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE
CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE Due to the encouraging feedback this series of articles has received, we decided to explore yet another type of cyber intrusionthe Man In The Middle (MITM)
SAP BusinessObjects Mobile Document Version: 6.3 2015-11-27. Mobile Security Guide
SAP BusinessObjects Mobile Document Version: 6.3 2015-11-27 Content 1 Introduction....3 1.1 Why is Security Necessary?....3 1.2 About this Document....3 2 Understanding the Mobile System Landscape....4
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Dispatch: A Unique Email Security Solution
Dispatch: A Unique Email Security Solution 720 836 1222 sales / support [email protected] email www.absio.com web 8740 Lucent Boulevard, Ste 101 Highlands Ranch, CO, 80129 1 110-WP005-1 Organizations use
ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table
ARP and DNS Both protocols do conversions of a sort, but the distinct difference is ARP is needed for packet transfers and DNS is not needed but makes things much easier. ARP Address Resolution Protocol
Weak Spots in Enterprise Mobility Management Dennis Schröder
Weak Spots in Enterprise Mobility Management Dennis Schröder Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dennis Schröder, M. Sc. IT Security Business Security & Privacy Product Manager
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
How to Prepare Your Salesforce Service for Certificate Changes
How to Prepare Your Salesforce Service for Certificate Changes Salesforce, Winter 16 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce
Mobile App User's Guide
Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE Mihir Bellare UCSD 1 The public key setting Alice M D sk[a] (C) Bob pk[a] C C $ E pk[a] (M) σ $ S sk[a] (M) M, σ Vpk[A] (M, σ) Bob can: send encrypted data
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
