Cliquez pour modifier le style du. 2tre. Cliquez pour modifier le style des sous-titres du masque
|
|
|
- Joy Wright
- 10 years ago
- Views:
Transcription
1 Hacking apple accessories to pown idevices Wake up Neo! Your phone got pown! Cliquez pour modifier le style du Mathieu RENARD mathieu.renard[-at-]gotohack.org 2tre Cliquez pour modifier le style des sous-titres du masque 1
2 Who am I? DAY: Pentester & Team Leader NIGHT: Security Researcher # Area of expertise Mobility / BYOD Web application Embedded systems Hardware Hacking # Publications Les assises de la sécurité To BYOD or not to BYOD GreHack 2012 Practical ios Application Hacking HACK.lu 2012 Hacking ios Application Hackito Ergo Sum 2013 Hacking apple accessories to pown idevices 2
3 MFI Devices Invasion 3
4 idevices Attack surface Hardware, Driver: WiFi, Baseband MobileSafari Mobil AppStore idevices BootROM LLB iboot Kernel Deamons Apps DFU Mode IMG3 X509 Fake DFU IMG3 X509 Recovery mode IMG3 X509 itunes services: Backup, AFC, (USBMux) Accessory Protocol (Serial) USB host / Apple Accessory Bootime Runtime 4
5 itunes Services Cliquez pour modifier le style du 2tre Cliquez pour modifier le style des sous-titres du masque 5 5
6 com.apple.mobilebackup & com.apple.mobilebackup2 # Mobilebackup services Used by itunes to backup the device # idevice backup Permit a user to restore personal data and settings Abusing this service may allow an attacker Retrieving personal and confidential data SMS Call Logs application data default preferences data stored in the keychain (WiFi password, VPN Certificate Passwords). Inject data to the device. Can be password protected 6
7 com.apple.afc # AFC (Apple File Connection) Service running on all idevices Handled by /usr/libexec/afcd Used by itunes to exchange files AFC clients can access certain files only Files located in the Media folder 7
8 com.apple.mobile.house_arrest # House_arrest allows accessing to AppStore applications folders and their content. # Using an AFC client, a user/attacker can download the application resources and data (documents, photos ). Including default preferences File where credentials are sometimes stored. 8
9 com.apple.mobile.installation_proxy # Installation proxy Manages applications on a device List installed applications. Install an application on the device. Upgrade an application on the device. Uninstall an application from the device. List archived applications. Archive an application on the device Creating a ZIP archive in the ApplicationArchives directory and uninstalling the application Removes a previously archived application from the device Used by the com.apple.mobile.house_arrest Enumerate and dump installed applications. 9
10 com.apple.mobile.diagnostics_relay # Diagnostics relay Allows requesting ios diagnostic information. Handles the following actions: Puts the device into deep sleep mode and disconnects from host. Restart the device and optionally show a user notification. Shutdown of the device and optionally show a user notification. Used by evasi0n to update some caches by rebooting the device. 10
11 com.apple.mobile.file_relay # File_Relay Allow paired devices to launch the following commands AppleSupport, Network, WiFi, SystemConfiguration, VPN, UserDatabases, CrashReporter, Tmp, Caches All the files returned are stored in clear text in a CPIO archive Asking for UserDatabases allow retrieving SMS, Contacts, Calendar and from databases in clear text. 11
12 libimobiledevice / pymobiledevice # Libimobiledevice Cross-platform software library Developed by Nikias Bassen Handles the protocols to support idevices. Based on the open source implementation of usbmuxd # Pymobiledevice Lite python implementation Handles only most important protocols to support idevices Based on the open source implementation of usbmuxd # Allows other software to easily interact with the services hosted on the device. 12
13 Summary # Communicating with the Device through the Sync port may allow malicious dock station to Retrieve & Inject SMS Call Logs application data default preferences data stored in the keychain (using backup) 13
14 Communicating with itunes Services Cliquez pour modifier le style du Cliquez pour modifier le style des sous-titres du masque 2tre 14 14
15 USBmuxd and USBmux protocol Client side communication # USBmuxd Daemon is started at system launch (on user system). Creates a listening UNIX Domain Socket at /var/run/usbmuxd. Wait for idevice connections via USB Allows multiplexing of TCP connection over one USB pipe Binary Data sent through UNIX Socket Hello USBMuxd Hello device ID TCP connect request USBMux Client 15
16 Lockdownd # Lockdownd binary Responsible for several tasks Pairing, Activation, Unlocking FairPlay certificates, Delegating communications to other services Listening on port Accessed through the usbmux protocol. Packets Data length : 32bits big endian word Data : XML plist Only available after pairing. First pairing require the device to be unlocked 16
17 itunes service communication overview Plist files sent over USB pipe idevices Pairing request Pairing OK Host libmobiledevice lockdownd Can you start afc service? AFC service is running on port : XXXXX USBMuxd AFC Client AFC Service AFC Commands AFC Results 17
18 Lockdown protocol & Pairing XML Plist sent through USBmux {Request=QueryType} {Request=QueryType, Result=Success, Type=com.apple.mobile.lockdown} {Request=GetValue, Label=xxxx} Lockdownd (Device) {Request=GetValue, Label=xxxx, Value={ActivationPublicKey=xxxx, DevicePublicKey=xxxx,UniqueDeviceID=xxxx, DieID=xxx, }} {PairRecord={DevicePublicKey=xxxxx, DeviceCertificate=xxxx,HostCertificate=xxxx, HostID=xxxx,RootCertificate=xxxx, SystemBUID=xxxx}, Request=Pair} {Request=Pair, EscrowBag=xxxx} {PairRecord={DevicePublicKey=xxxxx, DeviceCertificate=xxxx, HostCertificate=xxxx, HostID=xxxx,RootCertificate=xxxx, SystemBUID=xxxx}, Request=ValidatePair} Lockdown Client {Request=ValidatePair} {HostID=xxx, Request=StartSession} {SessionID=xxx, Request=StartSession, EnableSessionSSL=True} 18
19 Summary # Pairing is initiated on the USB Host side # Unlocking the device is mandatory 19
20 Reversing an Apple MFI accessory Cliquez pour modifier le style du 2tre Cliquez pour modifier le style des sous-titres du masque 20
21 Anatomy of an Accessory # MFI Alarm clock Apple dock connector Features : Compatible with all ipods Wake up to ipod Full-function remote control Charges ipod whilst connected 21
22 Opening the box Power supply & Audio Amplifier idevice interface Mother board 22
23 Mother board analysis 23
24 R5F2126 In-System Programming On-chip data flash (1Kbytes) Internal ROM (32 Kbytes) Not enough resources for hosting ipown features 24
25 idevice interface 25
26 49.9K 43.2K 26 Reversing the circuit J1 idevice connector K 2V 49.9K 75K 2,6V GND 5V Tx Rx AC DET IP DET IPOD R A GND IPOD L J2 Audio RS232 Charging
27 What about the Lightning connector? # In October 2012 Apple released the Lightning Apple proprietary bus and power connector Replace its previous proprietary 30-pin dock connector. Using 8 pins instead of 30 Significantly more compact than the 30-pin dock connector Can be inserted with either face up. Embeds an authentication chip inside the cable. Analyzing the Lightning connector will not be so easy. # 30 pins adapters Allows to connect 30-pin accessories to devices featuring the Lightning connector. Successfully tested on the dock station used for our analysis 27
28 Sniffing the communications # Standard 8N1 serial protocol. # Data are bauds. 28
29 Request/Response Structure Play 29
30 Summary # Hacking the firmware of the µc? Not relevant regarding our goal We need some space to store user data # Developing a custom dock? Challenging but too much time consuming regarding this study. USB pins are not used Allows connecting another device that share the same power supply # Hacking the dock and adding some hardware The raspberry PI is meeting all our requirements At least two USB ports 1 to communicate with the connected device 1 for a 3G / Wi-Fi adapter 1 Ethernet port for debugging GPIO (simulating user action on the dock) Accepting 5V power supply. 30
31 Weaponizing an Apple MFI accessory Cliquez pour modifier le style du 2tre Cliquez pour modifier le style des sous-titres du masque 31 31
32 ipown Bill of materials # 1 Raspberry pi # 1 PodSocket # 1 PodBreakout # 1 USB Connector # 1 mini USB Connector # 1 WiFi USB Key # 1 SDcard 32
33 Hardware Hacking 33
34 49.9K 43.2K 34 Reversing the circuit J1 idevice connector K 2V 49.9K 75K 2,6V GND 5V Tx Rx AC DET IP DET IPOD R A GND IPOD L J2 Audio RS232 Charging
35 GND 5V Tx Rx AC DET IP DET IPOD R A GND IPOD L J2 VCC D+ D- GND J3 USB 550K J1 idevice connector Enabling USB Audio RS232 USB 35
36 Hacked MFI accessory Hardware MiTM Cheap ARM GNU Linux board This dock station is now powered by 36
37 Demo Cliquez pour modifier le style du 2tre Cliquez pour modifier le style des sous-titres du masque 37
38 ipown Personal Data dumper 38
39 ipown Personal Data dumper What if out alarm clock could silently jailbreak our device in our sleep when we are dreaming? 39
40 ipown 2.0 Automating Jailbreak Cliquez pour modifier le style du 2tre Cliquez pour modifier le style des sous-titres du masque 40 40
41 Public Jailbreaks # jailbreakme.com Exploits by comex, Grant Paul (chpwn), Jay Freeman (saurik) & MuscleNerd Targeting MobileSafari Could be used against an unwitting victim Only working on old devices # Others other recent jailbreaks (absinthe 1&2, evasi0n) Require USB tethering. Require User interaction idevices refuse to communicate over USB if they are locked unless they have previously paired. Lower security impact only useful to the phone s owner # Are we really safe? 41
42 User Interaction in evasi0n 42
43 Evasi0n Initialization & Stage 1 # Pairing with the device # Starting com.apple.mobile.file_relay service # Retrieving the com.apple.mobile.installation.plist plist file caches the list of installed applications # Activating the apple DemoApp.app # Restoring Hijacked DemoApp.app in /var/mobile Using old mobilebackup simlink trick # Updating the caches / Rebooting the device DemoApp.app will show up on SpringBoard after restart 43
44 Evasi0n Stage 2: Initialization # Evasi0n Stage 2 Injecting symbolic link 1/2 /var/db/timezone -> 777 /var/tmp/launchd Crarshing lockdonwd 1/2 Chmod 777 /var/tmp/launchd Injecting symbolic link 2/2 /var/db/timezone -> 777 /var/tmp/launchd/sock Crashing lockdonwd 2/2 Chmod 777 /var/tmp/launchd/sock Waiting for user to launch the DemoApp.app Injecting the remount payload Uploading Cydia files 44
45 Evasi0n Stage 2: Remout payload # Executing DemoApp.app => Executing the remount script Launchctl interfaces with launchd to load, unload daemons/agents launchd s IPC mechanism operates through Unix domain sockets. LAUNCHD SOCKET Informs launchctl how to find the correct launchd socket Launchd runs as root and here launchctl runs as mobile The socket and the demaon launchctl have been chmoded 777 Our mobile now able to communicate with the root user s launchd 45
46 Evasi0n Stage 2: Remouting the file system in R/W # launchd (runing as root) execute the remount script # No mount point is specified in the script The kernel use the script name as mount point Generating errors messages on stderr The size of mount.stderr growing up # Evasion detects the DemoApp.app was launched # Injecting another set of files unsing backup Restoring timezone directory Replacing DemoApp.app binary by a symbolink link pointing to / The kernel use the script name as mount point The file system is successfully remounted in RW 46
47 Evasi0n Stage 3: Injecting final payload # Creating a directory at /var/evasi0n containing 4 files launchd.conf. List of subcommands to run via launchctl when launchd starts Remouting the filesytem in RW amfi.dylib Loading amfi.dylib library Executing the evasi0n binary Loaded with DYLD_INSERT_LIBRARY Contains only lazy bindings and no TEXT section No TEXT/text section means that there is nothing to sign Overriding MISValidateSignature in order to always return 0 Allowing unsigned code execution Evasi0n Binary : Executed with root privilege in the early boot environment. Launches the kernel exploit Udid Contains the UDID of the current device 47
48 Reimplementing evasi0n Modding evasi0n installer # Hijacking Music iphone Application instead of DemoApp.app Launched when connect the device is connected to a dock Handle Remote accessory protocol We can trigger the remount payload automatically The payload can be triggered by the alarm 48
49 Simulating user action # Original Schematic in µc # ipown Schematic out in µc 49
50 GOTO: H[a]CK Demo Cliquez pour modifier le style du 2tre Cliquez pour modifier le style des sous-titres du masque 50
51 Wake up Neo! Your phone got pwd Scenario Room 1 : Victim Room 2 : Attacker 51
52 Wake up Neo! Your phone got pwd Demo 52
53 Conclusion Cliquez pour modifier le style du 2tre Cliquez pour modifier le style des sous-titres du masque 53 53
54 ipown # Edition??? 54
55 Conclusion # Apple made the choice of user experience instead of security. It is possible to build up a malicious device in order to get both the data and the control of idevices. When things get up close and personal, the rule is always better safe than sorry" Don t connect your device to an untrusted dock station 55
56 And what about IOS7? # In ios 7 Apple Fix this attack vector 56
57 Thank you for Listening Cliquez Ques3ons pour? modifier le style du mathieu.renard[ at ]gotohack.org h<p:// 2tre Cliquez pour modifier le style des sous-titres du masque 57 57
58 @Comex Thanks to all members of the jailbreak community for sharing their work and all of my friends who helped me to prepare this talk. Don t learn to hack but hack to learn! 58
titre GOTO: H[a]CK Cliquez pour modifier le style des sous-titres du masque Hacking apple accessories to pown idevices
GOTO: H[a]CK Hacking apple accessories to pown idevices Cliquez Wake up Neo! pour Your phone modifier got pown! le style du Mathieu RENARD - @GOTOHACK mathieu.renard[-at-]gotohack.org titre Cliquez pour
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
Deploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
Please Complete Speaker Feedback Surveys. SecurityTube.net
Please Complete Speaker Feedback Surveys Advanced ios Applica:on Pentes:ng Vivek Ramachandran Founder, SecurityTube.net [email protected] Vivek Ramachandran B.Tech, ECE IIT Guwaha: Media Coverage
Pentesting iphone Applications. Satishb3 http://www.securitylearn.net
Pentesting iphone Applications Satishb3 http://www.securitylearn.net Agenda iphone App Basics App development App distribution Pentesting iphone Apps Methodology Areas of focus Major Mobile Threats Who
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
SWIPING THROUGH MODERN SECURITY FEATURES
SWIPING THROUGH MODERN SECURITY FEATURES HITB Amsterdam, April 11th, 2013 REACHING THE KERNEL Run unsigned code outside the sandbox Get around ASLR Take control of the kernel REACHING THE KERNEL Run unsigned
2tre. Hacking ios Applications. GOTO: H[a]CK. Cliquez pour modifier le style des sous-titres du masque
GOTO: H[a]CK Hacking ios Applications Cliquez Is your company pour data safe modifier when stored on idevices le style? du Mathieu RENARD - @GOTOHACK mathieu.renard[-at-]gotohack.org mathieu.renard[-at-]sogeti.com
Pentesting Mobile Applications
WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司 Pentesting Mobile Applications www.dbappsecurity.com.cn Who am I l Frank Fan: CTO of DBAPPSecurity Graduated from California State University as a Computer
Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH
Securing ios Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me President of OPTIMAbit GmbH Responsible for > 200 Pentests per Year Ca 50 ios Pentests and code reviews in the last two years. Overview
Forensic analysis of iphone backups
Forensic analysis of iphone backups The goal of iphone Backup Forensics analysis is extracting data and artefacts from the itunes backups without altering any information. iphone forensics can be performed
In-System Programmer USER MANUAL RN-ISP-UM RN-WIFLYCR-UM-.01. www.rovingnetworks.com 1
RN-WIFLYCR-UM-.01 RN-ISP-UM In-System Programmer 2012 Roving Networks. All rights reserved. Version 1.1 1/19/2012 USER MANUAL www.rovingnetworks.com 1 OVERVIEW You use Roving Networks In-System-Programmer
RN-XV-RD2 Evaluation Board
RN-XV-RD2 Evaluation Board 2012 Roving Networks. All rights reserved. -1.01Version 1.0 9/28/2012 USER MANUAL OVERVIEW This document describes the hardware and software setup for Roving Networks RN-XV-RD2
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327 Mod ule_i D Error _Cod e Error Description 1 1 PROCESSOR_NULLREF_ERROR 1 100 ERROR_PARSE_PAIR Failed
UPS MONITORING SOFTWARE USER MANUAL
UPS MONITORING SOFTWARE USER MANUAL Emily For Linux Table of Contents 1 Installation...2 1.1. Note...2 1.2. Install Instructions...2 1.3 Uninstall Instructions...2 2 Function Explanations...3 2.1 Function
GE Healthcare Life Sciences UNICORN 5.31. Administration and Technical Manual
GE Healthcare Life Sciences UNICORN 5.31 Administration and Technical Manual Table of Contents Table of Contents 1 Network setup... 1.1 Network terms and concepts... 1.2 Network environment... 1.3 UNICORN
Zenprise Device Manager 6.1.5
Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in
DeviceAnywhere Enterprise. ios Device Onboarding Guide
DeviceAnywhere Enterprise ios Device Onboarding Guide DeviceAnywhere Enterprise ios Device Onboarding Guide DeviceAnywhere Enterprise 6.2.1 DeviceAnywhere Enterprise Automation 6.2.1 DeviceAnywhere Enterprise
RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide
RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
RN-WIFLY-EVAL-UM. WiFly Evaluation Kit. 2012 Roving Networks. All rights reserved. RN-WIFLY-EVAL-UM Version 1.32r 10/9/2012 USER MANUAL
WiFly Evaluation Kit 2012 Roving Networks. All rights reserved. Version 1.32r 10/9/2012 USER MANUAL OVERVIEW This document describes the hardware and software setup for Roving Networks evaluation kits,
Sophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
Smartphone Security Overview
Smartphone Security Overview Jagdish Prasad Achara, Claude Castelluccia INRIA Rhone-Alpes 5 décembre 2012 J. P. Achara, C. Castelluccia (INRIA Rhone-Alpes) Smartphone Security Overview 5 décembre 2012
DeployStudio Server Quick Install
DeployStudio Server Quick Install v1.7.0 The DeployStudio Team [email protected] Requirements OS X 10.7.5 to 10.11.1 DeployStudioServer_v1.7.x.pkg and later NetBoot based deployment 100 Mb/s switched
ICT Professional Optional Programmes
ICT Professional Optional Programmes Skills Team are a Microsoft Academy with new training rooms and IT labs in our purpose built training centre in Ealing, West London. We offer a range of year-long qualifications
Configure thin client settings locally
This chapter contains information to help you set up your thin client hardware, look and feel, and system settings using the Control Center. Tip While it is not recommended to use dialog boxes for configuring
Pentesting iphone & ipad Apps Hack In Paris 2011 June 17
Pentesting iphone & ipad Apps Hack In Paris 2011 June 17 Who are we? Flora Bottaccio Security Analyst at ADVTOOLS Sebastien Andrivet Director, co-founder of ADVTOOLS ADVTOOLS Swiss company founded in 2002
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Chapter 1 Hardware and Software Introductions of pcduino
Chapter 1 Hardware and Software Introductions of pcduino pcduino is a high performance, cost effective mini PC platform that runs PC like OS such as Ubuntu Linux. It outputs its screen to HDMI enabled
SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules
Must have skills in any penetration tester's arsenal. MASPT at a glance: 10 highly practical modules 4 hours of video material 1200+ interactive slides 20 Applications to practice with Leads to emapt certification
Sophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
COPY9 USER GUIDE for iphone
COPY9 USER GUIDE for iphone Installation for iphone Devices Welcome to the installation page for your iphone. Copy9 is ONLY compatible with ANY jailbroken iphone 3G, 3GS, 4, iphone 4S, ipad at least 3.1.3
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Test Center Enterprise. ios Device Onboarding Guide
Test Center Enterprise ios Device Onboarding Guide Copyright Copyright 2012 Keynote DeviceAnywhere. All Rights Reserved. March 2012. Notice 2012 Keynote DeviceAnywhere. All rights reserved. THE INFORMATION
Dual Bay Home Media Store. User Manual
Dual Bay Home Media Store User Manual CH3HNAS2 V1.0 CONTENTS Chapter 1: Home Page... 3 Setup Wizard... 3 Settings... 3 User Management... 3 Download Station... 3 Online User Manual... 3 Support... 3 Chapter
Iridium Extreme TM Satellite Phone. Data Services Manual
Iridium Extreme TM Satellite Phone Data Services Manual Table of Contents 1 OVERVIEW... 1 2 HOW IT WORKS... 1 3 BEFORE INSTALLING... 2 4 USB DRIVER INSTALLATION... 3 5 MODEM INSTALLATION AND CONFIGURATION...
This guide describes features that are common to most models. Some features may not be available on your tablet.
User Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. SD Logo is a trademark of its proprietor.
Matrix 510/520 User Guide
Matrix 510/520 User Guide Introduction: Matrix 510/520 are ARM9-based Linux ready industrial computer. The key features are as follow: Matrix 520 Layout 1. ARM920T ARM Thumb Processor with 200MIPS at 180MHz,
SVC400P/SVC800P. 4/8 Camera Live Tracking Vehicle DVR Installation Manual. Version 1.0
SVC400P/SVC800P 4/8 Camera Live Tracking Vehicle DVR Installation Manual Version 1.0 1. MAIN FEATURES... 2 2. PRODUCT OVERVIEW... 2 3. DIMENSIONS... 4 4. PACKAGE CONTENTS... 5 5. MOUNTING AND ENVORNMENTAL
Release Notes. Contents. Release Purpose. Platform Compatibility. Licensing on the SRA Appliances and Virtual Appliance
Secure Remote Access Dell SonicWALL SRA 7.0.1.2 Contents Release Purpose... 1 Platform Compatibility... 1 Licensing on the SRA Appliances and Virtual Appliance... 1 Important Differences between the SRA
NetSpective Logon Agent Guide for NetAuditor
NetSpective Logon Agent Guide for NetAuditor The NetSpective Logon Agent The NetSpective Logon Agent is a simple application that runs on client machines on your network to inform NetSpective (and/or NetAuditor)
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
BIT COMMANDER. Serial RS232 / RS485 to Ethernet Converter
BIT COMMANDER Serial RS232 / RS485 to Ethernet Converter (Part US2000A) Copyrights U.S. Converters 1 Contents Overview and Features... 3 Functions..5 TCP Server Mode... 5 Httpd Client Mode.5 TCP Auto mode....6
iphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
User Guide. for Card Reader and Payment Application
User Guide for Card Reader and Payment Application Introduction to Pogo> This document provides detailed information on how best to use the Pogo> application to benefit your business. The intention is
Sophos Mobile Control Installation guide. Product version: 3.6
Sophos Mobile Control Installation guide Product version: 3.6 Document date: November 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...5 3 Set up Sophos Mobile Control...11 4 External
IRON-HID: Create your own bad USB. Seunghun Han
IRON-HID: Create your own bad USB Seunghun Han Who am I? Security researcher at NSR (National Security Research Institute of South Korea) Operating system and firmware developer Author of the book series
End User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
Lockup: A software tool to harden ios by disabling default Lockdown services
Lockup: A software tool to harden ios by disabling default Lockdown services Gómez-Miralles, Luis & Arnedo-Moreno, Joan [email protected] [email protected] Internet Interdisciplinary Institute (IN3) Universitat
HP MediaSmart Server Software Upgrade from v.1 to v.3
HP MediaSmart Server Software Upgrade from v.1 to v.3 Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New... 3 Features That Will Change... 4 Prepare
Site Monitor. Version 5.3
Site Monitor Version 5.3 1 1 Table of contents 1 Table of contents... 2 2 Installation... 3 2.1 Components... 3 2.1.1 Monitoring Service... 3 2.1.2 Desktop User Interface... 3 2.1.3 Web User Interface...
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
ios Testing Tools David Lindner Director of Mobile and IoT Security
ios Testing Tools David Lindner Director of Mobile and IoT Security Who is this guy? David Lindner @golfhackerdave [email protected] 15+ years consulting experience I hack and golf, sometimes at
ios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
McAfee SMC Installation Guide 5.7. Security Management Center
McAfee SMC Installation Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can
CDR-100. iphone Spy Recovery (for Win) User Guide. Rev. 1.0. iphone Data Recovery Software for Windows OS
CDR-100 iphone Spy Recovery (for Win) iphone Data Recovery Software for Windows OS User Guide Rev. 1.0 Contents Introduction 1 System Requirements 2 Features 3 Getting Ready for Data Recovery 4 Installation
Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012
Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012 1 The person installing the VC is knowledgeable of the Linux file system
System Integration Software
System Integration Software Release Notes for Version 6.0.5 1.0 Compatibility Currently, PC9000 is compatible with the following Radionics control/communicators: D7212, D7412, D7412G D9112, D9412 and D9412G
Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?
FactoryCast Gateway TSX ETG 3021 / 3022 modules How to Setup a GPRS Connection? 1 2 Table of Contents 1- GPRS Overview... 4 Introduction... 4 GPRS overview... 4 GPRS communications... 4 GPRS connections...
SIP-DECT Knowledge Base SIP-DECT System Update
SIP-DECT Knowledge Base SIP-DECT System Update MAI 2015 DEPL-2046 VERSION 1.6 KNOWLEDGE BASE TABLE OF CONTENT 1) Introduction... 2 2) Update (New Service Pack in the same Release)... 3 2.1 OMM HOSTED ON
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main
Guidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
Guidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
Avalanche Remote Control User Guide. Version 4.1.3
Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
Super Manager User Manual. English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net
Super Manager User Manual English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net How to launch Super Manager? Click the Super Manager in Launcher or add a widget into your Launcher (Home
This software will update your Samsung Galaxy S II to Android 4.1.2 software version GB28.
Samsung Galaxy S II Android Jelly Bean Update Instructions This software update provided by Samsung will update your Samsung Galaxy S II from Android Gingerbread to Android Jelly Bean. This software will
Citrix Worx App SDK Overview
Citrix Worx App SDK Overview Table of Contents Introduction... 3 About the App Catalog Deployment Model... 3 About the Citrix MDX Toolkit... 4 The Worx App SDK... 5 The Unmanaged and Managed Modes of Worx
ReadyNAS OS 6 Desktop Storage Systems
ReadyNAS OS 6 Desktop Storage Systems Hardware Manual Models: ReadyNAS 102 ReadyNAS 104 ReadyNAS 312 ReadyNAS 314 ReadyNAS 316 ReadyNAS 516 ReadyNAS 716X EDA 500 October 2013 202-11206-04 350 East Plumeria
Network connectivity controllers
Network connectivity controllers High performance connectivity solutions Factory Automation The hostile environment of many factories can have a significant impact on the life expectancy of PCs, and industrially
SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
iphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana 46240 USA
Paul McFedries Microsoft Windows9 Home Server 2011 LEASHE Third Edition 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents Introduction 1 Part I Unleashing Windows Home Server Configuration
ipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
The safer, easier way to help you pass any IT exams. Exam : 9L0-518. OS X Server Essentials 10.8 Exam. Title : Version : Demo 1 / 6
Exam : 9L0-518 Title : OS X Server Essentials 10.8 Exam Version : Demo 1 / 6 1.In Server app, which procedure will configure OS X Server to let members of a specific group use the Messages service? A.
End User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
Version 1.0. File System. Network Settings
Factory Default Settings LAN 1 IP Address: 192.168.2.127 Login: root or guest ( telnet guest only) Password: root or guest ( telnet guest only) Serial Console Port: Baud rate: 115200 Data format: 8 Bits,
Chapter 2 Utility Manager
Chapter 2 Utility Manager...2 2.1 HMI IP, Password... 3 2.2 Editing Tools... 4 2.2.1 Build Download Data for Saving in SD Card or USB Disk... 4 2.2.2 Steps to Download Project to HMI via USB Disk or SD
Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update
Secure Remote Access Dell SonicWALL SRA 7.5.0.12 Contents Release Purpose... 1 Platform Compatibility... 1 Licensing on the Dell SonicWALL SRA Appliances and Virtual Appliance... 2 Important Differences
Workshop Intel Galileo Board
Workshop Intel Galileo Board Introduction and Basics of Intel Galileo Board Walter Netto November 03th, 2014 Agenda Intel Galileo Board Overview Physical Characteristics Communication Processor Features
RN-131-PICTAIL & RN-171-PICTAIL Web-Server Demo Application
RN-131-PICTAIL & RN-171-PICTAIL Web-Server Demo Application 2012 Roving Networks. All rights reserved. RN-131/171-PICTAIL-UM Version 1.0 1/8/2013 OVERVIEW The RN-131 and RN-171 WiFly radio modules are
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Quick Start Guide. Version R9. English
Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Attacking and Defending Apple ios Devices in the Enterprise Brandon Knight
Attacking and Defending Apple ios Devices in the Enterprise Brandon Knight Brandon Knight About Your Presenter Senior Consultant SecureState Profiling Team CISSP Co-Founder of Penetration Testing Exectution
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
CHAPTER 2: USING THE CAMERA WITH THE APP
TABLE OF CONTENTS OVERVIEW... 1 Front of your camera... 1 Back of your camera... 2 ACCESSORIES... 3 CHAPTER 1: Navigating the Mobile Application... 4 Device List: How to Use this Page... 4 My Messages:
Tablet PC User Manual
Tablet PC User Manual Please read all instructions carefully before use to get the most out of your Time2Touch Tablet PC. The design and features are subject to change without notice. Contents Important
3.1 Connecting to a Router and Basic Configuration
3.1 Connecting to a Router and Basic Configuration Objective This lab will focus on the ability to connect a PC to a router in order to establish a console session and observe the user interface. A console
Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts
Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide 2 Purpose of this guide Experience the most common use cases for the product, learn about
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting
Smart Cloud Integration Pack. For System Center Operation Manager. v1.1.0. User's Guide
Smart Cloud Integration Pack For System Center Operation Manager v1.1.0 User's Guide Table of Contents 1. INTRODUCTION... 6 1.1. Overview... 6 1.2. Feature summary... 7 1.3. Supported Microsoft System
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in ios Devices
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in ios Devices JONATHAN ZDZIARSKI [email protected] @ JZDZIARSKI Whois NerveGas Worked as dev-team member on many of the early jailbreaks
