Lockup: A software tool to harden ios by disabling default Lockdown services



Similar documents
Symantec Mobile Management for Configuration Manager 7.2

A guide for Purchasing and Syncing Apps on the ipad

Symantec Mobile Management 7.2

Exchange ActiveSync (EAS)

Symantec Mobile Management 7.2

Symantec Mobile Management 7.1

Why you need. McAfee. Multi Acess PARTNER SERVICES

Global Mobile Technologies Guide for Zenprise Enrollment for IOS devices (ipad, iphones)

The Top Five Security Challenges Presented by Mobile SharePoint Access

When enterprise mobility strategies are discussed, security is usually one of the first topics

mobilecho: 5-Step Deployment Plan for Mobile File Management

CentraStage & Apple Configurator

Mobile Iron User Guide

Codeproof Mobile Security & SaaS MDM Platform

Downloading an Acted ebook Accessing an ActEd ebook on more than 1 computer/device Printing an ActEd ebook

Deploying iphone and ipad Mobile Device Management

Symantec Mobile Management 7.1

End User Devices Security Guidance: Apple ios 8

Symantec Mobile Management Suite

Kaspersky Lab Mobile Device Management Deployment Guide

EZ RMC Remote HMI App Application Guide for ios

ios How to Back Up from icloud

Remote Configuration for FileBrowser

Mac in the Enterprise

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Feature List for Kaspersky Security for Mobile

User Manual for Version Mobile Device Management (MDM) User Manual

itunes: About ios backups

BlackBerry Link for Windows. Version: User Guide

"Secure insight, anytime, anywhere."

ipad in Business Mobile Device Management

FAQ for ipad (ios 5.x)

iphone in Business Mobile Device Management

NHSmail mobile configuration guide Apple iphone

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Mobile Device Management for CFAES

TIPS FOR USING OS X 10.8 MOUNTAIN LION

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Secure , Calendar, Contacts, Tasks, File sharing and Notes across devices

iphone in Business How-To Setup Guide for Users

Practical Attacks against MDM Solutions (and What Can You Do About It)

Students Mobile Messaging Registration & Configuration

Smart Ideas for Smartphone Security

ios Education Deployment Overview

Deploying iphone and ipad Security Overview

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Managing and Securing the Mobile Device Invasion IBM Corporation

How to wipe personal data and from a lost or stolen mobile device

Save and Restore Backups using itunes File

ONE Mail Direct for Mobile Devices

Axis 360 ebooks & the Blio

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

Pryvate App User Manual

TELUS Business Connect Meeting User Guide. Video Conference. Web Share.

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

Fibaro Intercom for ipad

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security

Parla, Secure Cloud

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

GO!Enterprise Mobile Device Management ios Release Notes

Reviewer Guide Core Functionality

Apple ios 8 Security

Clickfree frequently asked questions

Kaspersky Security 10 for Mobile Implementation Guide

curbi for Schools Technical Overview October 2014

Here s what you ll need to know to get involved in our Summer 2016 classes, and one-on-one tutoring opportunities:

CONTENTS PAGE. c) Our Recommended Settings d) Overview...7. i. Check Out and Download a book... 27

Security for the Road Warrior

Mobile Tablet Devices

AirWatch for Android Devices

BlackBerry Link for Windows. Version: User Guide

Mobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall

How to configure your mobile devices post migrating to Microsoft Office 365

Mobile Operating Systems & Security

BYOD Policy for [AGENCY]

Q A. CWT To Go. Question Categories

Dacorum U3A Apple Mac Users Group Agenda TUESDAY 7th July 2015 Time Machine Backups for your MAC & ipad?

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

ADTVision (ios) Mobile Client Software User Manual (V1.6)

Wind River Financial iprocess Setup Guide for IOS Devices

Mobile Conference Connection User Guide Apple iphone Mobile Device

Connection. to SECON-Server

ios Enterprise Deployment Overview

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

The smartphone revolution

Information Technology Department. Exchange Migration

Athena Mobile Device Management from Symantec

1:1 ipad Program Device Setup Guide

ipad Basics ios7 Web Page:

BlackBerry Desktop Software User Guide

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

Downloadable ebooks and Audiobooks at McKinney Public Library

Q A. CWT To Go. Question Categories

You will need your District Google Mail username (e.g. and password to complete the activation process.

Harry Fike Frostburg State University Office of Information Technology Technical Services

Using the Wireless Music Bridge

EFFECTIVE BYOD. A presentation by: Tzachy Givaty, CommuniTake

Account & Login. Log In to Mobile Conference Connect (MCC) as a Meeting Leader

Transcription:

Lockup: A software tool to harden ios by disabling default Lockdown services Gómez-Miralles, Luis & Arnedo-Moreno, Joan pope@uoc.edu jarnedo@uoc.edu Internet Interdisciplinary Institute (IN3) Universitat Oberta de Catalunya Workshop on Security and Privacy in Systems and Communication Networks (SecureSysComm 2015) November 2015 Kraków, Poland

Index 1. Intro 2. Background: What is the problem? 3. Mitigation strategies 4. Lockup 5. Conclusions and future work 2

Intro 2007: iphone. Multi-touch, no stylus. 2010: ipad. iphone O.S. goes ios. Smartphones and tablets hold vast amounts of personal information: e-mail and IM messages, contacts, calendars, to-do lists, history of visited places, photographs ios market share (Q2 2015) over 10%. Over 60% in corporate environments. 3

Lockup: A software tool to to harden ios by disabling default Lockdown lockdown services - Gómez-Miralles, L. & Arnedo-Moreno, J. - SecureSysComm 2015 Background The problem: ios trust relationships. User prompt presented when connected to a new computer/device (stereo, alarm clock...) Upon consent, trust certificates are created and interchanged. These are used to access a number of services: audio, data transfer through the Lockdown daemon. A malicious device (or an attacker with a copy of the trust certificate) can access all the device data, install applications remotely, sniff network traffic, modify settings All of this wirelessly and without the device alerting the user. J. Zdziarski, Identifying back doors, attack points, and surveillance mechanisms in ios devices. Digital Investigation 11 (2014). 4

Lockup: A software tool to to harden ios by disabling default Lockdown lockdown services - Gómez-Miralles, L. & Arnedo-Moreno, J. - SecureSysComm 2015 Background Sensitive ios services offered through Lockdown: com.apple.file_relay - Extract data, bypass backup encryption password, no known purpose. com.apple.pcapd - Network sniffer, no known purpose. com.apple.mobile.mcinstall - Install config profiles, MDM. com.apple.mobile.installation_proxy - Install / remove apps. com.apple.mobile.house_arrest - Transfer files in / out of apps. com.apple.mobilebackup2 - Backup device data (respects backup encryption pw). com.apple.mobilesync - Sync bookmarks, notes, etc. com.apple.afc - Access to media library: pictures, videos and music. 5

Mitigation strategies Delete existing pairing records. Disable sensitive services over-the-air. Remove dangerous/unneeded services. Lock pairing with new devices. 6

Lockup Proof of concept software tool. 1. Disables unwanted services (e.g. sniffer). 2. Limits other services to USBonly (no over-the-air). 3. For the rest of services, defines a number of profiles based on typical use cases (MDM; sync to itunes; standalone ). 4. Periodically revokes trust certificates. 7

Lockup Screenshot showing the main menu and different profiles 8

Lockup: components 1. Disable unwanted services (e.g. sniffer). 2. Limit other services to USBonly (no over-the-air). 3. For the rest of services, define a number of profiles based on typical use cases (MDM; sync to itunes; standalone ). 4. Periodically delete pairing records. 9

Lockup: ios 8 & 9 Starting with ios 8, the list of Lockdown services is not stored in a separate file, but at the end of the Lockdown binary itself. We have succeeded at enabling/disabling services by altering that section of the binary. Work in progress: automatically detect the right position within the Lockdown binary to overwrite the service list, instead of relying on pre-calculated offsets, in order to automatically support future ios releases. 10

Conclusions ios trust model a door to back doors. In our proof of concept implementation, the need for a jailbreak introduces additional weaknesses & threats. However it would be trivial for Apple to offer this kind of protection in stock ios versions, although this is unlikely compatible with their love for simplicity. 11

Questions? Thanks for your assistance Get Lockup at http://pope.es/lockup 12