Into The Droid. Gaining Access to Android User Data DEF CON 20

Similar documents
Additional details >>> HERE <<<

Android Physical Extraction - FAQ

i.mx USB loader A white paper by Tristan Lelong

Additional details >>> HERE <<<

FIPS Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

BlackBerry 10.3 Work and Personal Corporate

Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback -

Security Issues in Android Custom ROMs

More information >>> HERE <<<

NIST Mobile Forensics Workshop and Webcast. Mobile Device Forensics: A Z

Disk encryption... (not only) in Linux. Milan Brož

End User Devices Security Guidance: Apple OS X 10.10

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Full version is >>> HERE <<<

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes

Full version is >>> HERE <<<

Salesforce1 Mobile Security Guide

How To Get A Memory Card From A Usb To A Microsoft Card (Gsm) For Free On A Microsatellite) For A Microsd Card (Powerbook) For Your Computer Or Ipad Or Ipa (Powerstation) For

Reverse engineering hardware for software reversers: studying an encrypted external HDD

USB Portable Storage Device: Security Problem Definition Summary

"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD

That Point of Sale is a PoS

ELCE Secure Embedded Linux Product (A Success Story)

File System. /boot /system /recovery /data /cache /misc. /sdcard /sd-ext. Also Below are the for SD Card Fie System Partitions.

How to Encrypt your Windows 7 SDS Machine with Bitlocker

USB connection vulnerabilities on Android smartphones: default and vendors customizations

CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001

Introduction v. 1.02

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Analysing Android s Full Disk Encryption Feature

A Hard Pill to Swallow?

How to downgrade Samsung Galaxy Tab 2 back to original V4.1.1 Android OS

Application Development Kit for Android Installation Guide

Dashlane Security Whitepaper

Full version is >>> HERE <<<

Firmware security features in HP Compaq business notebooks

Chapter 1 Hardware and Software Introductions of pcduino

Aegis Padlock for business

Forensic analysis of iphone backups

Secure Storage. Lost Laptops

Post-Mortem Memory Analysis of Cold-Booted Android Devices

Survey of Filesystems for Embedded Linux. Presented by Gene Sally CELF

Guidance End User Devices Security Guidance: Apple OS X 10.9

Implementation and Implications of a Stealth Hard-Drive Backdoor

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Leica ScanStation P20 Remote Control via Android Device

The care and feeding of Pythons at the Redmond Zoo. (Using Micro Python and pyboard with Windows)

SecureDoc Disk Encryption Cryptographic Engine

Intro to Intel Galileo - IoT Apps GERARDO CARMONA

Installing the Operating System or Hypervisor

Bootloader with AES Encryption

Table of Contents. What is Brute Force Attack? 13 How does the diskashur protect against brute force attack? 13

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Resco Mobile CRM Security

Ensuring the security of your mobile business intelligence

More details >>> HERE <<<

DriveLock and Windows 8

SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE

Pentesting Android Mobile Application

Security and the Smartphone Revolution

Yun Shield User Manual VERSION: 1.0. Yun Shield User Manual 1 / 22.

Developing for MSI Android Devices

How to Remotely Track Any Lost Smartphone, Tablet, or PC

USB Portable Storage Device: Security Problem Definition Summary

Full Drive Encryption Security Problem Definition - Encryption Engine

Arduino Due Back. Warning: Unlike other Arduino boards, the Arduino Due board runs at 3.3V. The maximum. Overview

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Storing Encrypted Plain Text Files Using Google Android

Advanced ANDROID & ios Hands-on Exploitation

Analysis of advanced issues in mobile security in android operating system

Key & Data Storage on Mobile Devices

Super Manager User Manual. English v /06/15 Copyright by GPC

A+ Practical Applications Solution Key

Informatica forense. Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

MSc Computer Security and Forensics. Examinations for / Semester 1

Blackberry Forensics. Shafik G. Punja Cindy Murphy. SANS DFIR Summit 2014 Austin TX. June-9-14 Copyright QuByte Logic Ltd

Windows XP Login Vulnerabilities

ViPNet ThinClient 3.3. Quick Start

Cryptographic Filesystems. Background and Implementations for Linux and OpenBSD

Pentesting Mobile Applications

VMware Horizon Workspace Security Features WHITE PAPER

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Practical Methods for Dealing with Full Disk Encryption. Jesse Kornblum

Friendly ARM MINI2440 & Dalvik Virtual Machine with Android

TrustKey Tool User Manual

Analyzing the Security Schemes of Various Cloud Storage Services

Dell OpenManage Mobile Version 1.4 User s Guide (Android)

Android Security for Enterprise App Developers Jon Preedy

AD Image Encryption. Format Version 1.2

Table of Contents. Introduction to MSAB Training Department Training Services Overview XRY Certification training...

Transcription:

Into The Droid Gaining Access to Android User Data DEF CON 20

Introduction Why this talk is useful Defend access / gain access Device seizure, loss, border crossing, stop and search, espionage... The company viaforensics - Mobile security and digital forensics, strong R&D team, government agencies and corporations The speaker Thomas Cannon - Director of Breaking Things

Challenges ADB off by default Screen lock Code signing for updates and boot images Encryption Variety of device hardware, software and configuration

Bootloader Essentials How we use the bootloader Accessing bootloader mode Bootloader protocols Bootloader protection

Defeat The Bootloader S-ON vs S-OFF @secuflag controlled in radio firmware Gold Card - specially formatted MicroSD card can bypass carrier ID check when flashing ROMs White Card - special SIM card used as an authentication token to control access to diagnostic mode HTC Example

Defeat The Bootloader Emulate White Card with hardware, combine with Gold Card to enter diagnostics and clear S-ON HTC Example

Defeat The Bootloader White Card not needed for CDMA phones Once S-OFF, can RAM load a custom boot image This technique wipes most devices! But not all. Successfully used this technique to gain access to some locked stock HTC devices such as HTC Desire Try it yourself with an XTC Clip HTC Example

Forensic Boot Image Start early in the boot chain before the system loads Provide ADB root shell over USB which can be used to image the device Do not mount anything, including cache, to prevent any writes to partitions Devices with raw NAND flash and wear levelling implemented in software (YAFFS2) can be prevented from overwriting deleted data

Build Boot Image $ abootimg -x stock-recovery.img $ abootimg-unpack-initrd $ cd ramdisk (edit ramdisk contents) $ cd.. $ abootimg-pack-initrd -f $ abootimg -u stock-recovery.img -r initrd.img

RAM Disk Contents /dev /proc /sbin adbd busybox (+ symlinks) nanddump (to dump partitions) /sys init default.prop (enable root shell, ro.secure=0) init.rc (do not mount partitions, just start adbd) ueventd.rc

Flash and RAM Load Samsung Dump partitions with ODIN <= 1.52 or Heimdall. Maybe. Flashing with ODIN or Heimdall heimdall flash --recovery recovery.bin (Epic 4G) heimdall flash --kernel zimage (Galaxy S) HTC fastboot boot recovery.img (RAM Loading) fastboot flash recovery recovery.img (flash partition) Motorola sbf_flash image name.sbf (make sure it only contains recovery)

JTAG Primer How it works Flasher Box ORT RiffBox Medusa Box

Serial Debug Cable Some devices have debug access via serial cables which can be used to gain access to data On Samsung Galaxy SII / Galaxy Note this is activated by grounding ID pin of USB with a 523K ohm resistor TTL serial access provided on D+ and D- pins of USB connector Use a Bus Pirate and MicroUSB breakout board to connect Galaxy SII

Crack PIN or Password Salt /data/data/com.android.providers.settings/databases/ settings.db SELECT * FROM secure WHERE name = 'lockscreen.password_salt' PIN / password /data/system/password.key Salted SHA1 of password concatenated with salted MD5

Crack PIN or Password Calculate the value of the salt in lowercase hex with no padding $ python -c "print '%x' % 720624377925219614" a002c0dbeb8351e Copy the last 32 bytes of password.key (MD5 hash in hex), add a colon and then add the salt 5D8EC41CB1812AC0BD9CB6C4F2CD0122:a002c0dbeb8351e Crack with software such as oclhashcat-lite

HID Brute Force? Video

HID Brute Force AVR ATMEGA32U4 emulates USB keyboard typing PINs USB OTG cable for USB host Devices usually rate limit attempts and wipe after too many incorrect passcodes

Android Encryption

Android Encryption Supported since Android 3.0 Based on dm-crypt AES 128 CBC Implementations may vary, e.g. Samsung has their own key management module

Android Encryption keylen=32 Password/PIN PBKDF2 x2000 Key+IV (32 bytes) Key (128 bit) IV (128 bit) /dev/urandom Salt (128 bit) Master Key (128 bit) AES 128 CBC Encrypted Master Key (128 bit)

Android Encryption IV (ESSIV:SHA256) Master Key (128 bit) dm-crypt AES 128 CBC Encrypted userdata partition userdata partition

Cracking Encryption Encrypted Master Key + Salt stored in footer Footer stored at end of partition or in a footer file on another partition or as a partition itself Image device and locate footer + encrypted userdata partition

Cracking Encryption Parse footer Locate Salt and Encrypted Master Key Run a password guess through PBKDF2 with salt, use resulting key and IV to decrypt master key, use resulting master key to decrypt first sector of encrypted image. If password is correct, plain text will be revealed

Cracking PINs takes seconds. Passwords are usually short or follow patterns due to being the same as the lock screen password

Evil Maid Attack Load app onto system partition, wait for user to boot phone, get remote access to decrypted user data Rootkits - easy to compile for Android Evil USB charger

Reverse Shell App with no permissions can create a reverse shell, giving remote access to attacker

Desperate Techniques Hard reset - some devices prior to 3.0 did not wipe data properly. Wipe, boot, root and recover Chip-off - de-solder NAND chips Screen smudges

More Techniques! Custom update.zip - can you get one signed? Race condition on updates via SD cards - fixed Own a CA? Who doesn't these days? MITM connection, push app, update or exploit Entry via Google Play, if credentials cached on desktop

Santoku Linux Free and open bootable Linux distribution full of tools Project is a collaboration with other mobile security pros Mobile Forensics Mobile App Security Testing Mobile Malware Analysis Check out the Alpha release at https://santoku-linux.com

Thank you! Thomas Cannon @thomas_cannon github.com/thomascannon tcannon@viaforensics.com For the latest versions of our presentations visit: https://viaforensics.com/resources/presentations