Introducing: SIRA Semi-automated ios Rapid Assessment. Justin Engler Seth Law Joshua Dubik David Vo

Similar documents
Automation in ios Application Assessments

ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications

Mobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall

SSOScan: Automated Testing of Web Applications for Single Sign-On vulnerabilities

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.

Firewall Testing Methodology W H I T E P A P E R

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

Independent Security. Prepared for:

Security Testing Guidelines for mobile Apps

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Web Application Security Considerations

Penetration Testing for iphone Applications Part 1

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Kaspersky Lab Mobile Device Management Deployment Guide

UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION. Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Mobile App Security. Using Threat Modeling to Review Mobile Devices and Apps. Copyright 2012 KRvW Associates, LLC

How to Grow and Transform your Security Program into the Cloud

Adobe Systems Software Ireland Ltd

Application Security Testing

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Internet Banking System Web Application Penetration Test Report

Application Security in the Software Development Lifecycle

BYPASSING THE ios GATEKEEPER

ios Security The Never-Ending Story of Malicious Profiles Adi Sharabani Yair Amit CEO & Co-Founder Skycure CTO & Co-Founder

UNITED STATES OF AMERICA FEDERAL TRADE COMMISSION

DMZ Gateways: Secret Weapons for Data Security

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Enterprise Mobile Threat Report

Enterprise Application Security Workshop Series

Enterprise Mobility Report 10/2014. Creation date: Vlastimil Turzík, Edward Plch

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

Web Application Security

White Paper. Three Steps To Mitigate Mobile Security Risks

Successful Strategies for QA- Based Security Testing

Tutorial 2. May 11, 2015

That Point of Sale is a PoS

Analyzing HTTP/HTTPS Traffic Logs

Application Security Testing. Generic Test Strategy

Application security testing: Protecting your application and data

When enterprise mobility strategies are discussed, security is usually one of the first topics

SIEM is only as good as the data it consumes

Enterprise Security with mobilecho

Mobile Checklist: Preparing for Building an Enterprise App

Harvesting Developer Credentials in Android Apps

spirent Test the security, performance and scalability of your app-aware infrastructure

Information Security Services

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Enterprise Apps: Bypassing the Gatekeeper

Securing the Database Stack

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

How To Teach A Cyber Security Course

Cloud Security:Threats & Mitgations

Mobile Applications: The True Potential Risks Where to look for information when performing a Pentest on a Mobile Application

AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

z/os Security - FTP Logon Failures

Penetration Testing. Security Testing

Penta Security 3rd Generation Web Application Firewall No Signature Required.

1 0 0 V i l l a g e C o u r t H a z l e t, N J , U S A Tel: +1 (732) w w w. p a l i n d r o m e t e c h. c o m.

Ashley Jelleyman FBCS CITP M Inst. ISP Head of Information Assurance. Privacy vs Security. You Can t Have Both At the same time

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

How Attackers are Targeting Your Mobile Devices. Wade Williamson

BYOD Guidance: BlackBerry Secure Work Space

Feature List for Kaspersky Security for Mobile

Computer Networks. Secure Systems

IBM Cognos Mobile Overview

Mobility, Security Concerns, and Avoidance

Unified Threat Management, Managed Security, and the Cloud Services Model

How To Protect Your Mobile Device From Attack

Introduction to Dropbox. Jim Miller, LCITO Office Mobile

Rational AppScan & Ounce Products

Building A Secure Microsoft Exchange Continuity Appliance

DISA's Application Security and Development STIG: How OWASP Can Help You. AppSec DC November 12, The OWASP Foundation

Mobile Operating System Wars Android vs. ios

Preparing for GO!Enterprise MDM On-Demand Service

Developing for the App Store. (Legacy)

Mobile Device Management Solution Hexnode MDM

Kaspersky Security for Mobile

The Savage Curtain: Mobile SSL Failures

Secure cloud access system using JAR ABSTRACT:

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Phone: Fax: Box: 230

Endpoint Threat Detection without the Pain

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

Security and Usability

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

1. LAB SNIFFING LAB ID: 10

A Model-based Methodology for Developing Secure VoIP Systems

VPN Lesson 2: VPN Implementation. Summary

Symantec Mobile Management Suite

Transcription:

Introducing: SIRA Semi-automated ios Rapid Assessment Justin Engler Seth Law Joshua Dubik David Vo

THE NEED FOR TESTING IOS APPS US ios App Store Over 680,000 applications 1,121 new apps PER DAY Average ios device: 108 apps installed How secure are those apps? Are they all protecting your privacy?

THE NEED FOR AUTOMATION IN TESTING Apple s testing insufficient Privacy - Contact Lists Many popular apps were found to be accessing contact lists In many cases, contacts were sent back to a remote server, in some cases without encryption New versions of ios will require a user confirmation

THE NEED FOR AUTOMATION IN TESTING Privacy - Location tracking issues Apps were found to be tracing user location without any confirmation Security Testing Compliance to Apple's policies vs Actual Security?

THE NEED FOR AUTOMATION IN TESTING Technical knowledge required Average ios users cannot adequately test apps themselves Need to know: Network traffic analysis ios file system Application reverse engineering (specific to ios) Cryptographic attacks Jailbreaking ios app development Web Application Security

THE NEED FOR AUTOMATION IN TESTING Even a technically skilled user is unlikely to have a solid understanding of all of the above (present company excepted) Time investment is high Every app requires a bespoke, manual analysis (1,121 PER DAY) Currently available automation is not sufficient Blacklist AV -type applications? Can protect against actively malicious apps, but not against apps with unintentional security holes

THE NEED FOR AUTOMATION IN TESTING Some tools help Proxies Specific-issue finders Tool to find apps that use the contact list Some of these are helpful, but a manual assessment still takes too long

THE NEED FOR AUTOMATION IN TESTING Full automation is not sufficient App interfaces are unpredictable Custom apps require custom testing Some vulnerability types require a human Machines can t read intent (yet) Authorization issues Special encodings or encryption might not be transparent to a tool. A human tester might intuitively discover these issues

THE NEED FOR AUTOMATION IN TESTING Manual tester + Automation Tools = True security of an application

SIRA FEATURES Install Applications Record Application Activity Automatically Drive applications Single app at a time, certain apps already implemented. Most apps require credentials before accessing functionality Sign Up/Sign in before credentials are used Sent/Stored in Plaintext

SIRA FEATURES Drive application (cont d) Find application controls (buttons, fields, etc.) and give them feasible values Fuzz!

SIRA FEATUREs Search for issues Issues in the file system Cleartext credentials, etc. Issues in network traffic Lack of SSL Privacy issues Contacts are accessed Correlate Enter a known test contact into ios contacts, watch for it to be accessed, watch for it to be sent to the server, watch for cleartext data

SIRA FEATURES Manual Analysis Support Allow manual intervention at any step Automatic app driving to register an account doesn t work? Manually run the app while all of the recording functionality is running Display all automatic findings and confidence levels Display raw data to allow analyst to easily find more issues

SURVEY OF APPLICATIONS

SURVEY OF APPLICATIONS (CONT D) For the X applications tested, we noted several trends Session ID storage Credential storage

TOWARDS THE FUTURE To the crowd! Testing still takes too long Let users upload their test results? Allow non-technical, non-jailbroken users to view security and privacy ratings for an app before install

TOWARDS THE FUTURe Are there any app developers who care about security? How about a model where a developer can fund a semi-automated assessment? The newly revised rating gets shown on the ratings site along with a special marker showing that the rating was manually validated?

Q&A