150 likes | 169 Views
This lab delves into iPhone security, exposing vulnerabilities like buffer overflow, default user settings, and root access, suggesting precautions and defenses for enhanced protection. Explore system exploits and potential defenses in the ever-evolving mobile device landscape.
E N D
Hacking The iPhone Group 17 Shelby Allen Richard Denney
Outline • Introduction • Lab goals • Procedure • Results • Conclusions • Defenses • References
Introduction • Proliferation of mobile devices • Popularity of iPhone • Soon-to-be released SDK
Lab Goals • Show that the iPhone, and by extension all future mobile devices, are locked away computers and so they should be given the same security precautions as a computer.
Procedure • Buffer overflow • Copy and edit disk image • Install SSH • Copy files
Results • Installer • Community sources • Easy install • Easy update
Results • MobileFinder • Explore file system • Fully functional
Results • MobileFinder • Explore file system • Fully functional
Results • Term-vt100 • Terminal that won’t go away • Partial functionality • expandable
Results • Sysinfo • Task Manager equiv. • Can kill processes • All processes ran as root
Conclusions • A computer in a mobile device’s body • The default user is the only user – root • Serious vulnerabilities • Default user name and password • All programs ran as root • A vulnerability in any program compromises the entire system • Buffer overflow
Defenses • Change user name and password • Download newest firmware • Same practices as a computer • Lobby for better security
Lab Structure • Student will: • Jailbreak iPod Touch • Load custom applications • Explore architecture • Evaluate device security
References • For more information on iPod/iPhone hacking, visit: • Instruction guide to hacking iPod Touch • http://forums.macrumors.com/showthread.php?p=4308881&nojs=1 • Installer.app Homepage • http://iphone.nullriver.com/beta/ • Ipod Touch hacking wiki • http://www.touchdev.net/wiki/Main_Page • Iphone security evaluation by consulting firm • http://www.securityevaluators.com/iphone/