appsec2013 presentation

23
Hacking Web File Servers for iOS Bruno Gonçalves de Oliveira Senior Security Consultant – Trustwave’s SpiderLabs

Upload: drewz-lin

Post on 14-May-2015

852 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Appsec2013 presentation

Hacking Web File Servers for iOS

Bruno Gonçalves de Oliveira

Senior Security Consultant – Trustwave’s SpiderLabs

Page 2: Appsec2013 presentation

About Me

#whoami• Bruno Gonçalves de Oliveira• Senior Security Consultant @ Trustwave’s SpiderLabs

• MSc Candidate• Computer Engineer• Offensive Security• Talks:

Silver Bullet, THOTCON, SOURCE Boston, Black Hat DC, SOURCE Barcelona, DEF CON, Hack In The Box Malaysia, Toorcon, YSTS e H2HC.

Hosted by OWASP & the NYC Chapter

Page 3: Appsec2013 presentation

INTRO• Smartphones

– A LOT OF information– iPhone is VERY popular

• Mobile Applications– (MOST) Poorly designed

• Old fashion vulnerabilities

Hosted by OWASP & the NYC Chapter

Page 4: Appsec2013 presentation

What are those apps?

• Designed to provide a storage system to iOS devices.

• Data can be transferred utilizing bluetooth, iTunes and FTP.

• Easiest way: HTTP protocol.

• They are very popular.

Page 5: Appsec2013 presentation

Examples

Page 6: Appsec2013 presentation

Features

• Manage/Storage files

• Create Albums, etc.

• Share Data

Page 7: Appsec2013 presentation

VULNERABILITIES

Page 8: Appsec2013 presentation

• No encryption (SSL):

Page 9: Appsec2013 presentation

• No authentication (by default):

Page 10: Appsec2013 presentation

• (Reflected) XSS

Page 11: Appsec2013 presentation

• (Persistent) XSS

Page 12: Appsec2013 presentation

• (Persistent) XSS

http://www.vulnerability-lab.com/get_content.php?id=932

Page 13: Appsec2013 presentation

• Vulnerability-Lab Advisories:http://www.vulnerability-lab.com/show.php?cat=mobile

Page 14: Appsec2013 presentation

Disclaimer

• Trustwave (me) did this research on March/13 and just now we are disclosing these advisories.

Page 15: Appsec2013 presentation

• Path Traversal

• WiFi HD Free Path Traversal (CVE-2013-3923)• FTPDrive Path Traversal (CVE-2013-3922)• Easy File Manager Path Traversal (CVE-2013-

3921)

You probably want to test the app that you use.

Page 16: Appsec2013 presentation

• Path Traversal (DEMO)

Page 17: Appsec2013 presentation

• Easy File Manager

• Unauthorized Access to File System (CVE-2013-3960)

Page 18: Appsec2013 presentation

• Unauthorized Access to File System (CVE-2013-3960)

Page 19: Appsec2013 presentation

• Getting worst with a jailbroken device.

Page 20: Appsec2013 presentation

• Remote Command Execution: Unauthorized Access to File System (CVE-2013-3960) – Jailbroken Device

Page 21: Appsec2013 presentation

• iOS 7 Security Improvement

Page 22: Appsec2013 presentation

How to find vulnerable systems

<= mDNS Watch for iOS

mDNS Queries

Page 23: Appsec2013 presentation

• Conclusions

• Mobile Apps (already) are the future.• Mobile Apps designers still don’t care too

much about security.• Too many apps, we have to take care.• Old fashion vulnerabilities still rock.