mobile encryption: the good, the bad and the broken€¦ · mobile encryption: the good, the bad...
TRANSCRIPT
![Page 1: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/1.jpg)
Session ID:
Session Classification:
MBS-R33B
Intermediate
MOBILE ENCRYPTION:THE GOOD, THE BADAND THE BROKEN
viaForensicsAndrew Hoog
![Page 2: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/2.jpg)
Do you email sensitive documents encrypted, then include the password in your email?
![Page 3: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/3.jpg)
▶ Presenter Logo
Five types of mobile encryption► Secure Socket Layers (SSL)► Disk Encryption► Keychain► App encryption► Containers
![Page 4: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/4.jpg)
▶ Presenter Logo
Real world examples► Examples taken from real mobile apps► 42+ Best Practices for Secure Mobile Development
with detailed recommendations
![Page 5: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/5.jpg)
The Good
![Page 6: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/6.jpg)
▶ Presenter Logo
Encryption - Math Works!► The math behind encryption is sound► Effective in protecting sensitive data► But:
► Must be implemented properly► Must be used properly
![Page 7: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/7.jpg)
The BadAndThe Broken
![Page 8: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/8.jpg)
▶ Presenter Logo
SSL Implementation► SSL certificates are improperly validated, allow MITM► Servers accept weak algorithms or key lengths► Compromised Certificate Authorities► Best practices
► Fully validate SSL certifications► Ensure weak algorithms or key lengths removed from
server configuration► Consider PKI to encrypt traffic inside tunnel
![Page 9: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/9.jpg)
▶ Presenter Logo
SSL Proxying ► Attacker installs Root CA on their device► Full Proxy SSL traffic► Allows
► Inspection of all traffic in tunnel► Can find exploitable weaknesses in communication with
back-end server► We have recovered administrator username and password
for credit card processing service ► Best Practice
► Don’t send sensitive back-end data over tunnel
![Page 10: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/10.jpg)
▶ Presenter Logo
Android Encryption
![Page 11: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/11.jpg)
▶ Presenter Logo
Android Encryption► Encrypted Master Key
+ Salt stored in footer► Footer stored at end
of partition, in a footer file on another partition or as a partition itself
► Image device and locate footer + encrypted user data
![Page 12: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/12.jpg)
▶ Presenter Logo
Android Encryption - Cracked► Parse footer► Locate Salt and
Encrypted Master Key► Run password guess
though PBKDF2 with salt, use results key and IV to decrypt master key, use result to decrypt user data
► If password is correct, will reveal plain text
![Page 13: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/13.jpg)
▶ Presenter Logo
iOS Encryption - Overview► Hardware based key► Optional User Passcode► Can brute force crack through iOS6
http://images.apple.com/ipad/business/docs/iOS_Security_May12.pdf
![Page 14: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/14.jpg)
▶ Presenter Logo
Device encryption solutions► Cannot rely on OS provided device encryption► Strong crypto but weaknesses in implementation► Avoid storing sensitive data on device► Best practice if data must be stored (ask why first):
► Additional layered encryption► Ideal: enforce strong, app specific passcode
![Page 15: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/15.jpg)
▶ Presenter Logo
iOS Keychain► Can brute force crack through iOS6 on jailbroken
devices► F/OSS Keychain viewers available► Best practice
► Do not store password in keychain► Avoid keychain for other sensitive data
![Page 16: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/16.jpg)
▶ Presenter Logo
Encryption keys in RAM► Encryption keys can be recovered from RAM► If static key, it will decrypt app data from any phone► Best Practices
► Nullify variables holding encryption key after use
![Page 17: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/17.jpg)
▶ Presenter Logo
App and container encryption► Apps can implement on-disk encryption to protect
data► Layered encryption can enhance device encryption► Can enforce strong passcodes► Mature, tested libraries exist
![Page 18: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/18.jpg)
▶ Presenter Logo
Common app encryption #fails► Encryption keys hard-coded in app► Debug statements that print encryption keys► Improper implementation of encryption► No encryption time-out
![Page 19: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/19.jpg)
▶ Presenter Logo
Common app encryption #fails► Keys or passcode recoverable in RAM► Allowing weak passwords► Not using key derivation algorithm (PBKDF2)► Developed their own encryption algorithms (no!)
![Page 20: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/20.jpg)
▶ Presenter Logo
Recommendations► Education is key► Audit your apps► Follow best practices (all 42+)
![Page 21: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,](https://reader034.vdocument.in/reader034/viewer/2022052518/5f0cb8b77e708231d436ce95/html5/thumbnails/21.jpg)
Questions Please!
@viaforensics
312-878-1100