19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

192<br />

Part III: Hacking Network Hosts<br />

Mobile apps can introduce a slew of security vulnerabilities into your environment,<br />

especially certain apps available for Android via Google Play that aren’t<br />

properly vetted. In recent source code analysis using Checkmarx’s<br />

CxDeveloper (see Chapter 14), I’ve found these apps to have the same flaws as<br />

traditional software, such as SQL injection, hard-coded encryption keys, and<br />

buffer overflows that can put sensitive information at risk. The threat of malware<br />

is just as great. Apps are yet another reason to get your mobile environment<br />

under control using MDM and, if resources permit, your own app store.<br />

Cracking iOS Passwords<br />

I’d venture to guess that many phone and tablet passwords (really, they’re<br />

just 4-digit PINs) can be guessed outright. A mobile device gets lost or stolen<br />

and all the person recovering it has to do is try some basic number combinations<br />

such as 1234, 1212, or 0000. Soon, voilà! — the system is unlocked.<br />

Many phones and tablets running iOS, Android, and Blackberry OS are configured<br />

to wipe the device if the incorrect password is entered X number of<br />

times (often 10 failed attempts). A reasonable security control indeed. But<br />

what else can be done? Some commercial tools can be used to crack simple<br />

passwords/PINs and recover information from lost or stolen devices or<br />

devices undergoing a forensics investigation.<br />

Elcomsoft’s iOS Forensic Toolkit (http://ios.elcomsoft.com) provides<br />

a means for demonstrating just how easily passwords/PINs on iOS-based<br />

phones and tablets can be cracked. Here’s how:<br />

1. Plug your iPhone/iPod/iPad into your test computer and place it into<br />

Device Firmware Upgrade (DFU) mode.<br />

To enter DFU mode, simply power the device off, hold down the Home<br />

button (bottom center) and sleep button (upper corner) at the same<br />

time for 10 seconds, and continue holding down the Home button for<br />

another 10 seconds. The mobile device screen goes blank.<br />

2. Load the iOS Forensic Toolkit by inserting your USB license dongle<br />

into your test computer and running Tookit.cmd.<br />

You see the screen shown in Figure 10-5.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!