when e t comes into windows mobile 6
play

When E.T. comes into Windows Mobile 6 a.k.a. PoC(k)ET Cedric - PowerPoint PPT Presentation

When E.T. comes into Windows Mobile 6 a.k.a. PoC(k)ET Cedric Halbronn Sogeti / ESEC R&D cedric(at)security-labs.org Hack.lu 2009 Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Context / Objectives 1


  1. When E.T. comes into Windows Mobile 6 a.k.a. PoC(k)ET Cedric Halbronn Sogeti / ESEC R&D cedric(at)security-labs.org Hack.lu 2009

  2. Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Context / Objectives 1 Technical aspects of WM6 2 Implementation 3 General architecture Injection Protection Backdoor Services Demo 4 C. Halbronn When E.T. comes into Windows Mobile 6 2/35

  3. Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Context Who am I? Security researcher working at Sogeti ESEC R&D lab Focusing on mobile security A smartphone? Mobile phone ✲ smartphone Various services PDA, Web, camera, GPS, microphone, etc. Current OS : Symbian, RIM OS, Windows Mobile 6, iPhone OS, Android Studies on mobile phones rootkits capabilities still limited C. Halbronn When E.T. comes into Windows Mobile 6 3/35

  4. Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Context Who am I? Security researcher working at Sogeti ESEC R&D lab Focusing on mobile security A smartphone? Mobile phone ✲ smartphone Various services PDA, Web, camera, GPS, microphone, etc. Current OS : Symbian, RIM OS, Windows Mobile 6, iPhone OS, Android Studies on mobile phones rootkits capabilities still limited C. Halbronn When E.T. comes into Windows Mobile 6 3/35

  5. Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Objectives TODO list Develop a rootkit for WM6 What is a “rootkit”? Post-exploitation Components: Injection Protection Backdoor Services Taking into account... Embedded constraints / mobile environment Services on the table C. Halbronn When E.T. comes into Windows Mobile 6 4/35

  6. Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Objectives TODO list Develop a rootkit for WM6 What is a “rootkit”? Post-exploitation Components: Injection Protection Backdoor Services Taking into account... Embedded constraints / mobile environment Services on the table C. Halbronn When E.T. comes into Windows Mobile 6 4/35

  7. Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Objectives TODO list Develop a rootkit for WM6 What is a “rootkit”? Post-exploitation Components: Injection Protection Backdoor Services Taking into account... Embedded constraints / mobile environment Services on the table C. Halbronn When E.T. comes into Windows Mobile 6 4/35

  8. Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Context / Objectives 1 Technical aspects of WM6 2 Implementation 3 General architecture Injection Protection Backdoor Services Demo 4 C. Halbronn When E.T. comes into Windows Mobile 6 5/35

  9. Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Virtual Memory Address Space Global Virtual Memory Address Space (4GB) C. Halbronn When E.T. comes into Windows Mobile 6 6/35

  10. Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Loading DLLs Loading DLLs under Windows Mobile 6 C. Halbronn When E.T. comes into Windows Mobile 6 7/35

  11. Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Security policies Where? Registry: [HKLM \ Security \ Policies \ Policies] Some examples Policy ID Description Auto Run Policy ”2” 0 (allowed to run automatically), 1 (restricted) Unsigned Applications Policy ”1006” 1 (allowed to run), 0 (not allowed to run) Unsigned Prompt Policy ”101A” 0 (user will be prompted), 1 (user will not be prompted) Password Required Policy ”1023” 0 (a password is required), any other (a password is not required) C. Halbronn When E.T. comes into Windows Mobile 6 8/35

  12. Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Security policies Where? Registry: [HKLM \ Security \ Policies \ Policies] Some examples Policy ID Description Auto Run Policy ”2” 0 (allowed to run automatically), 1 (restricted) Unsigned Applications Policy ”1006” 1 (allowed to run), 0 (not allowed to run) Unsigned Prompt Policy ”101A” 0 (user will be prompted), 1 (user will not be prompted) Password Required Policy ”1023” 0 (a password is required), any other (a password is not required) C. Halbronn When E.T. comes into Windows Mobile 6 8/35

  13. Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Application signing Stores for code execution Privileged store: privileged execution trust authorities Unprivileged store: unprivileged execution trust authorities SPC (Software Publisher Certificates) store: trust authorities for CAB installation ✲ sign DLLs, EXEs or CABs and put certificate in right store Stores for SSL chain validation, NOTHING to do with code execution MY: end-user personal certificates CA: intermediary certification authorities certificates ROOT: root (self-signed) certificates C. Halbronn When E.T. comes into Windows Mobile 6 9/35

  14. Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Application signing Stores for code execution Privileged store: privileged execution trust authorities Unprivileged store: unprivileged execution trust authorities SPC (Software Publisher Certificates) store: trust authorities for CAB installation ✲ sign DLLs, EXEs or CABs and put certificate in right store Stores for SSL chain validation, NOTHING to do with code execution MY: end-user personal certificates CA: intermediary certification authorities certificates ROOT: root (self-signed) certificates C. Halbronn When E.T. comes into Windows Mobile 6 9/35

  15. Context / Objectives General architecture Technical aspects of WM6 Injection Implementation Protection Demo Backdoor Conclusion Services Context / Objectives 1 Technical aspects of WM6 2 Implementation 3 General architecture Injection Protection Backdoor Services Demo 4 C. Halbronn When E.T. comes into Windows Mobile 6 10/35

  16. Context / Objectives General architecture Technical aspects of WM6 Injection Implementation Protection Demo Backdoor Conclusion Services Plan Context / Objectives 1 Technical aspects of WM6 2 Implementation 3 General architecture Injection Protection Backdoor Services Demo 4 C. Halbronn When E.T. comes into Windows Mobile 6 11/35

  17. Context / Objectives General architecture Technical aspects of WM6 Injection Implementation Protection Demo Backdoor Conclusion Services Technical choices Architecture Hide its presence from phone’s user Expatriate information Technical choices 32-process limit ✲ Single .EXE multi-threads DLLs impact ✲ limit their size Battery usage ✲ limit actions when needed Heterogeneous environment C. Halbronn When E.T. comes into Windows Mobile 6 12/35

  18. Context / Objectives General architecture Technical aspects of WM6 Injection Implementation Protection Demo Backdoor Conclusion Services Technical choices Architecture Hide its presence from phone’s user Expatriate information Technical choices 32-process limit ✲ Single .EXE multi-threads DLLs impact ✲ limit their size Battery usage ✲ limit actions when needed Heterogeneous environment C. Halbronn When E.T. comes into Windows Mobile 6 12/35

  19. Context / Objectives General architecture Technical aspects of WM6 Injection Implementation Protection Demo Backdoor Conclusion Services Architecture Rootkit general architecture C. Halbronn When E.T. comes into Windows Mobile 6 13/35

  20. Context / Objectives General architecture Technical aspects of WM6 Injection Implementation Protection Demo Backdoor Conclusion Services Plan Context / Objectives 1 Technical aspects of WM6 2 Implementation 3 General architecture Injection Protection Backdoor Services Demo 4 C. Halbronn When E.T. comes into Windows Mobile 6 14/35

  21. Context / Objectives General architecture Technical aspects of WM6 Injection Implementation Protection Demo Backdoor Conclusion Services Rootkit injection Injection methods Smartphone access Vulnerability exploit ✲ Ex: MMS handler in WM2003 WAP Push message Web link ✲ Ex: Etisalat operator in the United Arab Emirates (UAE) for Blackberries OTA provisioning Our context Pop-up Smartphone access Unsigned CAB ✲ Pop-up C. Halbronn When E.T. comes into Windows Mobile 6 15/35

  22. Context / Objectives General architecture Technical aspects of WM6 Injection Implementation Protection Demo Backdoor Conclusion Services Rootkit injection Injection methods Smartphone access Vulnerability exploit ✲ Ex: MMS handler in WM2003 WAP Push message Web link ✲ Ex: Etisalat operator in the United Arab Emirates (UAE) for Blackberries OTA provisioning Our context Pop-up Smartphone access Unsigned CAB ✲ Pop-up C. Halbronn When E.T. comes into Windows Mobile 6 15/35

  23. Context / Objectives General architecture Technical aspects of WM6 Injection Implementation Protection Demo Backdoor Conclusion Services Plan Context / Objectives 1 Technical aspects of WM6 2 Implementation 3 General architecture Injection Protection Backdoor Services Demo 4 C. Halbronn When E.T. comes into Windows Mobile 6 16/35

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend