When E.T. comes into Windows Mobile 6
a.k.a. PoC(k)ET
Cedric Halbronn
Sogeti / ESEC R&D cedric(at)security-labs.org Hack.lu 2009
When E.T. comes into Windows Mobile 6 a.k.a. PoC(k)ET Cedric - - PowerPoint PPT Presentation
When E.T. comes into Windows Mobile 6 a.k.a. PoC(k)ET Cedric Halbronn Sogeti / ESEC R&D cedric(at)security-labs.org Hack.lu 2009 Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion Context / Objectives 1
Sogeti / ESEC R&D cedric(at)security-labs.org Hack.lu 2009
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
1
2
3
4
When E.T. comes into Windows Mobile 6 2/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
PDA, Web, camera, GPS, microphone, etc.
Symbian, RIM OS, Windows Mobile 6, iPhone OS, Android
When E.T. comes into Windows Mobile 6 3/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
PDA, Web, camera, GPS, microphone, etc.
Symbian, RIM OS, Windows Mobile 6, iPhone OS, Android
When E.T. comes into Windows Mobile 6 3/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
Injection Protection Backdoor Services
When E.T. comes into Windows Mobile 6 4/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
Injection Protection Backdoor Services
When E.T. comes into Windows Mobile 6 4/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
Injection Protection Backdoor Services
When E.T. comes into Windows Mobile 6 4/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
1
2
3
4
When E.T. comes into Windows Mobile 6 5/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
Global Virtual Memory Address Space (4GB)
When E.T. comes into Windows Mobile 6 6/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
Loading DLLs under Windows Mobile 6
When E.T. comes into Windows Mobile 6 7/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
Policy ID Description Auto Run Policy ”2” 0 (allowed to run automatically), 1 (restricted) Unsigned Applications Policy ”1006” 1 (allowed to run), 0 (not allowed to run) Unsigned Prompt Policy ”101A” 0 (user will be prompted), 1 (user will not be prompted) Password Required Policy ”1023” 0 (a password is required), any other (a password is not required)
When E.T. comes into Windows Mobile 6 8/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
Policy ID Description Auto Run Policy ”2” 0 (allowed to run automatically), 1 (restricted) Unsigned Applications Policy ”1006” 1 (allowed to run), 0 (not allowed to run) Unsigned Prompt Policy ”101A” 0 (user will be prompted), 1 (user will not be prompted) Password Required Policy ”1023” 0 (a password is required), any other (a password is not required)
When E.T. comes into Windows Mobile 6 8/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
✲ sign DLLs, EXEs or CABs and put certificate in right store
When E.T. comes into Windows Mobile 6 9/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
✲ sign DLLs, EXEs or CABs and put certificate in right store
When E.T. comes into Windows Mobile 6 9/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
1
2
3
4
When E.T. comes into Windows Mobile 6 10/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
1
2
3
4
When E.T. comes into Windows Mobile 6 11/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
When E.T. comes into Windows Mobile 6 12/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
When E.T. comes into Windows Mobile 6 12/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
Rootkit general architecture
When E.T. comes into Windows Mobile 6 13/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
1
2
3
4
When E.T. comes into Windows Mobile 6 14/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
✲ Ex: MMS handler in WM2003
Web link ✲ Ex: Etisalat operator in the United Arab Emirates (UAE) for Blackberries OTA provisioning
Pop-up
When E.T. comes into Windows Mobile 6 15/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
✲ Ex: MMS handler in WM2003
Web link ✲ Ex: Etisalat operator in the United Arab Emirates (UAE) for Blackberries OTA provisioning
Pop-up
When E.T. comes into Windows Mobile 6 15/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
1
2
3
4
When E.T. comes into Windows Mobile 6 16/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
✲ DLL loaded by Services.exe
When E.T. comes into Windows Mobile 6 17/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
✲ DLL loaded by Services.exe
When E.T. comes into Windows Mobile 6 17/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
When E.T. comes into Windows Mobile 6 18/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
When E.T. comes into Windows Mobile 6 18/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
When E.T. comes into Windows Mobile 6 18/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
Visible certificate stores
When E.T. comes into Windows Mobile 6 19/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
Visible certificate stores
When E.T. comes into Windows Mobile 6 19/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
Visible certificate stores
When E.T. comes into Windows Mobile 6 19/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
WM6 TaskManager TaskManagerCE by K. Varma (c)
When E.T. comes into Windows Mobile 6 20/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
Browses this table Verifies a condition on the process name to consider the slot used Putting the name to NULL ✲ it is NOT listed
When E.T. comes into Windows Mobile 6 21/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
Browses this table Verifies a condition on the process name to consider the slot used Putting the name to NULL ✲ it is NOT listed
When E.T. comes into Windows Mobile 6 21/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
When E.T. comes into Windows Mobile 6 22/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
When E.T. comes into Windows Mobile 6 22/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
When E.T. comes into Windows Mobile 6 22/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
Add/Remove Programs
When E.T. comes into Windows Mobile 6 23/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
Add/Remove Programs
When E.T. comes into Windows Mobile 6 23/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
Airscanner Mobile Firewall (c)
When E.T. comes into Windows Mobile 6 24/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
NoUninstall option
When E.T. comes into Windows Mobile 6 25/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
NoUninstall option
When E.T. comes into Windows Mobile 6 25/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
1
2
3
4
When E.T. comes into Windows Mobile 6 26/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
✲ A TCP/IP server on the attacker’s side
Communication Manager
When E.T. comes into Windows Mobile 6 27/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
✲ A TCP/IP server on the attacker’s side
Communication Manager
When E.T. comes into Windows Mobile 6 27/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
✲ A TCP/IP server on the attacker’s side
Communication Manager
When E.T. comes into Windows Mobile 6 27/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
✲ Necessary to find an alternative means of communication
Standard COM registration HKEY CLASSES ROOT\CLSID\<clsid>\InProcServer32 @=”SMSIntercept.dll” MAPI Inbox HKEY LOCAL MACHINE\Software\Microsoft\Inbox\Svc\SMS\Rules <clsid>=dword:1 <clsid> represents the COM object’s class ID GUID.
Registry keys defined to intercept SMS messages
When E.T. comes into Windows Mobile 6 28/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
✲ Necessary to find an alternative means of communication
Standard COM registration HKEY CLASSES ROOT\CLSID\<clsid>\InProcServer32 @=”SMSIntercept.dll” MAPI Inbox HKEY LOCAL MACHINE\Software\Microsoft\Inbox\Svc\SMS\Rules <clsid>=dword:1 <clsid> represents the COM object’s class ID GUID.
Registry keys defined to intercept SMS messages
When E.T. comes into Windows Mobile 6 28/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
✲ Necessary to find an alternative means of communication
Standard COM registration HKEY CLASSES ROOT\CLSID\<clsid>\InProcServer32 @=”SMSIntercept.dll” MAPI Inbox HKEY LOCAL MACHINE\Software\Microsoft\Inbox\Svc\SMS\Rules <clsid>=dword:1 <clsid> represents the COM object’s class ID GUID.
Registry keys defined to intercept SMS messages
When E.T. comes into Windows Mobile 6 28/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
✲ Necessary to find an alternative means of communication
Standard COM registration HKEY CLASSES ROOT\CLSID\<clsid>\InProcServer32 @=”SMSIntercept.dll” MAPI Inbox HKEY LOCAL MACHINE\Software\Microsoft\Inbox\Svc\SMS\Rules <clsid>=dword:1 <clsid> represents the COM object’s class ID GUID.
Registry keys defined to intercept SMS messages
When E.T. comes into Windows Mobile 6 28/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
Communication protocol
When E.T. comes into Windows Mobile 6 29/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
1
2
3
4
When E.T. comes into Windows Mobile 6 30/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion General architecture Injection Protection Backdoor Services
Registers to the OS Notification when data are available
When E.T. comes into Windows Mobile 6 31/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
1
2
3
4
When E.T. comes into Windows Mobile 6 32/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
When E.T. comes into Windows Mobile 6 33/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
Airscanner Antivirus
When E.T. comes into Windows Mobile 6 34/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
Airscanner Antivirus
When E.T. comes into Windows Mobile 6 34/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
Airscanner Antivirus
When E.T. comes into Windows Mobile 6 34/35
Context / Objectives Technical aspects of WM6 Implementation Demo Conclusion
When E.T. comes into Windows Mobile 6 35/35