mobile encryption: the good, the bad and the broken€¦ · mobile encryption: the good, the bad...

21
Session ID: Session Classification: MBS-R33B Intermediate MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog

Upload: others

Post on 24-Jun-2020

12 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

Session ID:

Session Classification:

MBS-R33B

Intermediate

MOBILE ENCRYPTION:THE GOOD, THE BADAND THE BROKEN

viaForensicsAndrew Hoog

Page 2: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

Do you email sensitive documents encrypted, then include the password in your email?

Page 3: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

Five types of mobile encryption► Secure Socket Layers (SSL)► Disk Encryption► Keychain► App encryption► Containers

Page 4: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

Real world examples► Examples taken from real mobile apps► 42+ Best Practices for Secure Mobile Development

with detailed recommendations

Page 5: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

The Good

Page 6: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

Encryption - Math Works!► The math behind encryption is sound► Effective in protecting sensitive data► But:

► Must be implemented properly► Must be used properly

Page 7: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

The BadAndThe Broken

Page 8: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

SSL Implementation► SSL certificates are improperly validated, allow MITM► Servers accept weak algorithms or key lengths► Compromised Certificate Authorities► Best practices

► Fully validate SSL certifications► Ensure weak algorithms or key lengths removed from

server configuration► Consider PKI to encrypt traffic inside tunnel

Page 9: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

SSL Proxying ► Attacker installs Root CA on their device► Full Proxy SSL traffic► Allows

► Inspection of all traffic in tunnel► Can find exploitable weaknesses in communication with

back-end server► We have recovered administrator username and password

for credit card processing service ► Best Practice

► Don’t send sensitive back-end data over tunnel

Page 10: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

Android Encryption

Page 11: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

Android Encryption► Encrypted Master Key

+ Salt stored in footer► Footer stored at end

of partition, in a footer file on another partition or as a partition itself

► Image device and locate footer + encrypted user data

Page 12: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

Android Encryption - Cracked► Parse footer► Locate Salt and

Encrypted Master Key► Run password guess

though PBKDF2 with salt, use results key and IV to decrypt master key, use result to decrypt user data

► If password is correct, will reveal plain text

Page 13: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

iOS Encryption - Overview► Hardware based key► Optional User Passcode► Can brute force crack through iOS6

http://images.apple.com/ipad/business/docs/iOS_Security_May12.pdf

Page 14: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

Device encryption solutions► Cannot rely on OS provided device encryption► Strong crypto but weaknesses in implementation► Avoid storing sensitive data on device► Best practice if data must be stored (ask why first):

► Additional layered encryption► Ideal: enforce strong, app specific passcode

Page 15: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

iOS Keychain► Can brute force crack through iOS6 on jailbroken

devices► F/OSS Keychain viewers available► Best practice

► Do not store password in keychain► Avoid keychain for other sensitive data

Page 16: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

Encryption keys in RAM► Encryption keys can be recovered from RAM► If static key, it will decrypt app data from any phone► Best Practices

► Nullify variables holding encryption key after use

Page 17: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

App and container encryption► Apps can implement on-disk encryption to protect

data► Layered encryption can enhance device encryption► Can enforce strong passcodes► Mature, tested libraries exist

Page 18: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

Common app encryption #fails► Encryption keys hard-coded in app► Debug statements that print encryption keys► Improper implementation of encryption► No encryption time-out

Page 19: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

Common app encryption #fails► Keys or passcode recoverable in RAM► Allowing weak passwords► Not using key derivation algorithm (PBKDF2)► Developed their own encryption algorithms (no!)

Page 20: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

▶ Presenter Logo

Recommendations► Education is key► Audit your apps► Follow best practices (all 42+)

Page 21: MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN€¦ · MOBILE ENCRYPTION: THE GOOD, THE BAD AND THE BROKEN viaForensics Andrew Hoog. Do you email sensitive documents encrypted,

Questions Please!

@viaforensics

312-878-1100

[email protected]