The objective of the course is to provide an understanding of the fundamental risks of mobility, as well as those involving Wi-Fi and mobility infrastructure. It presents real world use cases on how devices can be compromised using industry attack tools and engages attendees in solution analysis methodology designed to protect against such vulnerabilities. Participants will learn how to significantly mitigate the risk introduced as a result of mobile devices accessing corporate data, while still preserving a seamless and productive user experience. The class involves participants through a combination of focused mobile protection labs and whiteboard sessions detailing potential solution and mitigation options.
More and more, with not only standard everyday mobile phone users but now with businesses increased reliance on these devices, organizations are quickly recognizing that mobile phones and tablets and other portable devices require greater security controls than a rubberized shock protector and complex password.
Audience
Network and system administrators supporting mobile phones and tablets, Pen testers, Ethical hackers, Auditors, Security personnel
Prerequisites
- Develop effective policies to control employee-owned (Bring Your Own Device, BYOD) and enterprise-owned mobile devices including the enforcement of effective passcode policies and permitted application.
- Utilize jailbreak tools for Apple iOS and Android systems such as redsn0w, Absinthe
- Conduct an analysis of iOS and Android filesystem data using SqliteSpy, Plist Editor, and AXMLPrinter to plunder compromised devices and extract sensitive mobile device use information such as the SMS history, browser history, GPS history, and user dictionary keywords
- Analyze Apple iOS and Android applications with reverse engineering tools including class-dump, JD-GUI, dex-translator, and apktool to identify malware and information leakage threats in mobile applications
- Conduct an automated security assessment of mobile applications using iAuditor, Cycript, Mobile Substrate, TaintDroid, and DroidBox to identify security flaws in mobile applications
- Use wireless network analysis tools to identify and exploit wireless networks, crack WEP and WPA/ WPA2 access points, bypass enterprise wireless network authentication requirements, and harvest user credentials
- Intercept and manipulate mobile device network activity using Burp to manipulate the actions taken by a user in an application and to deliver mobile device exploits to vulnerable devices
Course duration
5 days
Course outline
Section A - Lay of the Land
Module 1 Mobile Problems and Opportunities
- Challenges and opportunities for secure mobile phone deployments
- Weaknesses in mobile phones
- Exploit tools and attacks against mobile phones and tablets
Module 2 Mobile Devices and Infrastructure
- BlackBerry network and platform architecture
- iOS security features and weaknesses
- Managing iOS devices with Microsoft Exchange
- Google Play Marketplace and third-party application stores
- Windows Phone architecture and development platforms
Module 3 Mobile Device Security Models
- Privilege and access models on multiple platforms
- Device encryption support and threats
- Emerging changes in platform security from Android and Apple
Module 4 Legal Aspects of Mobile
- Privacy concerns and threats
- Mobile phones and data break reporting considerations
- Proposed legislation affecting mobile devices
Section B Management/Policy
Module 5 Policy Considerations and Development
- Steps and recommendations for establishing policies
- Mobile devices and local, cloud and offline data storage
- Device theft/loss and company culture for reporting effectiveness
Module 6 Wireless Network Infrastructure
- Designing a wireless LAN system for mobile phones
- Decision: network isolation or integration for mobile phones
- Threat of guest/open networks
Module 7 Mobile Device Management System Architecture
- Vendor options for MDM solutions
- Limitations for remote device management by mobile phone platform
- MDM network protocols and architectures
Module 8 Mobile Device Management Selection
- Critical MDM feature evaluation
- Deployment model considerations for enterprise networks
- Picking an MDM solution that fits your needs
Module 9 Back-end Application Support Attacks
- Exploiting SQL injection in mobile application frameworks
- Leveraging client side injection attacks
- Getting end-to-end control of mobile application server resources
Module 10 iScanOnline
- Scanning from the inside out
- MDM, Bricking, Remote Erase
Module 11 Mitigating Stolen Devices
- Bypassing iOS and Android passcode locks
- Decrypting iOS keychain credentials
- Accessing mobile device backup data
- Creating a lost device reporting program
- Leveraging remote device wipe strategies
Module 12 Unlocking, Rooting, Jail Breaking Mobile Devices
- BlackBerry platform restrictions
Section C Storage and Architecture
Module 13 Mobile Application Attacks
- Exploiting mobile application authentication vulnerabilities
- Manipulating mobile application network activity
- Applying web attacks to thin mobile applications
Module 14 Mobile Phone Data Storage and File System Architecture
- Data stored on mobile devices
- Mobile device file system structure introduction
Module 15 File system Application Modeling
- Data stored on mobile devices
- Application modeling goals
- Using Sleuthkit for file system runtime analysis
- Analyzing file system changes
Section D Identification-Foot Printing
Module 16 Fingerprinting Mobile Devices
Module 17 Wireless Network Probe Mapping
- Monitoring network probing activity
- Visualizing network discovery and search
- Wireless anonymity attacks
Module 18 Wireless Network Scanning and Assessment
- Exploiting weak wireless infrastructure
- Monitoring mobile device network scanning
- Exploiting "attwifi" and iPad or iPhone captive portal detection
- Secure network impersonation
Section E Communication
Module 19 Network Activity Monitoring
- Mobile application network capture and data extraction
- Transparent network Proxying
- Encrypted data capture manipulation
Module 20 Mobile Code and Application Analysis
- Reverse engineering iOS binaries in Objective-C
- Reverse engineering Android binaries in Java
- Reverse engineering Android malware
Module 21 Network Manipulation Attacks
- Leveraging man-in-the-middle tools against mobile devices
- SSL certificate manipulation and bypass attacks
- Effective SSL penetration testing techniques
Module 22 Automated Application Analysis Systems
- Runtime iOS application manipulation with Cycript
- iOS application vulnerability analysis with iAuditor
- Android application vulnerability analysis with DroidBox
Module 23 Enterprise Wireless Security Attacks
- Certificate impersonation and mobile devices
- Manipulating enterprise wireless authentication
- RADIUS server impersonation attacks
Module 24 Web Framework Attacks
- Site impersonation attacks
- Application cross-site scripting exploit
- Remote browser manipulation and control
- Data leakage detection and analysis
Module 25 Approving or Disapproving Applications within Your Organization
- Policies regarding data access
- On-going monitoring analysis requirements
- MDM management and application blacklisting