NUCIA

advertisement
BSYOD:
Bring and Secure Your Own Device
Hardening your Mobile Devices to
Participate in the Wireless World
Nebraska University Center for Information Assurance
Timeline
Part 1: NUICA, Who are we?
Part 2: Security concerns
Part 3: Some Solutions
11:15
Part 4: Audience Questions
and Suggestions
12:00
12:15
NUCIA
Nebraska University Center for Information Assurance
http://nucia.unomaha.edu/
3
The UNO NUCIA Team
Ken Dick
Robin Gandhi
Steve Nugen
Abhishek Parakh
Dwight Haworth
Leah Pietron
Connie Jones
Bill Mahoney
Charles Spence
4
Information Assurance
• IA research and education is supported across the college of
IS&T and the Graduate college
• NSA designated National Center of Academic Excellence
in Information Assurance Education (CAE IAE)
• Degrees include
• BS in IA; MS in IA (starting Fall 2012)NEW,
IA concentrations with CS and MIS
• Non-degree programs and activities include
• MIS IA certificate, International Cyber Defense Workshop
• Special programs for High School teachers and students
5
Student Accomplishment (1)
UCSB iCTF 2010: 72 teams (900 students!) from 16 countries competed in a game of
hacking, challenge-solving, and state-sponsored warfare. (26 US Universities)
Student Accomplishment (2)
Placed 7th among all US Undergraduate teams
Student Accomplishment (3)
• IFSF CTF Quals hosted
from Tunisia
• 4th among US teams
• 21st among 236 teams
Worldwide
8
State of the Art IA Labs
STEAL-1
STEAL-2
STEAL-4
7 pods; 5 hosts ea 9 pods; 5 hosts ea Virtual Machines
New SCADA
Testbed
New hosts: Quad;
16 GB; dual NICS
6 VM Servers;
4 NICS each
Each host can support multiple VMs; Networking options
include host-only; STEAL domain; and Internet (via VPN)
Able to carve out subsets to simulate different domains,
cross-domain architectures, hardened systems,
targets, and attackers. Supports teaching and research
STEAL-3
Student Research
Desktop
Workstations
Networks:
STEAL Only
(Isolated)
UNO Internet;
Private Internet
9
Wireless Security Issues
802.11 Networks
• 802.11: A family of IEEE specifications for
WLANs operating in 2.4 GHz RF spectrum
• 2.4 GHz Frequency, Unlicensed
• Divided into 14 channels
• Infrastructure mode is most commonly used
PC-1
PC-2
AP
Gateway
Internet
11
Inherent Security Issues
• Nodes in the physical vicinity of each other can
monitor all network traffic
• Open hotspots do not encrypt any traffic
between the mobile node and the access point
• Mobile applications may use insecure protocols
to exchange sensitive information
12
NIST Guidance
• Guidelines for Securing Wireless Local Area
Networks (WLANs)
• NIST SP 800-153
• http://csrc.nist.gov/publications/drafts/800-153/Draft-
SP800-153.pdf
4/8/2015
13
Worrisome Scenarios
• Capturing Wireless traffic
• Rouge Access Points
• Sniffing
• Session high jacking
• Insecure Apps
• IPhone Southwest App
• Privacy issues
• Malicious QR codes
• Wireless Encryption Cracking
• WEP and WPA attacks
14
Rouge Access Points
• Advertise open access points in public places
with similar names to legitimate ones
• E.g. attwifi, boingo, linksys, NETGEAR
PC-1
PC-2
Sniffer
AP
HUB
Gateway
Internet
15
Sniffing
• Passive monitoring of wireless traffic
• The RF monitor mode allows every frame appearing
on a channel to be copied into the scanning node
• Hardware easily available for purchase
• Wireless cards whose firmware and corresponding
driver software together permit reading of all raw
802.11 frames
• ~ $ 30
16
Sniffing
Kismac
Macbook Air
Alfa wardriving
card
17
Scanning available networks
18
Network activity
19
Selecting a target
20
Selecting a target
21
Foraging with Wireshark
22
Foraging with Wireshark
23
Foraging with Wireshark
24
Session Highjacking
http://codebutler.com/firesheep
25
Insecure Apps
• Some applications have inherent flaws that can
be exploited on public networks
• Case: Southwest Airlines iPhone App
26
Southwest Airlines iPhone App
• Use a remote network proxy to
examine HTTP traffic
27
Southwest Airlines iPhone App
• The app assigns a Device ID to uniquely
identify the device
28
Southwest Airlines iPhone App
• The
registration
data is sent out
in the clear!
29
Southwest Airlines iPhone App
• … and any
subsequent
login
information
30
Privacy violations
• Universal Device Identifiers
• iPhone UUID, ANDROID_ID
• Several application use UUID to perform some sort of
tracking
• A user does not have control over this the use of this
information by apps
• The UUID may be transmitted in the clear over
unprotected WiFi networks
31
Security and Privacy
Hall of shame
• http://blog.afewguyscoding.com/2011/12/survey-
mobile-device-security-threats-vulnerabilities-defenses/
• http://www.msnbc.msn.com/id/46856168/ns/technolog
y_and_science-security/t/cracks-appear-face-applesios-security/
32
Malicious QR Codes
• QR codes can be used to launch
malicious websites that infect or
root mobile devices
• Malicious QR codes can be
pasted on legitimate
advertisements and fliers
• Disable automatic launching of
applications upon scanning of QR
codes
33
WEP and WPA Cracking
• WEP-based passwords are very easy to crack.
• WPA/PSK is relatively easy to crack given a
short password length.
• WPS pin bruteforce also weakens WPA/WPA2
protected networks
34
WEP and WPA Cracking
• Tools:
• Aircrack-ng suite
• Kismet – wireless sniffing tool
• A wireless adapter that supports monitor
mode for wireless sniffing
• Linux operating system
• Alternative (Kismac + wireless adapter + Mac)
35
WEP and WPA Cracking
(Aircrack-ng)
36
WEP and WPA Cracking
(Kismac)
37
SOME USEFUL APPS AND
BEST PRACTICES
38
Best Practices
• Center for Internet Security (CIS) Mobile
Security Benchmarks
• iPhone 5.0.1 security benchmark
• Google Android 2.3 (Gingerbread)
• http://benchmarks.cisecurity.org/
• http://benchmarks.cisecurity.org/en-
us/?route=downloads.browse.category.benchmarks.mobile
39
Monitor Device Operation
• iOS Apps for this include
• System Status
• Functionality includes displaying the system log
• http://itunes.apple.com/us/app
/system-status-device-activity/id401457165
• SYS Activity Manager
• http://itunes.apple.com/us/app
/sys-activity-manager-plus/id440654325
40
Monitor your environment
• iOS Network/Port Scanners continued
• IT Tools
• http://itunes.apple.com/us/app
/it-tools/id324054954
• IP Network Scanner
• http://itunes.apple.com/us/app
/ip-network-scanner/id335517657
• LanScan HD
• http://itunes.apple.com/us/app
/lanscan-hd/id461551081
41
Monitor your environment
• iOS Network/Port Scanners include:
• Scanny
• http://itunes.apple.com/us/app
/scany-network-port-scanner/id328077901
• iNetPro
• http://itunes.apple.com/us/app
/inet-pro-network-scanner/id305242949
• Deep Whois
• http://itunes.apple.com/us/app
/deep-whois-lookup-ips-domains/id328895000
42
Screen Locks
• Physical security is important for mobile devices
• Store large amounts of personal data
• Easier to steal
• Easier to misplace
• Maximize security by:
• Set up passcodes for device access
• Auto-locking feature
• Automatic data erasure after failed attempts
43
Screen Locks
• Be careful with pattern locks.
• Sometimes the pattern lock path
is shown on the screen as it is
used (depends upon the device).
• Your pattern may be left behind
by smudge marks.
• Consider if someone might be
watching your screen.
44
Hardware Encryption
• iPhone Support
• iPhone 3GS and later
• Data protection enhances the built-in
hardware encryption by protecting
the hardware encryption keys with
your passcode
• Third-party applications can use the
data protection APIs
45
Hardware Encryption
• Android Support
• Android 2.3 (Gingerbread)
• All Motorola Devices
• Some HTC Devices
• Android 3.0+
• All Honeycomb Devices
• All Ice Cream Sandwich Devices
46
Hardware Encryption
• Screen locks provide a
good start, but do not
encrypt the SD card or
phone data.
• Android provides
additional settings
• But, built-in encryption
module have often been
rendered useless
47
Hardware Encryption
• iPhone
• 3GS, Encryption declared ‘useless’ by hackers, 2009
• http://www.wired.com/gadgetlab/2009/07/iphoneencryption
• iOS 4, Encryption broken by ElcomSoft, 2011
• http://www.extremetech.com/mobile/84150-how-ios-4encryption-was-cracked-and-how-to-protect-your-iphone
• Alternative encryption methods may be
available through apps
48
Hardware Encryption
• iPhone
• Also remember to encrypt device backups
• Examples
• Device location tracking
• http://www.geek.com/articles/apple/how-to-deal-withyour-iphone-tracking-you-20110420/
• Facebook login data
• http://www.cultofmac.com/159169/facebook-iossecurity-flaw-highlights-security-risk-in-ios-backups/
• User enabled, or enforced through configuration profiles
49
Virtual Private Networks
• VPNs build an encrypted tunnel from a mobile
device to a trusted endpoint
• Prevents eavesdropping on untrusted networks
• iPhone, iPad and Android support the following
• Cisco IPSec, L2TP/IPSec PSK, and
PPTP virtual private network protocols.
• Android additionally supports L2TP/IPsec CRT
50
Native VPN support
51
3rd Party SSL-VPN
52
Jailbreaking/Rooting
• Pros of a Locked Device
• For most users, obtaining root access to a mobile
device is an unnecessary risk.
• Prevent unauthorized apps installations and
changes.
• The device stays configured the way the
manufacturer intended.
53
Jailbreaking/Rooting
• Cons of a Locked Device
• Manufacturers are not quick to update software.
• Security vulnerabilities may stay unpatched
• The manufacturer may not have secured the
device to meet enterprise-level standards.
• No firewall protection or native VPN solutions.
54
Jailbreaking/Rooting
• Pros of a Unlocked Device
• The device can potentially be flashed with a
more secure ROM/configuration.
• The kernel for Android can be recompiled to
support:
• Firewalls for both IPv4 and IPv6
• IPSEC VPN connections
55
Jailbreaking/Rooting
• Cons of a Unlocked Device
• The user can “brick” the device during configuration
if not careful.
• Root access is easier to leverage for malicious
parties in addition to the user.
• The user must be even more vigilant when
deciding what apps to install.
56
Rooted Android Precautions
• If the device merely needs a configuration
change, temporary rooting may be the best.
• This continues to block unauthorized root access
attempts as designed after configuration.
• This eliminates future user error after
configuration.
57
Rooted Android Precautions
• The Android hacking
community always
suggests the use of a root
access manager.
• It requires approval by the
user for all root access
requests.
• This potentially puts up one
last line of defense.
58
Mobile Device Management
• Security concerns include
• Preventing unauthorized use of the device
• Protecting data while at rest in the device (or in
backups or the cloud) and in-transit
• Security of the applications (e.g., leaking information or
not complying with security settings)
• Mobile devices could
be the weakest link in
information protection
59
Mobile Device Management
• iOS devices can be configured/managed through
• Local settings on the device
• Apple Configuration Utility
• Microsoft Exchange ActiveSync
• Mobile Device Management -- platorm independent
60
Mobile Device Management
• Recommended reading includes
• CIS iOS benchmark
• Apple guidance
• iPhone and iPad in Business Deployment Scenarios
• http://images.apple.com/ipad/business/docs/iOS_Busin
ess.pdf
• iPad in Business: Security Overview
• http://images.apple.com/ipad/business/pdf/iPad_Securit
y_Overview.pdf
• iPhone Enterprise Deployment Guide
• http://manuals.info.apple.com/en_US/Enterprise_Deplo
yment_Guide.pdf
61
Mobile Device Management
• Recommended reading continued
• Apple Configuration Utility (aka Apple Configurator)
• http://www.wired.com/wiredenterprise/2012/03/appleconfigurator/
• http://krypted.com/iphone/managing-ios-devices-with-appleconfigurator/
• http://itunes.apple.com/us/app/appleconfigurator/id434433123
62
Mobile Device Management
• Recommended reading continued
• Mobile Device Management (MDM)
• http://en.wikipedia.org/wiki/Mobile_device_management
• http://www.apple.com/ipad/business/integration/mdm/
• http://images.apple.com/ipad/business/docs/iOS_MDM.
pdf
• http://www.computerworld.com/s/article/9224894/Tips_for_d
eveloping_a_mobile_device_management_strategy
63
DISCUSSIONS
64
Download