Tag Archives: hacking

El nuevo IOS11 de Apple


Después del lanzamiento de la versión en pruebas el pasado mes de julio, la versión definitiva de iOS 11 estará disponible a partir de hoy mismo. Apple no acostumbra a fijar una hora exacta, pero si sigue el patrón habitual aparecerá una notificación en los dispositivos de los usuarios a partir de las 10 de la mañana en Cupertino y sobre las 19 horas en España.

¿Qué novedades presenta iOS 11?

Son numerosas y diversas, algunas exclusivas para el iPhone X y otras disponibles también para el resto de dispositivos. De algunas ya pudimos ver una pequeña muestra la semana pasada en la presentación de los nuevos terminales, como el Face ID, los animojis o la realidad aumentada en el modelo más caro. Otras, en cambio, deberemos esperarnos hasta tener el nuevo software para disfrutar de ellas.
Más allá de los emoticonos animados y de la posibilidad de desbloquear el teléfono con el rostro, con iOS 11 también dispondremos de un nuevo centro de control más personalizado y completo, podremos grabar lo que ocurre en nuestra pantalla y editar las imágenes y los vídeos obtenidos y gestionar nuestro contenido con la aplicación Archivos.

Continue reading


IOS vs Android ¿cual es más seguro?

android-ios-seguridad-644x362

En los últimos meses, nos hemos ido enterando de las vulnerabilidades que los ciberdelincuentes han aprovechado sin que Google ni Apple pudiesen hacer nada. No hay que olvidar que hace poco saltó a la luz el mayor fallo de seguridad en Android jamás detectado y que afectaría al 95% de los usuarios. Mientras, Apple ha reconocido que un grupo de «hackers» chinos habían colado virus informáticos en unas cuarenta aplicaciones alojadas en la tienda virtual de descarga App Store.

Queda claro una vez más que nadie está a salvo en internet. Por esta razón, Panda Security ha enumerado tanto los pros como los contras de almbos sistemas operativos para facilitar al usuario la deliberación a la hora de elegir uno u otro sistema operativo.

Ventajas e inconvenientes de iOS

La compañía experta en seguridad informática reseña que iOS es un sistema operativo cerrado y, por tanto, más seguro por defecto. Apple ejerce especial control sobre el trabajo de los desarrolladores de aplicaciones: la App Store tiene diferentes mecanismos para verificar las herramientas, su origen y funcionalidades.

Otra de las ventajas es que en iOS 8 los datos que se guardan en el calendario, contactos, notas y recordatorios cuentan con una capa extra de cifrado. Sin embargo, tampoco es que las medidas de Apple sean la panacea, como se ha demostrado estos días. Ningún sistema puede controlarse al 100% ni ser totalmente cerrado. En cuestiones de privacidad alcanza solo un aprobado raspado: no son pocas las ocasiones que se ha desvelado la existencia de vulnerabilidades, puertas traseras en sus dispositivos o ataques a las cuentas ID.

Continue reading


News and info on IOS 8.3 and 8.4 Jailbreak

Lots of new tidbits of information is beginning to surface regarding a potential jailbreak for iOS 8.3 and iOS 8.4, and the future of jailbreaking with iOS 9, which will presumably be released in beta form after the WWDC keynote on Monday, June 8th, 2015.

iDigitalTimes’ Cammy Harbison’s interview with TaiG member Ray Xie, revealed that the TaiG team is setting its sights on iOS 9 with regard to future jailbreaks. Not long after that interview went live, news began to leak out that Pangu, the other Chinese team responsible for some of the more recent jailbreaks, was preparing a jailbreak release for iOS 8.3 right after the release of iOS 8.4.

Continue reading


Hacking with mobile devices PART IV (FINAL)

20140415-175740.jpg

DATA SMUGGliNG

Collecting data at a remote site requires that we remove it somehow – if we have a continuous connection, such as a reverse shell, then we can collect the data real time. However, if we deposit our mobile device with the intention of concealing it for an extended period of time, then we need to worry about a few issues as follows:
1. Preventing discovery of our collected data while on-site
2. Providing concealment during the duration of the event
3. Extracting the data safely

Encryption

If we use mobile devices to collect and transmit data, we should be selective in our choices of devices and ensure that they are capable of encrypting any data at rest or in motion. Earlier models of most mobile devices are incapable of full disk encryption, which puts the device and us at risk if discovered and forensically examined; we, therefore, need to look for devices that will allow us to keep our
activities secret or provide a mechanism for covering our tracks if discovered.

Data at Rest

The newer mobile devices claim to provide something similar to full disk encryption. Although the ability of these devices to be able to protect data against forensic analysis is questionable, the devices are getting better at addressing the security of data at rest. We can do a few additional tasks to encrypt data at rest on our mobile devices to increase our comfort level about our hacking data.
Naturally, we cannot encrypt scripts that we need to run during our collection or attack phases; however, once we have collected the data, we can encrypt the data using strong passwords. The program gpg is one method of securing a file through symmetric encryption. It is possible to encrypt a file with the GNU Privacy Guard (GNU PG) application, which can be installed on a jailbroken iPod touch.
Continue reading


Hacking with mobile devices PART III

20140409-133806.jpg

Web Hacking

Although we cannot get more robust applications loaded onto the iPod touch, such as Core IMPACT or HP WebInspect, there are still some good applications available. For example Nikto open-source (GPL) Web server scanner version information; Nikto is a Perl application available for download at http://cirt .net/nikto2.
Ranked #12 of the top 100 network security tools by Insecure.org, Nikto will scan a server for configuration files, cgi applications, outdated version information, and a multitude of other bits of data that can be useful in a penetration test. Although most of the work done by Nikto focuses on information gathering, it does a pretty good job of identifying potential vulnerabilities when found.

Wireless Attacks

Unfortunately, the iPod touch’s wireless chip cannot be placed into promiscuous or monitor mode, meaning we cannot obtain wireless data necessary to conduct brute force attacks against wireless access points using encryption. There are other mobile devices that can be set for promiscuous or monitor mode, so if a brute force attack is an absolute necessity, there are options available. However, there is an application that can intercept traffic on a wireless network called “Pirni,” written by Axel Moller also available through Cydia.
The program is configured to intercept all traffic intended for the default router (192.168.1.1 in this particular network) through ARP spoofing. Based on the Berkley Packet Filter (BPF) values, the only traffic that will be collected is TCP segments leaving the network, destined for port 80. The BPF can be modified to capture whatever type of traffic we are after. The Regex Options are used to immediately capture interesting packets, such as usernames and passwords.
Continue reading


Hacking with mobile devices PART II

20140408-185020.jpg

Vulnerability Identification

There are numerous commercial tools available to a professional penetration tester who conducts vulnerability identification analysis – unfortunately, none have been ported to the iPod touch.
The Nmap application has the ability to use scripts that interpret the Nmap findings and attempt to identify vulnerability; however, the development of Nmap as a vulnerability scanning application does not have the support that other programs do, like Nessus or Core IMPACT (to name a couple).
Perhaps a better alternative is to use the iPod touch as a pivot for more robust vulnerability scanners.

I would say that the use of the iPod touch as a platform to conduct a pivot attack seems to be the best option for conducting a vulnerability identification scan than trying to use Nmap or do the identification manually.

Vulnerability Exploitation

We can use an agent deployed on the iPod touch to conduct vulnerability exploita- tion, similar to the way an agent can be used to perform vulnerability identification. Again, Core IMPACT would be a good choice for such an attack. However, there is an application framework that can perform vulnerability exploitation, which can be installed using Cydia – the Metasploit 3.0
Similar to the traditional application installed on laptops or desktops, the Metasploit application can be run from the command line from the iPhone touch where we can launch exploits against servers with greater certainty of stability and accuracy.
Continue reading


Hacking with mobile devices an INTRODUCTION

20140404-125008.jpg

Mobile Devices
Mobile phones and personal data assistant (PDA) appliances used to be limited in their functionality; however, today there are wireless devices that operate using advanced operating systems and support applications that are incredibly useful for conducting clandestine activities. As an example, Apple’s iPod touch runs on the UNIX-Darwin kernel, which is open source,2 POSIX compliant, and single UNIX specification version 3 (SUSv3) compliant. Because of this, advanced hacker appli- cations can be built and installed onto the device, making the iPod touch a powerful hacking platform.

Regardless, there are some interesting trends that we can examine and use to our advantage.
The first trend is the use of open-source operating systems. As already mentioned, the iPod touch and the iPhone, both products of Apple Inc., uses the Darwin operating system. Additional proprietary applications, including graphic interface software, have been added to these portable devices; however, the core system is undeniably UNIX based.
The second trend is the increase in computing power and memory. Although the iPod touch does not have the processing capabilities of desktops or even laptops, they are quite capable of processing large amounts of data rapidly. As a benchmark test, the iPod touch (first generation) was able to process 577 MD5 hashes per second using the password cracking tool “John the Ripper.” In comparison, the MacBook Pro with a 2.8GHz Intel Core Duo processor was able to process 7674 per second. Although about one-twelfth the capability of the MacBook Pro, the iPod touch results are still impressive for what many consider as simply a fancy MP3 player.
The method of obtaining applications needed for penetration testing or covert audio and video communication will vary, depending on the mobile platform. In the case of the Droid and Palm Pre, access to the underlying operating system is avail- able by design. However, in the case of the iPod touch, access to the operating system can only be achieved by “jailbreaking” the phone, which circumvents protection mechanisms installed by Apple.
The actual method of jailbreaking varies, depending on the generation of the iPod touch and the version of the installed software (HOW TO jailbreak is explained in another post -same hack section). Once jailbroken, we can place applications on our device through different repositories – the most notable is called “Cydia.” More information on Cydia can be found at http://cydia.saurik.com/.
Continue reading


Phone Pen Testing Tools without Jailbreaking

20140325-134558.jpg

Although you can get almost any security tool imaginable if you jailbreak your iPhone, I was curious what was out there for non-jailbroken iPhones. Given that my iPhone is setup to be my primary home and work device, I don’t want risk jailbreaking it. I’ve searched around on iTunes and across the interwebs for anything we could find and below is a list of what I came up with so far. To make the list more manageable we’ve tried to categorise them per the ISSAF framework. If an app fell into more then one group, we placed it in the earliest phase. With some exceptions I also didn’t include ones that haven’t been updated in the last year.

Continue reading


Iphone as a pentesting device

20140314-114513.jpg

Tested on the iPhone 4S running IOS 7 jailbroken by using evasion7

I wanted to talk about using a iDevice (ios 7)as a pen testing device . But first, why should I do that?

Well, first off ,
Its portable
Not noticeable
it looks cool
its pretty fast
IOS == Unix
It can easily be used with the pineapple
Let’s move on , so how do you make your iDevice into a pentesting device ?
First you need jailbreak your iDevice (eg ; Evasion7)
Continue reading


%d bloggers like this: