Tisa social and mobile security

33
Advanced Social Network and Mobile Attack Nipon Nachin, Consulting Manager ITIL Expert, CISSP, GIAC GFCA, CISA, CISM, CSSLP, AMBCI, IRCA ISMS, ITSMS, BCMS Provisional Auditor, SSCP, Security+ Prathan Phongthiproek, Red-Team Manager eCPPT, E|CSA, C|EH, CIW Security Analyst, CPTS, CWNP, CWSP, Security+, ITIL-F ACIS Professional Center

Transcript of Tisa social and mobile security

Page 1: Tisa social and mobile security

Advanced Social Network and Mobile Attack

Nipon Nachin, Consulting Manager

ITIL Expert, CISSP, GIAC GFCA, CISA, CISM, CSSLP, AMBCI, IRCA ISMS, ITSMS, BCMS Provisional Auditor, SSCP, Security+

Prathan Phongthiproek, Red-Team Manager

eCPPT, E|CSA, C|EH, CIW Security Analyst, CPTS, CWNP, CWSP, Security+, ITIL-F

ACIS Professional Center

Page 3: Tisa social and mobile security

Social Network Threats

Source: 2008 CSI Computer Crime & Security Survey3

1) Malware Spam

2) Drive-By-Download

3) Malicious Applications

4) Session Hijacking

Page 4: Tisa social and mobile security

Malware Spam

Source: 2008 CSI Computer Crime & Security Survey4

1) Osama execution video scam

2) Enable dislike button

3) Top 10 profile spies

Page 5: Tisa social and mobile security

Malware Spam

Source: 2008 CSI Computer Crime & Security Survey5

Page 6: Tisa social and mobile security

Drive-By-Download

Source: 2008 CSI Computer Crime & Security Survey6

1) Malicious URL Shorten

2) Internet Explorer / Mozilla Firefox / Safari / Chrome Vulnerabilities

3) Web Browsers Toolbar

4) Adobe products vulnerabilities; **Flash, PDF, Etc

5) ActiveX and Java Applets

Page 7: Tisa social and mobile security

Drive-By-Download

Source: 2008 CSI Computer Crime & Security Survey7

Page 8: Tisa social and mobile security

Drive-By-Download

Source: 2008 CSI Computer Crime & Security Survey8

Victim

(4) Download exploit

(1) Client visit the landing page

(2) Redirect to get exploit

(3) Redirect to get exploit

Page 9: Tisa social and mobile security

Drive-By-Download

Source: 2008 CSI Computer Crime & Security Survey9

Spyware

Viruses

Worms

Trojans

Potentially

unwanted

applications

Adware

Unwanted/

offensive

content

Phishing

Page 10: Tisa social and mobile security

Drive-By-Download

Source: 2008 CSI Computer Crime & Security Survey1

0

Page 11: Tisa social and mobile security

Malicious Facebook Applications

Source: 2008 CSI Computer Crime & Security Survey

Page 12: Tisa social and mobile security

Malicious Facebook Applications

Source: 2008 CSI Computer Crime & Security Survey

Page 13: Tisa social and mobile security

Malicious Facebook Applications

Source: 2008 CSI Computer Crime & Security Survey

Page 14: Tisa social and mobile security

Sessions Hijacking

Source: 2008 CSI Computer Crime & Security Survey

Page 15: Tisa social and mobile security

Sessions Hijacking with Firesheep

Source: 2008 CSI Computer Crime & Security Survey

1) For now, Unable to attack Facebook **Have to Modify source code

2) Only support over HTTP

- Hotmail, Twitter, Facebook, Etc

3) Sniff on-the-Fly (Wifi Hotspot)

4) Over Network, Have to ARP poisoning

Page 16: Tisa social and mobile security

Sessions Hijacking

Source: 2008 CSI Computer Crime & Security Survey

Page 17: Tisa social and mobile security

Sessions Hijacking Over HTTPS

Source: 2008 CSI Computer Crime & Security Survey

1) Using SSLStrip for kill SSL sessions

2) Rouge Access point or Arp poisoning on the wire

Page 18: Tisa social and mobile security

Sessions Hijacking Over HTTPS

Page 19: Tisa social and mobile security

Mobile Threats

Source: 2008 CSI Computer Crime & Security Survey1

9

Page 20: Tisa social and mobile security

BlackBerry

Page 21: Tisa social and mobile security

Mobile Safari Still Vulnerable To Pwn2Own Exploit

Page 22: Tisa social and mobile security

Mobile Web Browsers

Common problem: bad security UX

Page 23: Tisa social and mobile security

Android Content Provider File Disclosure

Page 24: Tisa social and mobile security

Google Latitude Zero Day Attack

Page 25: Tisa social and mobile security

Google Latitude Zero Day Attack

Page 26: Tisa social and mobile security

Google Latitude Zero Day Attack - Example

https://www.google.com/accounts/[email protected]&password=xxxxxx&s=sss=&xxx=dddddd

Page 27: Tisa social and mobile security

Google Latitude Zero Day Attack on iPhone

Page 28: Tisa social and mobile security

Google Latitude Zero Day Attack

Page 29: Tisa social and mobile security

FlexiSPY BlackBerry Spy Phone

Page 30: Tisa social and mobile security

FlexiSPY Apple iPhone Spyphone

Page 31: Tisa social and mobile security

Spyphone – ดักฟังการสนทนา

31

Page 32: Tisa social and mobile security

28th – 29th June 2011, Grand Millennium Sukhumvit, Bangkok

Page 33: Tisa social and mobile security

Copyright © 2009 TISA and its respective author(Thailand Information Security Association)

Please contact : [email protected]

http://www.TISA.or.th