What Gadget you are getting this Holiday?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rated: 5.00/5)
Loading ... Loading ...

So another shocker from the Pwn2Own 2010 hacking contest that’s on going at the moment: hackers Vincenzo Iozzo and Ralf Philipp Weinmann were able to come up with a trick that allowed them to break into fully-patched iPhones’ SMS databases, even the messages that were deleted, simply by tricking the owner to visit a “rigged” web site.

Aside from hijacking entire SMS databases in about 20 seconds, the exploit could potentially also be used to “exfiltrated the phone contact list, photographs and iTunes music files.” All that by simply having a user visit a specific website and without ever needing to leave the iPhone sandbox. Sounds really scary, doesn’t it?

The exploit, however, crashed the iPhone’s browser session but Weinmann said that, with some additional effort, he could have a successful attack with the browser running.
“Basically, every page that the user visits on our [rigged] site will grab the SMS database and upload it to a server we control,” Weinmann explained. Iozzo, who had flight problems, was not on hand to enjoy the glory of being the first to hijack an iPhone at the Pwn2Own challenge.

Weinmann, a 32-year-old from the University of Luxembourg, collaborated with Iozzo (a 22-year-old Italian researcher from Zynamics) on the entire process — from finding the vulnerability to writing the exploit. The entire process took about two weeks, Weinmann said.
Halvar Flake, a renowned security researcher who assisted with the winning exploit, said the biggest hiccup was bypassing the code-signing mitigation implemented by Apple on its flagship mobile device.
“This exploit doesn’t get out of the iPhone sandbox,” Flake explained, noting that an attacker can do enough damage without escaping from the sandbox.
“Apple has pretty good counter-measures but they are clearly not enough. The way they implement code-signing is too lenient,” Flake added.

On the Zynamics blog, Flake celebrated:
The payload used chained return-into-libc (“return oriented programming”) on ARM to execute in spite of code signing. As far as we know, this is the first public demonstration of chainged return-into-libc on thre ARM platform.
In addition to hijacking the SMS database, Weinmann said the winning Pwn2Own exploit could have exfiltrated the phone contact list, the email database, photographs and iTunes music files.
In the iPhone sandbox, Weinmann said there’s a non-root user called ‘mobile’ with certain user privileges. “With this exploit, I can do anything that ‘mobile’ can do.”
Weinmann declined to publicly discuss the techniques he used to find the vulnerability. “We’re working on developing techniques to find a certain class of vulnerabilities. I don’t want to discuss it too much.”
Aaron Portnoy, a security researcher at TippingPoint Zero Day Initiative (the company sponsoring Pwn2Own), described the attack as “very impressive.”
“It was a real world exploit against a popular device. They exfiltrated the entire SMS database in about 20 seconds. It was as if a Web page was loading.”
TippingPoint ZDI acquired the exclusive rights to the flaw information. The company will report the issue to Apple and will withhold details until a patch is released.

Weinmann and Iozzo won a $15,000 cash prize and got to keep the hijacked iPhone.


Is Facebook Responsible For Spreading STDs?

Facebook Hires Google Advertising
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On March 25, 2010(4 years, 5 months ago.)

Recent Products

Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Compare  

What Do You Think?

Loading Disqus Comments ...
Loading Facebook Comments ...

Recent Search

Recent Tutorials

The trick will let you to check your Facebook messages in the original app without downloading Messenger and it works with both iPhone or Android phone.
Want to block all disgusting ads from your android device? Read the tutorial to know how you can block ads on your Android and save data.
Want to repair your memory card? It's very easy to fix corrupted or damaged memory card. In fact you can fix it by yourself.
Are you the one who is frustrated because of the speed of your Android device? No worries, the article will help you increase the speed of that device.
Lately, Google has updated its Google Docs. Now users can crop, rotate, and add borders to images in a document without leaving Google Docs.
Adobe CS products are not free, but the good news is you can now download Photoshop CS2 & all other CS2 product completely free and it's absolutely legal.
At the beginning level, many people don't know how to use Gmail properly. For them, a here's a helpful guideline.
Skype now allows you to call directly from your Outlook account. Find the step-by-step installation process from this tutorial.
This tutorial helps you quickly resolve four of the most common problems that occur with Windows XP.
After releasing Look Back, many people didn't like it. So Facebook planned to add an Edit tool to the feature and now you can edit your Facebook Look Back video.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook