際際滷

際際滷Share a Scribd company logo
iOS users - Scan to Connect to the
Secure360 Wireless Network*
(Open the URL in Safari)
*Not Really
Malicious MDM: Fun with iOS MobileConfigs
Karl Fosaaen
Introductions
 Who am I?
Karl Fosaaen
 What do I do?
Pen Testing
Password Cracking
Social Engineering
Blogging
Pinball Repair
Malicious MDM
 Overview
Intro
What is MDM?
Try This at Home!
Malicious Techniques
Demo
Conclusion
Malicious MDM
 What is MDM?
Mobile
Device
Management
Any platform that can be used
to manage mobile devices
Malicious MDM
 What can it do?
Set Password/lock requirements
Automate email account setup
VPN settings
Application Push
Remote Wipe
Geotracking
俗_()_/俗
Malicious MDM
 Architectures:
Client - Server Model
 Email/URL/Application enrollment
One Time Application
 Profiles typically deployed from
a single machine
Malicious MDM
Commercial Examples
Malicious MDM
Try This at Home!
Malicious MDM
Heres how we create a profile
Malicious MDM
Name the Profile
Malicious MDM
Passcode Settings
Malicious MDM
Wi-Fi Settings
Malicious MDM
Creating Web Clips
Malicious MDM
Adding Certificates
Malicious MDM
Installing
the
Profile
Malicious MDM
Malicious Techniques
Malicious MDM
 Malicious Techniques
Direct USB Connection
iPhone Configuration Utility
Requires Unlocked Device
Malicious MDM
 Malicious Techniques
Juice Jacking
Malicious MDM
 Malicious Techniques
Website deployment
 Direct .mobileconfig link
 XSS targeting iOS users
 Malicious Ad Servers
Malicious MDM
 Malicious Techniques
Website deployment
 QR code links
Malicious MDM
 Malicious Techniques
Email
Malicious MDM
Post Deployment
Exploitation
Malicious MDM
 Post Deployment Exploitation
Wireless Attack
 Set Default SSID
 Set SSL Root Certificates
 Set Default Proxy
 Capture Creds
VPN Attack
Malicious MDM
Wireless Attack
Malicious MDM
Wireless Attacks
HACKMEhackmetest:P@ssword123!
Malicious MDM
Recently Updated
Malicious MDM
 Post Deployment Exploitation
Application Attacks
 Custom Applications
 Web Clips
More Credential
Grabbing
Malicious MDM
 Installed A沿沿鉛庄界温岳庄看稼
Malicious MDM
 Post Deployment Exploitation
So you have credentials
 Single Factor VPN (PPTP)
 Internet facing authentication
Malicious MDM
 Installed A沿沿鉛庄界温岳庄看稼
Invisible Applications
Push with MDM
VOIP application
 Access to the microphone
 Always running
Malicious MDM
Demo Time!
Malicious MDM
Scan to Connect to the
Secure360 Wireless Network*
*Not Really
Malicious MDM
Malicious MDM
Malicious MDM
 Preventions
Start with clean phones, then
add to the MDM
Prevent users from installing
other MDM profiles
Add devices to the MDM before
an attacker does it for you
Dont plug into USB ports that
you dont own
Questions
Questions?
Karl Fosaaen (@kfosaaen)
http://blog.netspi.com
Ad

Recommended

Malicious MDM - AppSecCA
Malicious MDM - AppSecCA
Karl Fosaaen
Lismar delgado
Lismar Delgado
Hacking iOS with Proxies - dc612
Hacking iOS with Proxies - dc612
Karl Fosaaen
Externally Testing Modern AD Domains - Arcticcon
Externally Testing Modern AD Domains - Arcticcon
Karl Fosaaen
Motivational week 1 disc. 2
Motivational week 1 disc. 2
suesmith74
GPU Cracking on the Cheap
GPU Cracking on the Cheap
Karl Fosaaen
Stampa 3D: La III Rivoluzione Industriale? - 3D Printing: The 3rd Industrial ...
Stampa 3D: La III Rivoluzione Industriale? - 3D Printing: The 3rd Industrial ...
Marco Alici
Hacking iOS Applications with Proxies
Hacking iOS Applications with Proxies
Karl Fosaaen
Flip book
Flip book
Michelle Saikali
Mobius lab Review
Mobius lab Review
Museum Planning, LLC
new media
new media
jp500595
Mohammad cv 16.5.2013
Mohammad cv 16.5.2013
mohammadalbdour
際際滷 kombis
際際滷 kombis
Nining Rn
Conception avec pic
nawzat
Attacking ADFS Endpoints - DerbyCon
Attacking ADFS Endpoints - DerbyCon
Karl Fosaaen
Automating Attacks Against Office365 - BsidesPDX 2016
Automating Attacks Against Office365 - BsidesPDX 2016
Karl Fosaaen
FreeCAD il cad 3D libero
FreeCAD il cad 3D libero
Marco Alici
iOS enterprise
iOS enterprise
dominion
UKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterprise
Ren辿 Winkelmeyer
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2
Wso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
WSO2
DeepSec_2019_Chemerkin_Yury_-_Full_-_Final.pdf
DeepSec_2019_Chemerkin_Yury_-_Full_-_Final.pdf
Yury Chemerkin
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
Dilshan Edirisuriya
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
WSO2Con Asia 2014 - 鐃 Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 - 鐃 Embracing BYOD Trend Without Compromising Security, Emp...
WSO2
OWASP Top 10 for Mobile
OWASP Top 10 for Mobile
Appvigil - Mobile App Security Scanner
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis
Smartphones
Smartphones
Saeed Slemy

More Related Content

Viewers also liked (9)

Flip book
Flip book
Michelle Saikali
Mobius lab Review
Mobius lab Review
Museum Planning, LLC
new media
new media
jp500595
Mohammad cv 16.5.2013
Mohammad cv 16.5.2013
mohammadalbdour
際際滷 kombis
際際滷 kombis
Nining Rn
Conception avec pic
nawzat
Attacking ADFS Endpoints - DerbyCon
Attacking ADFS Endpoints - DerbyCon
Karl Fosaaen
Automating Attacks Against Office365 - BsidesPDX 2016
Automating Attacks Against Office365 - BsidesPDX 2016
Karl Fosaaen
FreeCAD il cad 3D libero
FreeCAD il cad 3D libero
Marco Alici
new media
new media
jp500595
Mohammad cv 16.5.2013
Mohammad cv 16.5.2013
mohammadalbdour
際際滷 kombis
際際滷 kombis
Nining Rn
Conception avec pic
nawzat
Attacking ADFS Endpoints - DerbyCon
Attacking ADFS Endpoints - DerbyCon
Karl Fosaaen
Automating Attacks Against Office365 - BsidesPDX 2016
Automating Attacks Against Office365 - BsidesPDX 2016
Karl Fosaaen
FreeCAD il cad 3D libero
FreeCAD il cad 3D libero
Marco Alici

Similar to Malicious MDM - Secure360 (20)

iOS enterprise
iOS enterprise
dominion
UKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterprise
Ren辿 Winkelmeyer
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2
Wso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
WSO2
DeepSec_2019_Chemerkin_Yury_-_Full_-_Final.pdf
DeepSec_2019_Chemerkin_Yury_-_Full_-_Final.pdf
Yury Chemerkin
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
Dilshan Edirisuriya
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
WSO2Con Asia 2014 - 鐃 Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 - 鐃 Embracing BYOD Trend Without Compromising Security, Emp...
WSO2
OWASP Top 10 for Mobile
OWASP Top 10 for Mobile
Appvigil - Mobile App Security Scanner
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis
Smartphones
Smartphones
Saeed Slemy
Tablets, Apps and Cybersecurity
Tablets, Apps and Cybersecurity
Open University and others
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
Ernest Staats
WSO2Con US 2013 - Achieving Safe BYOD and Productive Apps with WSO2 Mobile De...
WSO2Con US 2013 - Achieving Safe BYOD and Productive Apps with WSO2 Mobile De...
WSO2
Cyber Security Seminar
Cyber Security Seminar
Jeremy Quadri
CIS13: Managing Mobility with Identity Standards
CIS13: Managing Mobility with Identity Standards
CloudIDSummit
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
CloudIDSummit
Mobile Device Mismanagement
Mobile Device Mismanagement
breenmachine
iOS enterprise
iOS enterprise
dominion
UKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterprise
Ren辿 Winkelmeyer
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2
Wso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
WSO2
DeepSec_2019_Chemerkin_Yury_-_Full_-_Final.pdf
DeepSec_2019_Chemerkin_Yury_-_Full_-_Final.pdf
Yury Chemerkin
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
Dilshan Edirisuriya
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
WSO2Con Asia 2014 - 鐃 Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 - 鐃 Embracing BYOD Trend Without Compromising Security, Emp...
WSO2
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
Ernest Staats
WSO2Con US 2013 - Achieving Safe BYOD and Productive Apps with WSO2 Mobile De...
WSO2Con US 2013 - Achieving Safe BYOD and Productive Apps with WSO2 Mobile De...
WSO2
Cyber Security Seminar
Cyber Security Seminar
Jeremy Quadri
CIS13: Managing Mobility with Identity Standards
CIS13: Managing Mobility with Identity Standards
CloudIDSummit
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
CloudIDSummit
Mobile Device Mismanagement
Mobile Device Mismanagement
breenmachine
Ad

Malicious MDM - Secure360