exposing the spy in your pocket

38
Exposing the Spy in your Pocket 1

Upload: josh-gillespie

Post on 22-Jan-2018

168 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Exposing the Spy in Your Pocket

Exposing the Spy in your Pocket

1

Page 2: Exposing the Spy in Your Pocket

I n t r o d u c t i o n s

Page 3: Exposing the Spy in Your Pocket

Mobile devices are ubiquitous3

Page 4: Exposing the Spy in Your Pocket

All that usage creates a lot of raw data

4

Page 5: Exposing the Spy in Your Pocket

Add sensor data that doesn’t rely on usage

5

Page 6: Exposing the Spy in Your Pocket

And you can figure out a lot…

6

Page 7: Exposing the Spy in Your Pocket

In other words…7

Page 8: Exposing the Spy in Your Pocket

Do you trust <insert app here> with all this?

8

Page 9: Exposing the Spy in Your Pocket

Don’t desktops have the same issue?

9

Page 10: Exposing the Spy in Your Pocket

Mobile/IoT Problem

10

Page 11: Exposing the Spy in Your Pocket

So what is your phone doing anyway?

11

Page 12: Exposing the Spy in Your Pocket

Let’s look under the hood12

Page 13: Exposing the Spy in Your Pocket

Things to watch13

Page 14: Exposing the Spy in Your Pocket

Demo

14

Page 15: Exposing the Spy in Your Pocket

Basic Fiddler Setup

15

Page 16: Exposing the Spy in Your Pocket

iPhone Setup

16

Page 17: Exposing the Spy in Your Pocket

iPhone Setup – Connection Proxy

17

Page 18: Exposing the Spy in Your Pocket

<explore>

18

Page 19: Exposing the Spy in Your Pocket

HTTPS Fiddler Setup

19

Page 20: Exposing the Spy in Your Pocket

HTTPS iPhone Setup

20

Page 21: Exposing the Spy in Your Pocket

</explore>

21

Page 22: Exposing the Spy in Your Pocket

What did we see?22

Page 23: Exposing the Spy in Your Pocket

What can we, the poor consumer, do to defend ourselves?

23

Page 24: Exposing the Spy in Your Pocket

Back up, what did we just do?24

Page 25: Exposing the Spy in Your Pocket

What could we have done?

25

Page 26: Exposing the Spy in Your Pocket

Demo

26

Page 27: Exposing the Spy in Your Pocket

Doesn’t this alert the user?27

Page 28: Exposing the Spy in Your Pocket

Not necessarily

28

Page 29: Exposing the Spy in Your Pocket

Pen Pineapple

29

Page 30: Exposing the Spy in Your Pocket

What can we, the devs, do for our users?

30

Page 31: Exposing the Spy in Your Pocket

Inspect

31

Page 32: Exposing the Spy in Your Pocket

Verify certificates

32

Page 33: Exposing the Spy in Your Pocket

OWASP

33

Page 34: Exposing the Spy in Your Pocket

Be your own White Hat

34

Page 35: Exposing the Spy in Your Pocket

Assess your threat risk model35

Page 36: Exposing the Spy in Your Pocket

Security == difficulty level

36

Page 37: Exposing the Spy in Your Pocket

Questions?

37

Page 38: Exposing the Spy in Your Pocket

[email protected]

• @jcgillespie

All images in the public domain except where otherwise attributed.38