security through obscurity - troopers it-security conference...security through obscurity... powered...

37
Security Through Obscurity ... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten redacted version

Upload: others

Post on 11-Jun-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Security Through Obscurity... powered by HTTPS!

Peter Frühwirt, SBA ResearchSebastian Schrittwieser, FH St. Pölten

redacted version

Page 2: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Live-Demo onWowtalk

Page 3: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

ServerAttackerPhone

1. (HTTPS): Request

2b. (HTTPS): PIN

TargetPhone

2a. (SMS): PIN

SMS Proxy

Page 4: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

SSL != protection against protocol analysis

Page 5: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

SSL interception enables man-in-the-middle attacks

for protocol analysis purposes

Page 6: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

transport layer encryption cannot replace good protocol design!

Page 7: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Certificates?

Page 8: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

http://opensource.apple.com/source/Security/Security-55471/libsecurity_ssl/lib/sslKeyExchange.c

Page 9: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Quizduell

Page 10: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

extremely popular in Germany

Page 11: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

extremely popular in Germany

Page 12: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Let’s play a round of Quizduell ;)

Page 13: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Curiosity

Page 14: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

November 2012 - May 2013

Page 15: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

326 layers

Page 16: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

69 billion small cubes

Page 17: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

4 million players

Page 18: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

3,000,000,000 coins for a diamond chisel

Page 19: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Bonus points for clearing the entire screen!

Page 20: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Parameter for multiplieris set by the server!

Page 21: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

[...]&backgroundColor=blue&backgroundText=Curiosity&bonusMultiplier=10&hardwareID=<UDID>&[...]

10000000

Page 22: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten
Page 23: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Photoswap

Page 25: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

for;i;in;{1..12345};;dowget;Ak;http://www.server.com/images/$i.jpg;done

Page 26: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Demo

Page 27: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Countermeasures?

Page 28: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Certificate Pinning

Verification if particular certificate is used

Page 29: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Reduced costs

Increased security

Less flexibility

Page 30: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

75 %

25 %

Facebook

Facebook Messenger

Shazam

eBay

ÖBB Scotty

AntiVirus Security

Tango

Google Earth

LOVOO

Geizhals

Geizhals

Stocard

AutoScout24wetter.com

Twitter

LogoQuizWhatsapp

Snapchat

Tinder

NavigonRuntastic

iMessage

Quizduell

AppStore

Viber

certificate pinningno certificate pinning

HikeRublys

Page 31: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

E-Banking apps?

Bank Austria

Erste BankSparkasse

Commerzbank

Eniteo DZ Bank

ING Diba

Raiffeisen Bank

Postbank

Union Bank

Volksbank

Volksbanken Raiffeisenbanken

Deutsche Bank

UBS Mobile Banking

Alpha Bank

Westpack Banking

BNI Internet Banking

BPN Paribas

Bank Republic

Targobank

Page 32: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

never ever trust the client (even if it’s your own client)!

server-side validation of every client request

(the 80’s called and want their advice back)

Page 33: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

secure side channel

establish a trusted second channel

Page 34: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Conclusions

Page 35: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

‣ Many smartphone applications implement insecure protocols

‣ These protocols are hidden behind transport encryption, which does not prevent protocol analysis

‣ Don’t rely on Security through Obscurity

Page 36: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Peter Frühwirt

IT-Sicherheitsforscher, SBA Research

Doktoratsstudent TU Wien

[email protected]

Mobile Security | Digital forensics in Databases

Peter Frühwirt

IT-Sicherheitsforscher, SBA Research

Doktoratsstudent TU Wien

[email protected]

Mobile Security | Digital forensics in Databases

Page 37: Security Through Obscurity - Troopers IT-Security Conference...Security Through Obscurity... powered by HTTPS! Peter Frühwirt, SBA Research Sebastian Schrittwieser, FH St. Pölten

Sebastian Schrittwieser

Dozent Fachhochschule St. Pölten

Doktoratsstudent TU Wien

[email protected]

Code obfuscation | Fingerprinting of anonymized microdata

Mobile security | Digital forensics | Research ethics

Sebastian Schrittwieser

Dozent Fachhochschule St. Pölten

Doktoratsstudent TU Wien

[email protected]

Code obfuscation | Fingerprinting of anonymized microdata

Mobile security | Digital forensics | Research ethics