They tried to warn you. They said, "we're trying to make the iPhone secure", and people skoffed, laughed and geered, and said "apple is just trying to take away our apps! Don't upgrade, oh, check out this new exploit, let's distribute the code for using it!"
As Apple worked to close more holes, people questioned why apple still didn't feel the platform was ready for primetime 3rd party development, and why it may have released its 1.1.1 before giving it more tests... now, behold the form of the destroyer (okay, maybe a tad melodramatic, but...).
READ THIS ARTICLE:
http://blog.wired.com/27bstroke6/2007/10/metasploit-crea.html
Let's make sure we keep reporting problems to Apple, and upgrading our iPhones, and wait for February for secure 3rd party app support (or be responsible about what you're opening yourself up to, ok?) I really don't want to hear about the gnashing of teeth when your phone begins making calls by itself in your pocket, after a script successfully breaks in and starts dancing the jig on your mobile minutes, text messages, email and sending out your personal info.
We need a secure platform, and considering 3rd party apps like Apollo and MobileChat store your Google, MSN, and AOL passwords in clearly readable (and transmittable) unencrypted text... apparently very few people are concerned enough to make it a priority.
So... um, what DefCon are we at now?
~ CB
As Apple worked to close more holes, people questioned why apple still didn't feel the platform was ready for primetime 3rd party development, and why it may have released its 1.1.1 before giving it more tests... now, behold the form of the destroyer (okay, maybe a tad melodramatic, but...).
READ THIS ARTICLE:
http://blog.wired.com/27bstroke6/2007/10/metasploit-crea.html
No... we don't need "certificate signing" at all. Malware and malicious scripts will only be comprised of daisies and fuzzy bunnies when it comes to the iPhone.WIRED writes:
HD Moore, one of the developers of the Metasploit pen-testing (and hacking) tool, has posted exploits and detailed instructions on how to attack an iPhone. The information takes hackers -- and the FBI and NSA -- one step closer to being able to remotely and surreptitiously take control of an iPhone and turn it into a surveillance device.
The exploits take advantage of a vulnerability in the TIFF image-rendering library that's used by the phone's browser, mail and iTunes software. It's the same vulnerability that allows Apple customers to unlock and customize their iPhones. But Moore's exploits will allow hackers to do much more.
Last month he added capability to the Metasploit tool that would give a hacker remote shell access to an iPhone in order to deliver any arbitrary malicious code to it. All attackers needed to do was write malicious payload code.
This week Moore posted some payload exploits and provided detailed instructions for writing more of them. Attackers could conceivably write code to hi-jack the contacts in an iPhone address book, access the list of received and sent calls and messages, turn the phone into a listening device, track the user's location or instruct the phone to snap photos of the user's surroundings -- including any companions who may be in sight of the camera lens.
Let's make sure we keep reporting problems to Apple, and upgrading our iPhones, and wait for February for secure 3rd party app support (or be responsible about what you're opening yourself up to, ok?) I really don't want to hear about the gnashing of teeth when your phone begins making calls by itself in your pocket, after a script successfully breaks in and starts dancing the jig on your mobile minutes, text messages, email and sending out your personal info.
We need a secure platform, and considering 3rd party apps like Apollo and MobileChat store your Google, MSN, and AOL passwords in clearly readable (and transmittable) unencrypted text... apparently very few people are concerned enough to make it a priority.
So... um, what DefCon are we at now?
MobileSafari, MobileMail, even the Calculator, all run with full root privileges. Any security flaw in any iPhone application can lead to a complete system compromise. A rootkit takes on a whole new meaning when the attacker has access to the camera, microphone, contact list, and phone hardware. Couple this with "always-on" internet access over EDGE and you have a perfect spying device.
"All they'll need to do is back port the firmware to an earlier version that's vulnerable," said Moore. "Apple has to leave a way to restore an iPhone back [to previous versions of the firmware]."
The same technique was used to hack the Sony PSP after Sony issued an update that patched the TIFF vulnerability on that video game player.
~ CB