behind enemy lines 2012

42
Behind Enemy Lines - AppSecDC 2012 Practical & Triage Approaches to Mobile Security Abroad

Upload: justin-morehouse

Post on 12-Jul-2015

1.154 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Behind Enemy Lines 2012

Behind Enemy Lines - AppSecDC 2012Practical & Triage Approaches to Mobile Security Abroad

Page 2: Behind Enemy Lines 2012

Presentation Objectives‣ Highlight the threats posed by

traveling abroad with mobile devices

‣ Discuss lessons learned from real world experiences

‣ Provide practical recommendations for reducing these threats

‣ Do it all in 50 mins or less

Page 3: Behind Enemy Lines 2012

About me

‣ Justin Morehouse (@mascasa)

‣ Founder & Principal @ GuidePoint Security

‣ Security Operations and Consulting

‣ Co-author ‘Securing the Smart Grid’

‣ OWASP Tampa Chapter Founder & Leader

‣ Presented at DEF CON, ShmooCon, OWASP, and more...

Page 4: Behind Enemy Lines 2012

‣ Since 2008 I’ve used and subsequently voided the warranties of the following:

‣ BlackBerry Bold 9700 & 8820

‣ HTC Nexus One (Android 2.3)

‣ iPhone, 3G, 3GS, 4, 4s (All iOS versions)

‣ Motorola Droid (Android 2.1, 2.2, 2.3)

‣ Samsung Galaxy S (Android 2.1)

‣ T-Mobile (HTC) Dash (Windows Mobile 6.5)

My addiction to smartphones

Page 5: Behind Enemy Lines 2012

Stratum Security

Why mobile security?

Page 6: Behind Enemy Lines 2012

Everyone uses them...

Page 7: Behind Enemy Lines 2012

Stratum Security

Why international mobile security?

Page 8: Behind Enemy Lines 2012

Video Conferencing

My TripIt profile page

Page 9: Behind Enemy Lines 2012

Is INTL mobile security a real issue?

Page 10: Behind Enemy Lines 2012

Domestic issues...

Page 11: Behind Enemy Lines 2012

“Unique” international issues...

Page 12: Behind Enemy Lines 2012

Example #1

Page 13: Behind Enemy Lines 2012

Example #2

Page 14: Behind Enemy Lines 2012

personal skepticism

Page 15: Behind Enemy Lines 2012

Wikileaks Spy Files

Page 16: Behind Enemy Lines 2012

Ability Computers & Software Industries (Israel)

Page 17: Behind Enemy Lines 2012

VASTech (South Africa)

Page 18: Behind Enemy Lines 2012

Elaman (Germany)

Page 19: Behind Enemy Lines 2012

ELTA (Israel Aerospace Industries)

Page 20: Behind Enemy Lines 2012

Spy Files Continued...

Page 21: Behind Enemy Lines 2012

How you are targeted by threat agents

Page 22: Behind Enemy Lines 2012

...phishing

Page 23: Behind Enemy Lines 2012

evil maid attack

Page 24: Behind Enemy Lines 2012

...and drive-by downloads

Page 25: Behind Enemy Lines 2012

Not all threats are created equal...

Page 26: Behind Enemy Lines 2012

Advanced Threats

Page 27: Behind Enemy Lines 2012

MinimalThreats

Page 28: Behind Enemy Lines 2012

Moderate Threats

Page 29: Behind Enemy Lines 2012

Practical mitigation steps

Page 30: Behind Enemy Lines 2012

Have a plan...

Page 31: Behind Enemy Lines 2012

Make yourself anonymous

(as possible)

Page 32: Behind Enemy Lines 2012

the beauty of prepaid...

Page 33: Behind Enemy Lines 2012

old school & low tech...

Page 34: Behind Enemy Lines 2012

what about data?

Page 35: Behind Enemy Lines 2012

Case Study

Page 36: Behind Enemy Lines 2012

Client Overview

‣ Well-known multi-national organization w/ US HQ

‣ Executives traveling to hostile countries with moderate threats

‣ Loss of IP would be harmful to organization if obtained by competition

Page 37: Behind Enemy Lines 2012

Proposed Solution

‣ Utilize factory unlocked iPhone 4s ‘burner’ phones

‣ Preconfigure with VPN, encryption, PIN, remote wipe

‣ Purchase local SIM (with cash) upon arrival

‣ Perform forensics on phone upon return

Page 38: Behind Enemy Lines 2012

Solution Issues

‣ Executives often forgot to enable VPN before using data services

‣ Local SIM purchase required detailed information (passport)

‣ Executives used public wireless networks on several occasions

Page 39: Behind Enemy Lines 2012

Lessons Learned‣ Utilize configuration utilities to enforce policies on

devices (No WiFi, VPN, etc.)

‣ Purchase local SIM cards in advance using anonymous(ish) means (BitCoin)

‣ Disable local syncing in favor of web-based solutions

‣ Require two-factor authentication for all web-based solutions

‣ Setup local # that forwards to US

‣ Tunnel your tunnels (VPN & SSL)

Page 40: Behind Enemy Lines 2012

Effective mobile security triage

Page 41: Behind Enemy Lines 2012

Plan for the Worst

‣ Knowledge is key (DO’s and DON’Ts cheat-sheet)

‣ Rule of 32 (w/ prepaid [anon] SIM)

‣ Remote deployment solutions (Wipe & rebuild required)

‣ Overnight INTL shipping