Hacking with mobile devices PART IV (FINAL)



Collecting data at a remote site requires that we remove it somehow – if we have a continuous connection, such as a reverse shell, then we can collect the data real time. However, if we deposit our mobile device with the intention of concealing it for an extended period of time, then we need to worry about a few issues as follows:
1. Preventing discovery of our collected data while on-site
2. Providing concealment during the duration of the event
3. Extracting the data safely


If we use mobile devices to collect and transmit data, we should be selective in our choices of devices and ensure that they are capable of encrypting any data at rest or in motion. Earlier models of most mobile devices are incapable of full disk encryption, which puts the device and us at risk if discovered and forensically examined; we, therefore, need to look for devices that will allow us to keep our
activities secret or provide a mechanism for covering our tracks if discovered.

Data at Rest

The newer mobile devices claim to provide something similar to full disk encryption. Although the ability of these devices to be able to protect data against forensic analysis is questionable, the devices are getting better at addressing the security of data at rest. We can do a few additional tasks to encrypt data at rest on our mobile devices to increase our comfort level about our hacking data.
Naturally, we cannot encrypt scripts that we need to run during our collection or attack phases; however, once we have collected the data, we can encrypt the data using strong passwords. The program gpg is one method of securing a file through symmetric encryption. It is possible to encrypt a file with the GNU Privacy Guard (GNU PG) application, which can be installed on a jailbroken iPod touch.

GNU Privacy Guard provides different options regarding hashing and crypto- graphic methods, allowing us to be selective on how secure we want our data to be at rest. If we wanted to create a script that automatically encrypted our data on a regular basis, we could use an asymmetric algorithm and provide it with our public key, which would prevent anyone from being able to reverse our encryption without possessing the corresponding private key.

Data in Motion

If we can establish a (reverse) shell to our mobile device, we need to make sure that we communicate securely and in such a way as to ensure our communication stream blends in with the rest of the compromised organization; the use of SSH to create a tunnel is the surest way to do so. The use of SSH will allow us to set up tunnels or use the iPod touch as a proxy. However, we can also set up the iPod touch to be a VPN server as well using OpenVPN application, available through Cydia, which has already been compiled to run on the iPod touch and iPhone. Once configured, we can connect to the iPod touch using VPN software and use the device to conduct our attacks securely.
Both solutions – the VPN and the SSH application – are quite capable of ensuring our communications between the iPod touch and our remote attack platform are encrypted. We also have the flexibility of using our encrypted channels through whichever open port exists within the victim’s network; this will permit us to con- duct our attacks with much greater stealth since we can avoid detection by intrusion detection systems looking for specific data (such as keywords) traveling across the network.

About dlosada85

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: