RSS
 

Penetration testing of iPhone Applications – Part 1

12 Feb

This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iPhone applications. It attempts to cover the entire application penetration testing methodology on a physical device (running with iOS 5) rather than a simulator.

Background:

Since the introduction of the iPhone, Apple has sold more than 110 million iPhones. The smartphone platform has created a new business and companies want to make their services available on mobile devices in order to reach out to the users very quickly and easily. As the iPhone has enough power and performance to do just about most of the stuff you can do on a  laptop, iPhone applications span a range of categories from education and productivity to games and entertainment.

iPhone provides developers with a platform to develop three types of applications.

  1. Web based applications – which uses JavaScript, CSS and HTML-5 technologies
  2. Native iOS applications- which are developed using Objective-C and Cocoa touch API
  3. Hybrid applications – Native applications with embedded web view

This article mainly covers the pen testing methodology of native iOS applications. However, some of the techniques explained here can also be used with web-based iOS applications.

Application Distribution model:

iOS developers use Apple Xcode developer tools and test their applications within the iOS simulator.  A simulator simulates an environment but it does not mimic many of the features and functionalities available on real devices. An iOS simulator compiles iOS applications to a local native code which is different from the Android emulator that compiles to ARM instructions. Though simulators allow basic development and testing, it is not sufficient for many applications which require the use of full hardware power, performance and features which are only available on real devices. To test these types of applications on real devices, developers have to subscribe to Apple’s iOS Developer Program because the iPhone is only allowed to run Apple signed applications. Mandatory Code Signing mechanism implemented in iOS requires that all the native code running on the device should be signed by a known or trusted certificate. Upon subscription to the iOS Developers Program, Apple issues a signed provisioning profile that configures the iOS device to permit the execution of code signed by a developer certificate. Developers can apply for this program as an individual, company or university.

Based on the provisioning profile, application distribution models are categorized as 5 types.

Single device distribution:
Development provisioning profiles issued by Apple are tied to a device’s UDID (Unique Device ID).  This provisioning profile allows running a developer’s application on the device.  As it is tied to a particular device, the provisioning profile does not work on other devices. This model is used during single device testing.

Ad Hoc distribution:
Ad Hoc provisioning profiles issued by Apple are tied to the UDID’s of up to 100 other devices, including the iPad, iPhone or iPod touch.  The developer has to supply the UDID of 100 devices during the subscription process. This model allows developers to test their application on a wide range of devices.

In-house distribution:
Enterprise provisioning profiles issued by Apple permit the installation of applications on devices without configuring their UDIDs. This distribution is generally used by enterprises to distribute applications internally to their employees.

Over the air (OTA) distribution:
This model is designed to allow enterprise developers to send applications to individual users in their organization through e-mail or by hosting the application on a web server. The main problem with this kind of distribution is if someone outside the organization gets access to the link then they too can also install the application.

App Store distribution:
This is a centralized mechanism for distributing Apple signed applications. Upon submitting the application to Apple, Apple verifies it against the App Store review guidelines and approves it if the application follows all the review guidelines. After the approval, Apple will re-sign the application with an Apple signing certificate and make it available for download in the App Store.

Penetration Testing

In this section we are going to focus on iOS applications rather than the iPhone operating system itself. Actually there is an overlap between the iPhone OS security and the iPhone application security. So understanding the iOS platform and its security technology will help penetration testers properly assess the security of iPhone applications.

The main areas of focus while assessing the security of iPhone applications are –

  • Application traffic analysis
  • Privacy Issues
  • Local Data Storage
  • Caching
  • Reverse Engineering
  • Unmanaged code
  • URL Schemes
  • Push Notifications

 

Setup:

A simulator does not provide the actual device environment, so all the penetration testing techniques explained in this article are specific to a physical device. iPhone 4 with iOS 5 will be used for the following demonstrations.

To perform pentesting we need to install a few tools on our device. These tools are not approved by Apple. Code signing restrictions in iOS do not allow us to install the required tools on the device. To bypass the code signing restrictions and run our tools we have to JailBreak the iPhone. JailBreaking gives us full access to the device and allows us to run code which is not signed by Apple.  After JailBreaking, the required unsigned applications can be downloaded from Cydia.

Cydia is a parallel App Store for unsigned applications. JailBreaking puts your phone at great risk to some security vulnerabilities because the device allows any application to run even if it is not approved by Apple. Though we can assess the security of an application on a non-JailBroken iPhone, it is not possible to give complete coverage. JailBreaking makes the pen tester’s work easier and helps to provide full coverage of an application.

Tools like Pwnage, readsn0w and greenposi0n can be used to JailBreak the iPhone.

Tools required for pentesting:

From Cydia, download and install the applications listed below.

  • OpenSSH – Allows us to connect to the iPhone remotely over SSH
  • Adv-cmds : Comes with a set of process commands like ps, kill, finger…
  • Sqlite3 : Sqlite database client
  • GNU Debugger: For run time analysis & reverse engineering
  • Syslogd : To view iPhone logs
  • Veency: Allows to view the phone on the workstation with the help of veency client
  • Tcpdump: To capture network traffic on phone
  • com.ericasadun.utlities: plutil to view property list files
  • Grep: For searching
  • Odcctools: otool – object file displaying tool
  • Crackulous: Decrypt iPhone apps
  • Hackulous: To install decrypted apps

iPhone does not give us a terminal to see inside directories. Upon OpenSSH installation on the device, we can connect to the SSH server on the phone from any SSH client (ex:Putty, CyberDuck, WinScp). This gives us flexibility to browse through folders and execute commands on the iPhone.  An iPhone has two users by default. One is mobile and the other is a root user. All the applications installed on the phone run with mobile user privileges. But using SSH we can log into the iPhone as a root user, which will give us full access to the device. The default password for both the user accounts (root, mobile) is alpine.

Note: Best practice is to change the default SSH passwords of your device.

If your phone and the workstation are connected to Wi-Fi, you can directly SSH to the iPhone by typing in the IP address and username/password.

SSH to iPhone over Wi-Fi-

ssh root@iPhoneIP
password: alpine

If your phone and the workstation are not on Wi-Fi, you can still do SSH via the USB cable with the help of an iPhone tunnel (which can be downloaded from – http://code.google.com/p/iphonetunnel-usbmuxconnectbyport/).

SSH to iPhone over USB cable –

./iphone_tunnel -lport 2222
ssh -p 2222 root@127.0.0.1
password : alpine

Once we have a SSH connection, we can run commands directly on the iPhone. As iOS is a trimmed version of Mac OS , many of the MAC OS commands will work on the iPhone.

Application traffic analysis 

Pen testing iPhone applications isn’t all that different because client-side applications still interact with the server-side components over a network using some protocols. So it also involves network pentesting and web application pentesting.  The primary goal in traffic analysis is to capture and analyze the network traffic to find vulnerabilities.

iPhone applications may transmit data to the server in any of these communication mechanisms:

  • Clear text transmission, such as http
  • Encrypted channel, such as https
  • Custom protocols or Low level streams

It’s 2012 and applications are still using clear text transmission protocols like http.  In general, mobile applications are more prone to MITM attacks because most people access them over WIFI. An attacker who has access to the same Wi-Fi can run tools like FireSheep and hijack user sessions. As plain text transport protocols are vulnerable to MITM attacks, applications which transmit sensitive data must use encrypted communication protocols like https.  During pen testing, observe whether the application is transmitting any sensitive data over the encrypted channel or not. Application traffic can be captured by configuring the proxy settings available in iPhone. Upon setting up a proxy, the iPhone routes its traffic through the configured proxy.

Configuring Proxy

The screenshots below illustrates the required settings in an iPhone workstation (IP-192.168.1.4) required to capture http application traffic.

1. Navigate to the Settings application

iPhone settings menu

2.Turn on Wi-Fi

iPhone-Turn on Wi-Fi

3. Choose a network and click on the blue arrow corresponding to it

View iPhone ip address

4. Choose ‘Manual’ and setup a proxy IP (ex: 192.168.1.4)

Proxy settings in iPhone

5. On your workstation, Open Burp Suite and navigate to Proxy->Options,
Edit proxy listeners – enter ‘port’ as 8080, disable ‘loopback only’ and select ‘support invisible’

Burp proxy to MITM iPhone applications

6. Now browsing any http website or http application in iPhone routes the traffic to your workstation and will display in Burp Suite.

Note: Charles proxy is also used instead of burp proxy.

The same proxy settings also work for https traffic as well. But capturing iPhone application https traffic is little tricky. In SSL communication, browser based applications automatically validate the server-side certificate; whereas in native iOS applications, the developer has to explicitly write the code to validate server certificates.  Coding mistakes at this point may lead the application to accept any server certificate. When an application fails to validate the server certificate, attackers can use any fake certificate and perform MITM attacks.

One common mistake that we see in iPhone application development is the use of allowanyhttpscertificateforhost (NSURLRequest) or continueWithoutCredentialForAuthenticationChallenge (NSURLConnection) function call. Applications which implement these functions accept any certificate even if it is not issued by the original server. Also the application users do not even get a certificate warning. While pentesting, check whether the application is validating the certificates properly or not. If the application validates server-side certificates properly, then it will display a certificate error message when it receives an invalid certificate. It also does not allow the user to use that application or proceed further with the invalid certificate.

To capture the SSL traffic of these applications during pen testing, first we have to add a proxy CA certificate to the iPhone trusted certificates list. Later if the application receives a proxy certificate it will not display any certificate error because we told our iPhone to trust that certificate.  This will allow us to capture the https traffic. The same technique is applicable to other protocols which work on certificates.

The video below demonstrates the MITM https application traffic.

Apart from http and https protocols iPhone applications may also use custom protocols or low level socket communication APIs (NSStreams, CFStreams). The MITM techniques explained above would not work to capture the network traffic of these applications. In order to capture the low level traffic of these applications download and install tcpdump from Cydia on iPhone. Upon installation of tcpdump, connect the iPhone over SSH and run the commands below to capture traffic and write it into a .pcap file.

ssh root@iphone-IP
password: alpine
tcpdump -w traffic.pcap

Connect to the phone using a GUI SSH client like Cyberduck. Browse to the folders and copy the recently created .pcap file to your workstation. Next, open the .pcap file using a traffic capture tool like Wireshark. Use your protocol analyzing skills and identify the custom protocol. The same techniques can be used for the applications which do not respect the iPhone proxy settings. In these cases, DNS spoofing techniques can be used to perform MITM and for traffic capture.

Once you capture the traffic, typical web application pen testing attacks are done on the application server. Now you can look for SQL injection, authentication, authorization, session management, cryptography weaknesses and many more web related vulnerabilities.

Penetration Testing iPhone Applications is going to be covered in a series of articles. Below are the links for next articles. 

Part 2 : privacy issues and local data storage.
Part 3 keychain data storage and error log analysis.
Part 4Analysis of the  files stored in the application home directory, caching issues and error log analysis.
Part 5runtime analysis of iOS Applications.

 
 

Tags: , , , , , ,

Leave a Reply

 

 
  1. Penetration testing of iPhone Applications – Part 2 « SECURITYLEARN

    April 20, 2012 at 6:51 pm

    [...] the first part of this article, we discussed the iPhone application traffic analysis. In this part, we will take a [...]

     
  2. Altmanzscoreplus

    May 17, 2012 at 7:02 pm

    Thanks for sharing. I fears many may misuse the information you have shared and may be helpful for iphone application developers to rethink/remodel the development process.

     
    • Satish B

      May 18, 2012 at 5:34 pm

      My goal here is to educating developers and helping them to write secure code.
      May be 1% of people misuse. But 99% will get benefited :)

       
      • Anurag

        November 8, 2012 at 5:09 pm

        Good work satish

         
  3. Anonymous

    December 4, 2012 at 1:32 pm

    I like the valuable information you provide in your articles.
    I will bookmark your weblog and check again here frequently.
    I am quite sure I will learn many new stuff right here!
    Best of luck for the next!

     
  4. srikant

    April 18, 2013 at 4:59 pm

    It is great to learn such things for me as I am into Mobile application testing only.

    I would like to request if this is explained in a more procedural way with the help of steps and images for a sample aplication.

     
    • satishb3

      April 18, 2013 at 8:03 pm

      Will definitely plan in future.

       
  5. Penetration testing of iPhone Applications – Part 4 | Mick's Mix

    April 23, 2013 at 4:11 pm

    [...] the first part of the article, we have discussed about the iPhone application traffic analysis. Second part of [...]

     
  6. sir_strae

    May 30, 2013 at 12:11 pm

    Thank you for posting this information. This is very useful!

     
  7. irreverentvegan.com

    June 29, 2013 at 5:20 pm

    I do believe all of the ideas you have offered to your
    post. They are really convincing and can certainly work.
    Nonetheless, the posts are too quick for starters.
    May just you please lengthen them a little from subsequent time?
    Thank you for the post.

     
  8. domu:

    July 21, 2013 at 4:40 am

    very nice post, i definitely love this web site, go on it