25C3 - 1.4.2.3
25th Chaos Communication Congress
Nothing to hide
Referenten | |
---|---|
Collin Mulliner |
Programm | |
---|---|
Tag | Day 2 (2008-12-28) |
Raum | Saal 3 |
Beginn | 14:00 |
Dauer | 01:00 |
Info | |
ID | 2832 |
Veranstaltungstyp | lecture |
Track | Hacking |
Sprache der Veranstaltung | en |
Feedback | |
---|---|
Haben Sie diese Veranstaltung besucht? Feedback abgeben |
Exploiting Symbian
Symbian Exploit and Shellcode Development
SymbianOS is one of the major smart phone operating system and has been around for many years still exploitation has not been researched yet. The lack of proper exploitation techniques is mostly due to the fact that until the recent introduction of PIPS/OpenC (a POSIX API port) SymbianOS did not have the means for programmers to EASILY write insecure code.
The presented work will show that now it is possible to exploit buffer overflows on Symbian like on any other (mobile) platform. To do this we will show some proof-of-concept exploits and provide an overview on writing shellcode for SymbianOS.
Further we will show some short comings of the Symbian security model and discuss the possible impact. To do this we will show that it is possible to create a piece of (mobile) malware that is capable to sign itself.
We believe vulnerability exploitation will become the next big issue on SymbianOS because the current version of Symbian only permits installation of signed applications thereby shutting out currently existing Symbian worms. We believe worm authors will adapt soon.