25C3 - 1.4.2.3

25th Chaos Communication Congress
Nothing to hide

Referenten
Collin Mulliner
Programm
Tag Day 2 (2008-12-28)
Raum Saal 3
Beginn 14:00
Dauer 01:00
Info
ID 2832
Veranstaltungstyp lecture
Track Hacking
Sprache der Veranstaltung en
Feedback

Exploiting Symbian

Symbian Exploit and Shellcode Development

SymbianOS is one of the major smart phone operating system and has been around for many years still exploitation has not been researched yet. The lack of proper exploitation techniques is mostly due to the fact that until the recent introduction of PIPS/OpenC (a POSIX API port) SymbianOS did not have the means for programmers to EASILY write insecure code.

The presented work will show that now it is possible to exploit buffer overflows on Symbian like on any other (mobile) platform. To do this we will show some proof-of-concept exploits and provide an overview on writing shellcode for SymbianOS.

Further we will show some short comings of the Symbian security model and discuss the possible impact. To do this we will show that it is possible to create a piece of (mobile) malware that is capable to sign itself.

We believe vulnerability exploitation will become the next big issue on SymbianOS because the current version of Symbian only permits installation of signed applications thereby shutting out currently existing Symbian worms. We believe worm authors will adapt soon.

Anhängte Dateien

Archived page - Impressum/Datenschutz