Code Monkey home page Code Monkey logo

mobile-incident-response's Introduction

Incident Response for Android and iOS

Mobile is eating the world. From banking to online search, requests from mobile devices now exceed desktop computers.

This trend is not just about access, usability and consumer's preferences. Mobile is just as, if not more, susceptible to attack.

The goal of this book is to prepare companies for the inevitable increase in mobile compromise. We will use step-by-step tutorials, guiding the reader from setup through continuous monitoring of mobile devices.

mobile-incident-response's People

Contributors

0xroot-bf avatar ahoog42 avatar belenko avatar danifregia avatar dweinstein avatar ekristen avatar ghostbar avatar jcollado avatar jonitrythall avatar jporter22 avatar kstrzemp avatar samypesse avatar sbakken avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

mobile-incident-response's Issues

Only push TOC + Chapters 1-3 on the web and PDF

What: for our initial release, we only want to publish the TOC, chapters 1-3 in HTML, a PDF version that requires their email and an sign up form for updates.

Why: the rest of the content is draft and not ready for the public.

Allow readers to subscribe to updates

What: web user should be able to submit their email address and receive updates we send (via our marketing email tools) about the book

Why: this is a key way for us to engage and stay in touch with our readers and move them ultimately into customers.

Look at trusted certs

Probably relevant in an IR analysis.

This can be useful for mobile forensics, and also, it can be good to spot vulnerabilities in non-updated devices (which trust certificates that has been leaked or considered insecure). Also, it can be interesting for analyzing cheap phones where no firmware is available.

Narrowed mobile view of content

I had done some limited testing when styling and this was not an issue before so I'm not sure what happened.

On mobile (and semi and issue with small browser windows) the content area becomes much too narrow to read. The header is also wrapping oddly. This is across all browsers.

img_2291

img_2292

This may be as simple as overriding the overflow: hidden on the container.

Include lessons learned from Hacking Team compromise?

yesterday @ab and I discussed putting some things learned from Hacking Team data dump into either the mobile exploitation chapter or the case study. could be scattered in other places… Marco shared this blog from Lookout with me and it does a good job. For the book, we’d like want to do our own analysis but the two points in their conclusion was a big part of what I wanted to get across (besides showing a technique used for iOS):

  1. We now know that attackers around the world have both the intent to compromise iOS and Android devices and access to the technology to do so.
  2. Specific to iOS, devices do not need to be jailbroken to be compromised. The fact that Hacking Team possessed an enterprise certificate gave it the ability to infect any iOS device. This opens up the pool of potential victims way beyond the roughly 8% of people globally who have jailbroken their devices.

/cc @belenko @dweinstein

Basic styling for NS gitbooks

What: update the default gitbook style to be come compliant with the NS Style guide

Why: to ensure the user experience on our website is seamless, follows our Style Guide and builds our brand

Use SimpleLocker for Android IR example?

I'll attach a few files here but for a talk given in Vienna re: Mobile IR, Yonas used SimpleLocker as his IR example because:

  • It does not require a C2 server
  • It locks a device, demands money (def something that happens these days)
  • The encryption key is hardcoded in the source code

Unfortunately, I don't see the same scenario playing out on iOS but something to consider for Android. /cc @dweinstein @belenko @0Xroot

Deploy book to NS website

What: need the ability to deploy the book (static) from github to our staging and production websites using the gitbook toolchain

Why: lead gen baby!

section about cached data in system and applications

there's a lot of information that can be obtained from the various caches provided by the system or an individual application.

it would be nice to explore this in a section including:

  • geo location, wifi SSIDs stored by Android / iOS OS
  • applications storing recent locations:
    • weather apps
    • news apps that use geo to present local relevant news

all these data sources can be used to paint a clearer picture for incident response

Copy editing

What: over the past two weeks, we will have drafted large parts of chapters 1-3. Def need some copy editing

Why: so we don't look like a bunch of amateurs :-)

Mobile Attack Patterns

MITRE has a nice site with attack patterns and unfortunately it is mainly focused on Windows systems/networks.

I think we should spend some time doing something similar for Mobile to help paint a picture of what an attacker can/may do when getting initial code execution on a device:

MITRE's page they trademarked ATT&CK™

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) is a model and framework for describing the actions an adversary may take while operating within an enterprise network. The model can be used to better characterize and describe post-access adversary behavior. It both expands the knowledge of network defenders and assists in prioritizing network defense by detailing the post-initial access (post exploit and implant) tactics, techniques, and procedures (TTP) advanced persistent threats (APT) use to execute their objectives while operating inside a network.

I started a google doc for now to store a spreadsheet for examples from mobile persective, here

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.