iPhone data interception tool released

Powered by SC Magazine
 

Marlinspike provides a good reason to update iOS 4.3.5.

A near decade old tool has been updated with man-in-the-middle attack capabilites that can intercept traffic from Apple iPhones.

The attack tool sslsniff exploits a vulnerability disclosed by researchers Gregor Kopf and Paul Kehrer yesterday which allow traffic from iOS iPhones to be intercepted.

Apple released fix iOS 4.3.5 yesterday to fix the flaw.

The BasicContraints vulnerability affecting iPhones was first identified in 2002 by independent researcher Moxie Marlinspike who developed sslsniff to exploit the flaw.

Back then, it was used to exploit certificate chain weaknesses (pdf) in Webkit browsers and Microsoft CryptoAPI, affecting the likes of Firefox, Internet Explorer, Pidgin, AIM and Microsoft Outlook.

"It validated all the signatures in a certificate chain, but failed to check whether the intermediate certificates had a valid CA BasicConstraints extension se," Marlinspike said.

"This meant that you could take any old CA-signed certificate and use it to sign any other certificate."

The Linux-based sslsniff tool was updated with iOS fingerprinting support and can be downloaded here. Run (sslsniff -a -c -f ios -h -s -w iphone.log).

Copyright © SC Magazine, Australia


iPhone data interception tool released
Tim Parkinson, CC2.0
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 437

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 210

Vote