Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Advanced Attacks Against PocketPC Phones

Type
Audio
Tags
PocketPC
Authors
Collin Mulliner
Event
Chaos Communication Congress 23th (23C3) 2006
Indexed on
Mar 27, 2013
URL
http://dewy.fem.tu-ilmenau.de/CCC/23C3/audio/23C3-1545-en-advanced_attacks_against_pocketpc_phones.mp3
File name
23C3-1545-en-advanced_attacks_against_pocketpc_phones.mp3
File size
43.5 MB
MD5
bef3924a2506eef4304585981f8880e1
SHA1
3e6f0eea4cfd2e678e94a27ac8da7b0af7ca2e95

Smart phones are the new favorite target of many attackers. Also most current attacks are harmless, since these mostly rely on user mistake or lack of better knowledge. Current attacks are mostly based on logic errors rather then code inject and often are only found by accident. The talk will show some real attacks against smart phones and the kind of vulnerability analysis which lead to their discovery. This talk is about a security analysis of the PocketPC MMS (Multimedia Messaging Service) client. We will start with some background information about some older attacks against mobile phones. In the next step we will introduce to PocketPC-based phones and their security. Further we will introduce to the Multimedia Messaging Service. Here we will show how it works and how MMS messages look like under the microscope. In the main part we analyze the PocketPC MMS client and build a fuzzer for it. Since we want avoid costs by sending real MMS messages we build our own virtual mms system and make PocketPC believe that this is the real thing. In the end we will present the bugs and vulnerabilities we found, including the methods for exploiting them such as how to build your own MMS-client. So far I planned to release all information that I have kept back at defcon (exploit code, mms-client, etc...).

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !