Results 1 to 3 of 3
  1. #1
    i O S Editor
    HerpeGanaSyphilli
    -Control's Avatar

    Badge

    Join Date
    Sep 2012
    Location
    Getting a BlowJob From SIRI
    Posts
    651
    Points
    1,464
         User Info     Contact     Gamer ID
    Join Date
    Sep 2012
    Location
    Getting a BlowJob From SIRI
    Posts
    651
    Points
    1,464
    Gamer IDs

    PSN ID: CONTROLABLEx

    Default Never trust SMS: iOS text spoofing



    This is written by Pod2g:

    pod2g's iOS blog

    I mentioned it on twitter a few days ago, I found a flaw in iOS that I consider to be severe, while it does not involve code execution. I am pretty confident that other security researchers already know about this hole, and I fear some pirates as well.

    The flaw exists since the beginning of the implementation of SMS in the iPhone, and is still there in iOS 6 beta 4. Apple: please fix before the final release.

    A SMS text is basically a few bytes of data exchanged between two mobile phones, with the carrier transporting the information. When the user writes a message, it is converted to PDU (Protocol Description Unit) by the mobile and passed to the baseband for delivery.

    PDU is a protocol that is pretty dense, allowing different types of messages to be emitted. Some examples : SMS, Flash SMS, Voice mail alerts, EMS, ...
    The specification is large and pretty complex. As an example, just to code the data, there are multiple possible choices : 7bit, 8bit, UCS2 (16bit), compressed or not, ...

    If you either own a smartphone, or a modem and an account in a SMS gateway, you can send texts in raw PDU format (some services also exist to send a text with an HTTP request in raw PDU format). For the easiest smartphone option, there are different tools available online. I made one for the iPhone 4 that I will publicize soon.

    In the text payload, a section called UDH (User Data Header) is optional but defines lot of advanced features not all mobiles are compatible with. One of these options enables the user to change the reply address of the text. If the destination mobile is compatible with it, and if the receiver tries to answer to the text, he will not respond to the original number, but to the specified one.
    Most carriers don't check this part of the message, which means one can write whatever he wants in this section : a special number like 911, or the number of somebody else.

    In a good implementation of this feature, the receiver would see the original phone number and the reply-to one. On iPhone, when you see the message, it seems to come from the reply-to number, and you loose track of the origin.

    Why is it an issue ?

    pirates could send a message that seems to come from the bank of the receiver asking for some private information, or inviting them to go to a dedicated website. [Phishing]
    one could send a spoofed message to your device and use it as a false evidence.
    anything you can imagine that could be utilized to manipulate people, letting them trust somebody or some organization texted them.

    Now you are alerted. Never trust any SMS you received on your iPhone at first sight.

    0 Not allowed! Not allowed!


  2. #2
    Does Not Exist
    Phantom
    D.N.E's Avatar
    Join Date
    Nov 2011
    Location
    u know where
    Posts
    2,084
    Points
    3,510
         User Info     Contact     Gamer ID
    Join Date
    Nov 2011
    Location
    u know where
    Posts
    2,084
    Points
    3,510
    Gamer IDs

    Steam ID: redshift70

    Default

    Holy shit. Thanks for the warning man. Ill tell all my friends at school about this shit ( Some have iPhones and are fucktards that would fall into this trap )

    0 Not allowed! Not allowed!

  3. #3

    Retired Prophet
    ToxicJew.'s Avatar
    Join Date
    Mar 2011
    Location
    S̢͎̳̞̲͈̪̳̻ͮͩt̟̳̏ͬ̔&#
    Posts
    7,781
    Points
    7,586
         User Info     Contact     Gamer ID
    Join Date
    Mar 2011
    Location
    S̢͎̳̞̲͈̪̳̻ͮͩt̟̳̏ͬ̔&#
    Posts
    7,781
    Points
    7,586

    Contact info:

    Youtube Channel: http://www.youtube.com/kennethbgoodin

    Default

    They still haven't fixed this? I remember posting info on here about it ages ago.

    0 Not allowed! Not allowed!
    ส็็็็็็็็็็็็็็็็็็็็็็็็็༼ ຈل͜ຈ༽ส้้้้้้้้้้้้้้้้้้้้้้้ส็็็็็็็็็็็็็็็็็็็็ ็็็็็༼ ຈل͜ຈ༽ส้้้้้้้้้้้้้้้้้้้้้้้

Bookmarks

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
All times are GMT -10. The time now is 11:19 AM.
Powered by vBulletin®
Copyright © 2016 vBulletin Solutions, Inc. All rights reserved.