YoVDO

Breaking Apple's iCloud Keychain

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses Digital Forensics Courses Data Acquisition Courses Two-Factor Authentication Courses iOS Security Courses iCloud Courses

Course Description

Overview

Explore the intricacies of Apple's iCloud Keychain security in this revealing conference talk from HITB2017AMS. Delve into the various types of data synced and stored in iCloud, including contacts, calendars, notes, passwords, and credit card information. Discover how certain data, such as call logs, are transmitted to Apple servers even when syncing is disabled. Learn why two-factor authentication may not provide the level of protection users expect and how it can potentially make accessing sensitive information easier. Gain insights into data acquisition methods, cloud services, and the differences between backup and iCloud keychains. Examine iOS keychain protection classes, iTunes backup password breaking techniques, and the setup of two-factor authentication. Understand the arrow proxy architecture and SRP protocol used in iCloud security. Presented by Vladimir Katalov, CEO of ElcomSoft Co. Ltd., this 37-minute talk offers a comprehensive look at the vulnerabilities and complexities of Apple's cloud-based security systems.

Syllabus

Intro
What's inside the smartphone?
Data acqusition methods
Cloud: backup, sync or just storage?
Cloud services: backups
Cloud data by platform
Apple keychains
Backup vs iCloud keychains
iOS keychain (credit card data)
iOS backup keychain protection classes
ITunes backup password breaking
Set up 2FA
arow proxy architecture
SRP protocol
Keychain recovery


Taught by

Hack In The Box Security Conference

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera