Intercepting iCloud Keychain
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Intro
Secret Syncing & Recovery in the Cloud
Designed to be Highly Secure
Critical Flaws Now Fixed
Prior Work & Presentations Covering iCloud Keychain
iCloud Keychain Components
Circle Protocol Illustrated
What happens when devices are lost while traveling?
iCloud Keychain Passwords Overview
How Does A New Device Join Without Approval?
Uncovering a hidden peer
Which Backups Contain the Cloud Identity Key?
iCloud Keychain Sync Transmits Data Across Apple Services
OTR KEX Messages
Pairwise, Fanout Negotiation
OTR Flaws
CVE-2017-2448 - SecVerify Signature And Mac
CVE-2017-2448 - Goto Fail Redux
CVE-2017-2448 - Sample Trigger in 32 Bytes
Signature Bypass Attack Impact
Apple's iCloud Keychain Security Goals (without OTR fix)
Stack Overlap Attack Impact
Wrapping up
Next Steps for the Security Industry
Questions?
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube