The goal of this whitepaper is to show that classic vulnerability analysis and exploitation is possible on Symbian OS smartphones. To this end, a set of methods and tools have been developed, and readily available standard software provided by Symbian has been modified to support debugging of memory mapped execute-in-place ROM. In this paper we will:
- Show how to statically analyze XIP ROM images (dumping, restoring import export tables, searching for unsafe function calls)
- Show how to enable run mode debugging of system binaries running from ROM IDA Pro, by patching the AppTRK debug agent
- Show other of the modified AppTRK. As an example, we will show a fully automated multimedia file fuzzer
- List and analyze the results of fuzzing the video- and audio codecs shipped with current Nokia smartphones
- Discuss further ideas and concepts, such as jailbreak shellcode, and an IRC bot trojan for Symbian
-----------------------------
https://www.sec-consult.com/files/SEC_Consult_Vulnerability_Lab_Pwning_Symbian_V1.03_PUBLIC.pdf
No comments:
Post a Comment