Haven’t really talked about it much here but recently finished up some research and my BlackHat USA 2014 presentation titled “Mobile Device Mismanagement” – http://www.slideshare.net/breenmachine/mobile-device-mismanagement.

360 Mobile Vision - 360mobilevision.com North & South Carolina Security products and Systems Installations for Commercial and Residential - $55 Hourly Rate. ACCESS CONTROL, INTRUSION ALARM, ACCESS CONTROLLED GATES, INTERCOMS AND CCTV INSTALL OR REPAIR 360 Mobile Vision - 360mobilevision.com is committed to excellence in every aspect of our business. We uphold a standard of integrity bound by fairness, honesty and personal responsibility. Our distinction is the quality of service we bring to our customers. Accurate knowledge of our trade combined with ability is what makes us true professionals. Above all, we are watchful of our customers interests, and make their concerns the basis of our business.

Unfortunately we couldn’t release much technical detail which isn’t my normal style – some vendors have been quite slow to patch and some of the issues are very serious (i.e. pre-authentication RCE on a system that appears to be storing everyone’s domain credentials in plaintext).

Overall the MDM stuff has been pretty interesting. The attack vectors are very realistic because these are systems that can not be firewalled off from the Internet, yet they expose some pretty sensitive functionality.

Also a shout out and reference to some work I’ve done with drone on vulnerabilities and some exploits we’ve whipped up for the Railo framework (an opensource implementation of ColdFusion).

It’s a bit of a mess, actually surprisingly bad when it comes to security. Drone’s done a good job with the details so I’m just going to leave this here:

http://hatriot.github.io/blog/2014/06/25/railo-security-part-one/
http://hatriot.github.io/blog/2014/07/24/railo-security-part-two/

Look forward to part 3 – it’s going to be good.

By admin