L18 - T18C - S1 – Root Access Security Concerns

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/10

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

11 Terms

1
New cards
  • Restricted

  • Changes

In iOS and Android, the user account created during setup is able to install apps and configure settings, but it is ______ from making any system-level ______

2
New cards

Privilege Escalation

An attacker's ability to gain higher-level access to a system or network by exploiting vulnerabilities or misconfiguration — (Goog)

  • Users who want to avoid the restrictions that some OS vendors, handset OEMs, and telecom providers put on the devices must use some type of _______

  • 2 types

    • Root Access

    • Jailbreak

3
New cards

The 2 types of Mobile Device Privilege Escalation

  • Root Access

  • Jailbreak

4
New cards

Root Access

Gaining superuser level access over an Android-based mobile device – (A+) 

  • Some vendors provide authorized mechanisms for users to access the root account on their device

  • For some devices a user must

    • Exploit a vulnerability

    • Use custom firmware

      • Essentially a new Android OS image applied to the device

5
New cards

Custom Firmware aka Custom ROM (In the context of Root Access Privilege Escalation)

This is a method for some Android users to gain access to the root account on their device

  • It is essentially a new Android OS image applied to the device

  • This can also be referred to as a custom ROM,

    • (after the term for the read-only memory chips that used to hold firmware)

6
New cards

Jailbreaking

Removes the protective seal and any OS specific restrictions to give users greater control over the device – (A+) 

  • iOS _____ is accomplished by booting the device with a patched kernel

    • For most exploits, this can only be done when the device is attached to a computer while it boots

      • (tethered _____ )

  • Term for exploits enabling the user to

    • Obtain root privileges,

    • Sideload apps (download apps not from official app store)

    • Change or add carriers

    • Customise the interface

7
New cards

True

  • However, the main goal is to gain unrestricted system-level access to the OS by subverting the security controls built into the OS

True or False: Rooting or jailbreaking mobile devices has the side effect of leaving many security measures permanently disabled

8
New cards

Safety consequences of Jailbreaking & Custom Firmware/ROM

  • If the user has root permissions

    • Essentially any management agent software running on the device is compromised

  • If the user has applied a custom firmware image

    • They could have removed the protections that enforce segmentation of corporate workspaces

  • The device can no longer be assumed to run a trusted OS

9
New cards

True

  • MDM suites also have routines to prevent access to an enterprise app, network, or workspace in response to this

True or False: Mobile-device management (MDM) suites have routines to detect a rooted or jailbroken device or custom firmware with no valid developer code signature

10
New cards
  • Containerisation

  • Cryptography

  • ______ and enterprise workspaces can use ______ to protect the workspace In a way that is much harder to compromise than a local agent (local device software/process on phone) even from a rooted/jailbroken device

11
New cards

Developer Mode

Mobile device feature/mode designed for testing apps during development that may weaken corporate security protections if misused – (A+) 

  • Makes advanced configuration settings and diagnostic/log data available

  • Should

    • Be used only for actual app development work

    • Not be enabled routinely

  • Can purposefully be misused to install bootleg apps without jailbreaking

  • Devices with ____ enabled can be blocked by MDM software