Showing posts with label IOS. Show all posts
Showing posts with label IOS. Show all posts

Sunday, April 13, 2014

Security: Heartbleed, Apple, MacOSX, iOS, Linux, and Android


Abstract:
Nearly every computing device today is connected together via a network of some kind. These connections open up opportunities or vulnerabilities for exploitation by mafia, criminals, or government espionage via malware. While computers such as MacOSX are immune, along with their mobile devices based upon iOS iPhone and iPads... huge numbers of Linux and Android devices are at risk!





Heartbleed:

 This particular vulnerability can be leveraged by many sources in order to capture usernames and passwords, where those account credentials can be later used for nefarious purposes. Nefarious includes: command and control to attack commercial, financial, government, or even launch attacks against entire national electrical grids; stealing money; stealing compute resources. The defect is well documented.


Apple and Android/Linux Vulnerabilities:

There are many operating systems which are vulnerable to this defect, but for this article, we are only really concerned about the mobile market.
While most of the buzz surrounding OpenSSL's Heartbleed vulnerability has focussed on websites and other servers, the SANS Institute reminds us that software running on PCs, tablets and more is just as potentially vulnerable.
Williams said a dodgy server could easily send a message to vulnerable software on phones, laptops, PCs, home routers and other devices, and retrieve up to 64KB of highly sensitive data from the targeted system at a time. It's an attack that would probably yield handy amounts of data if deployed against users of public Wi-Fi hotspots, for example.
While Google said in a blog post on April 9 that all versions of Android are immune to the flaw, it added that the “limited exception” was one version dubbed 4.1.1, which was released in 2012.
Security researchers said that version of Android is still used in millions of smartphones and tablets, including popular models made by Samsung Electronics Co., HTC Corp. and other manufacturers. Google statistics show that 34 percent of Android devices use variations of the 4.1 software.

The company said less than 10 percent of active devices are vulnerable. More than 900 million Android devices have been activated worldwide.
After taking a few days to check its security, the fruity firm joined other companies in publicly announcing how worried or secure its customers should feel.
“Apple takes security very seriously. IOS and OS X never incorporated the vulnerable software and key Web-based services were not affected,” an Apple spokesperson said.

Conclusions:
To give an adequate understanding regarding the number of mobile Android devices at risk, one could take the population of the United States, at roughly 317 Million people as a baseline. 90 million Android Linux based devices vulnerable, that is equivalent to nearly 28% of the population of the United States is at risk! This is no small number of mobile devices - there is a lot of patching that either needs to be done or mobile devices which should be destroyed. Ensure you check your android device!

Tuesday, March 20, 2012

Mobile Update: Android and Windows


Mobile Update: Android and Windows

Abstract:

Developers in an ecosystem will often foretell adoption by creating content to drive demand for a product. The mobile market has been gauged by this same phenomenon.

Developers and Android:

While the chart is not linear (a mistake, not to create this as a time-series graph), it seems to show some very interesting trends. Developer interest in Android has appeared to have peaked and declining under both phones and tablets; interest in iPhone development is showing an ever so slight decline; iPad holding steady; interest in Windows mobile is inclining; BlackBerry dropping like a proverbial stone.


People have been commenting that the wrong statistics are getting followed, it is not happening, marketshare is not accurate, etc. - but there seems to be a slight discontent with the Android market from a developer's standpoint.

This is not the entire story - Android has a terrific price point, marketshare grows for Android at an astounding rate (as we will see shortly.) There is still some level of comfort that developers and consumers have with iOS, but one can never know how long that will last for - the marketplace is fickle.

Windows Clunky & Crashy:

While Windows for mobile devices seems to be catching more developers market share, it still looks very clunky, during various demonstrations. Note the multiple [thick] cabling hanging off of the tablet on the left, one with what seems to be an ugly adapter... one would not be surprised if all those cables place a great deal of strain on the tablet connectors and reduce longevity. They certainly reduce the ability to use the tablet in a free-flowing way. If I was presenting at Convergence 2012, I would not want to use that device.


The worst possible thing happened (again) when Microsoft was presenting at Convergence 2012 - a crash and burn of their new tablet.


You've got to hand it to Kirill Tatarinov, the head of Microsoft's ERP division. The Russian Rocket was cool as a cucumber on Monday when a demo of the Windows 8 Metro UI running on a touch-screen tablet crashed and burned during the opening keynote of Convergence 2012.

Sometimes, one has to feel bad for these presenters. having done multiple demos in the past, it is not very fun to have something like this happen, but it is not uncommon for Microsoft. It does not get any better, once you have a conference facility filled with people, networking at it's capacity peak, and power being drawn on a massive scale.


Windows Sinking, Android Skyrocketing:

Last year, this time, Microsoft mobile handset users experienced crashing on a massive scale, with a patch. Under 1 year later, mobile Windows handset sales collapsed while Android skyrocketed with what appears to be brand-new marketshare. Apple continued to make measured, but modest gains.



Network Management Connection:

Wired infrastructure is critical, but it seems to quickly becoming relegated to back-office. Front-office work moved towards laptops (which started outselling PC's in 2003, 2005, 2008), which often had wireless built-in for mobility. The trend continues to move mobile with smart phones and tablets. The previous Gartner marketshare chart (not the percentages) tells all: increase in overall units from 81 million units sold to 115 million units sold in 1 year in the 3rd quarter!

Wireless is THE PLACE to be, in the network management world. If you do not have a grasp on your wireless network, you need to figure out how to do so. People are clearly becoming unteathered, regardless of what the Microsoft Mobile presenters are doing, with their tethered and crashing tablets.

Sunday, January 15, 2012

Mobile Computing: 2011 Summary


Mobile Computing: 2011 Summary

A Surprising Trend:


NetMarketShare published some interesting data, summarizing mobile OS usage in 2011 - Apple IOS and Google Android peaked while Oracle JavaME bottomed out in October 2011... but JavaME but reversed the trend, pushing Android into 3rd place in November and December 2011.

Between the Lines:
Android from Google uses Java Code stolen [improperly licensed] from now acquired Sun Microsystems, where Oracle is fighting to get their royalties restored. Android is little more than Linux combined with JavaSE. The combined Java mindshare in the mobile arena [combining Oracle's stolen JavaSE and JavaME] is almost equal to the Apple MacOSX UNIX based iOS.


Java is Competitive
The conclusion we can draw from this market share analysis is that Java on mobile clients is competitive. The uncertainty experienced by Android manufacturers continually being sued by operating system manufacturers and Google being sued by Oracle for Java license violations, however, continues to make Apple a secure ecosystem for developers.


The Future
With products used under Apple's iOS diversifying (i.e. iPad, iPhone, iPodTouch, AppleTV, etc.) - Apple iOS will remain competitive.

While JavaME manufacturers receive some indemnity (protection from lawsuits) - Android manufacturers have been giving more and more of their profit share to companies like Microsoft, whose patents were stepped on.

Once the Oracle lawsuit against Google has been settled, Java may be in a position to become more competitive, since the people who created the technology [JavaSE and JavaME], has cross-technology licensing agreements with Microsoft, and will be properly compensated, rather than a third-party [who is competing with their own Windows phone] sucks the profit well dry from Android.

Friday, April 30, 2010

Enabling SNMP Community Strings on a Cisco Router (and Other IOS Devices)

Abstract: We're enabling SNMP community strings (SNMP's concept of a password) on a Cisco router named 'C2600' running Cisco's IOS (Internetwork Operating System). The router has never previously been configured for SNMP.



WARNING: SNMP in IOS versions 11.x-12.0 had a security vulnerability. More here.


Notes: IOS is also used in other Cisco managed network equipment and the generic term 'device' will be used onward in reference to the router.
Full IOS commands are used but many can be shortened: 'configure terminal' to 'conf term'; 'show' to 'sh'. Pressing *Tab* autocompletes a command if the letter combination is unique. Entering 're' *Tab* will fail as it could be for 'reload', 'rename','restart', or 'resume'. Entering 'ren' *Tab* will complete to 'rename'. If you forget a command, the '?' *Enter* will display most of the commands.



C2600> enable

Enable mode is used to view a device's settings.



C2600# show running-config

If SNMP is mentioned it was previously configured.


C2600# configure terminal

Configure allows you to change the device's settings.



C2600(config)# snmp-server community 'public-string' RO

'RO' stands for 'Read-Only' meaning that someone who knows the device's public string can view the device's SNMP settings. A relatively harmless ability.



C2600(config)# snmp-server community 'private-string' RW (RW read-write)

RW stands for Read-Write meaning that someone who knows the private string can change the device's settings. Someone with this knowledge can ruin your plans for the day, especially if the device is thousands of miles away. An instance: here's instructions for "How To Copy Configurations To and From Cisco Devices Using SNMP"



Replace 'public-string' and 'private-string' with appropriate substitutions. The common default strings are 'public' & 'private'. These strings are not recommended for securing the device.



C2600(config)# exit

Exits configure mode back to enable mode.



C2600# show running-config

A few lines about SNMP should appear.



C2600# write memory

This writes the new settings to memory. If you skip this step, you'll need to start over.



To check that configuration was successful:

C2600# show snmp

Empty stats about usage will display if SNMP is correctly configured.