Rich

269 posts

Rich

Rich

@preppycx

while(!secure) { learn(); hack(); }

Katılım Ekim 2011
269 Takip Edilen30 Takipçiler
Baptiste Robert
Baptiste Robert@fs0c131y·
Je confirme, Paul is right
Paul Moore - Security Consultant @Paul_Reviews

Hacking the #EU #AgeVerification app in under 2 minutes. During setup, the app asks you to create a PIN. After entry, the app *encrypts* it and saves it in the shared_prefs directory. 1. It shouldn't be encrypted at all - that's a really poor design. 2. It's not cryptographically tied to the vault which contains the identity data. So, an attacker can simply remove the PinEnc/PinIV values from the shared_prefs file and restart the app. After choosing a different PIN, the app presents credentials created under the old profile and let's the attacker present them as valid. Other issues: 1. Rate limiting is an incrementing number in the same config file. Just reset it to 0 and keep trying. 2. "UseBiometricAuth" is a boolean, also in the same file. Set it to false and it just skips that step. Seriously @vonderleyen - this product will be the catalyst for an enormous breach at some point. It's just a matter of time.

Português
13
67
471
90.6K
Rich
Rich@preppycx·
@searchspIoit @fs0c131y Bro who the cares about this? An attacker uses your code to verify he is 18? Wow much wow good job
English
1
0
0
23
Rich
Rich@preppycx·
@XuckFitter @fs0c131y Then the last thing you have to worry about is an app that can scan a QR code for sure. Personal information? 9/10 people have a photo of their id on their phone
English
0
0
0
14
XuckFitter
XuckFitter@XuckFitter·
@preppycx @fs0c131y APTs could have RCE on the device. Not necessarily an attacker that has physical access to the device.
English
1
0
0
29
Rich
Rich@preppycx·
@toxicTom @SibylleBerg Ich sehe du bist alt - deshalb lösche ich mein Kommentar davor. Hast du verstanden das man da nicht die Verifikation an sich um gehen kann? Sondern ein Angreifer sich mit deinen Daten verifizieren will? Verwechsle das nicht mit der Browser Extension
Deutsch
1
0
0
14
toxicTom
toxicTom@toxicTom·
@preppycx @SibylleBerg Der Angreifer IST der User, der einfach nur "Ab 18" sein will. Und natürlich hat er physikalischen Zugriff auf das Gerät.
Deutsch
1
0
0
36
DSM
DSM@dasiloup·
@preppycx @bluetouff Not exactly, app gives access to your identity to anyone in the middle. That means, EU !
English
1
0
0
55
☠ Bluetouff
☠ Bluetouff@bluetouff·
Vous pouvez reprendre du popcorn, le SDK est formel, il y en a d'autres comme ça qui arrivent...
Paul Moore - Security Consultant @Paul_Reviews

Bypassing #EU #AgeVerification using their own infrastructure. I've ported the Android app logic to a Chrome extension - stripping out the pesky step of handing over biometric data which they can leak... and pass verification instantly. Step 1: Install the extension Step 2: Register an identity (just once) Step 3: Continue using the web as normal The extension detects the QR code, generates a cryptographically identical payload and tells the verifier I'm over 18, which it "fully trusts". This isn't a bug... it's a fundamental design flaw they can't solve without irrevocably tying a key to you personally; which then allows tracking/monitoring. Of course, I could skip the enrolment process entirely and hard-code the credentials into the extension... and the verifier would never know.

Français
7
45
168
11.3K
Rich
Rich@preppycx·
@TheUnicornXXL @ppsde Ach und fast vergessen selbst wenn adb aktiv ist musst man den Zugriff auch erstmal erlauben
Deutsch
0
0
0
16
Stefan Klatt
Stefan Klatt@TheUnicornXXL·
Ein Angreifer kann sich root verschaffen ohne, dass das Gerät gerootet ist. Gab bisher genug Bugs, die dafür ausgenutzt wurden. Und wofür als Angreifer das Gerät entsperren? Man kann Applikationen viel vorgaukeln. Vieles lässt sich auch direkt ohne Zugriff auf die App realisieren, es reicht aus Textdateien zu manipulieren.
Deutsch
3
0
1
65
Piratenpartei Schweiz
🚨Die Altersverifikations-App der EU in 2 Minuten gehackt.🚨 Altersverifikation im Internet hilft so oder so nicht Kinder zu schützen! - Altersverifikation greift aber in die Privatsphäre aller Erwachsenen ein. - Altersverifikation führt dazu, dass BigTech und weitere Unternehmen ihre Datenbanken mit sensiblen persönlichen Informationen anreichern - alles auch anfällig für Leaks und Hacks. - Altersverifikation legt den Grundstein für Identifikation jedes Mausklicks im Internet Wir warnen schon seit Jahren davor und haben deshalb alleine das Referendum gegen das Jugendschutzgesetz ergriffen (@AusweiszwangN) und auch zwei Mal gegen die E-ID (@Referendum_eID). Hilf uns mit im Kampf für ein freies Internet. Werde Mitglied: piratenpartei.ch/mitgliedschaft/
Paul Moore - Security Consultant @Paul_Reviews

Hacking the #EU #AgeVerification app in under 2 minutes. During setup, the app asks you to create a PIN. After entry, the app *encrypts* it and saves it in the shared_prefs directory. 1. It shouldn't be encrypted at all - that's a really poor design. 2. It's not cryptographically tied to the vault which contains the identity data. So, an attacker can simply remove the PinEnc/PinIV values from the shared_prefs file and restart the app. After choosing a different PIN, the app presents credentials created under the old profile and let's the attacker present them as valid. Other issues: 1. Rate limiting is an incrementing number in the same config file. Just reset it to 0 and keep trying. 2. "UseBiometricAuth" is a boolean, also in the same file. Set it to false and it just skips that step. Seriously @vonderleyen - this product will be the catalyst for an enormous breach at some point. It's just a matter of time.

Deutsch
9
43
131
6.7K
Rich
Rich@preppycx·
@TheUnicornXXL @ppsde Wird der Angreifer sich kaum im diese App kümmern 3. ADB muss dafür auch erstmal aktiv sein. Und zu deinem letzten Punkt kann ich nur sagen - da müssen auch so viele Vektoren zutreffen, das es als relativ unwahrscheinlich gelten kann.
Deutsch
0
0
0
19
Rich
Rich@preppycx·
@TheUnicornXXL @ppsde Und um das obwohl du so viele tolle Sachen in deiner Bio stehen hast? Schade. 1. Bleibt es dabei das der Angreifer physikalischen Zugriff auf das device braucht 2. Sollte man so viel Energie reinstecken für eine LPE oder eine massive exploit chain zu verfolgen
Deutsch
0
0
1
35
Rich
Rich@preppycx·
@mitodoc Das juckt genau 0 1. Ein Angreifer braucht physikalischen Zugriff auf das Gerät 2. Das Gerät MUSS gerootet sein 3. Der Angreifer MUSS in der Lage sei das Gerät zu entsperren. Eins ist klar sollte das alles eintreffen ist die App dein geringstes Problem.
Deutsch
0
0
0
19
Gerrit Keferstein
Gerrit Keferstein@mitodoc·
In 2 Minuten die neue EU App gehackt. Fantastisch!
Paul Moore - Security Consultant @Paul_Reviews

Hacking the #EU #AgeVerification app in under 2 minutes. During setup, the app asks you to create a PIN. After entry, the app *encrypts* it and saves it in the shared_prefs directory. 1. It shouldn't be encrypted at all - that's a really poor design. 2. It's not cryptographically tied to the vault which contains the identity data. So, an attacker can simply remove the PinEnc/PinIV values from the shared_prefs file and restart the app. After choosing a different PIN, the app presents credentials created under the old profile and let's the attacker present them as valid. Other issues: 1. Rate limiting is an incrementing number in the same config file. Just reset it to 0 and keep trying. 2. "UseBiometricAuth" is a boolean, also in the same file. Set it to false and it just skips that step. Seriously @vonderleyen - this product will be the catalyst for an enormous breach at some point. It's just a matter of time.

Deutsch
4
7
52
1.4K
Rich
Rich@preppycx·
@OF_Schroedinger Das juckt genau 0 1. Ein Angreifer braucht physikalischen Zugriff auf das Gerät 2. Das Gerät MUSS gerootet sein 3. Der Angreifer MUSS in der Lage sei das Gerät zu entsperren. Eins ist klar sollte das alles eintreffen ist die App dein geringstes Problem.
Deutsch
0
0
0
14
Schrödinger
Schrödinger@OF_Schroedinger·
Warum wundert mich das jetzt kein bisschen?
Paul Moore - Security Consultant @Paul_Reviews

Hacking the #EU #AgeVerification app in under 2 minutes. During setup, the app asks you to create a PIN. After entry, the app *encrypts* it and saves it in the shared_prefs directory. 1. It shouldn't be encrypted at all - that's a really poor design. 2. It's not cryptographically tied to the vault which contains the identity data. So, an attacker can simply remove the PinEnc/PinIV values from the shared_prefs file and restart the app. After choosing a different PIN, the app presents credentials created under the old profile and let's the attacker present them as valid. Other issues: 1. Rate limiting is an incrementing number in the same config file. Just reset it to 0 and keep trying. 2. "UseBiometricAuth" is a boolean, also in the same file. Set it to false and it just skips that step. Seriously @vonderleyen - this product will be the catalyst for an enormous breach at some point. It's just a matter of time.

Deutsch
16
5
127
2.5K
Rich
Rich@preppycx·
@kernelshark Das gezeigte juckt genau 0 1. Ein Angreifer braucht physikalischen Zugriff auf das Gerät 2. Das Gerät MUSS gerootet sein 3. Der Angreifer MUSS in der Lage sei das Gerät zu entsperren. Eins ist klar, sollte das alles eintreffen ist die App dein geringstes Problem.
Deutsch
1
0
1
71
Rich
Rich@preppycx·
@SeeSchwalbe__ Diese Lücke juckt genau 0 1. Ein Angreifer braucht physikalischen Zugriff auf das Gerät 2. Das Gerät MUSS gerootet sein 3. Der Angreifer MUSS in der Lage sei das Gerät zu entsperren. Eins ist klar sollte das alles eintreffen ist die App dein geringstes Problem. Chillt mal
Deutsch
0
0
1
35
SeeSchwalbe
SeeSchwalbe@SeeSchwalbe__·
Warum bin ich nicht verwundert, das der IT Slop von Behörden Müll ist.
Paul Moore - Security Consultant @Paul_Reviews

Hacking the #EU #AgeVerification app in under 2 minutes. During setup, the app asks you to create a PIN. After entry, the app *encrypts* it and saves it in the shared_prefs directory. 1. It shouldn't be encrypted at all - that's a really poor design. 2. It's not cryptographically tied to the vault which contains the identity data. So, an attacker can simply remove the PinEnc/PinIV values from the shared_prefs file and restart the app. After choosing a different PIN, the app presents credentials created under the old profile and let's the attacker present them as valid. Other issues: 1. Rate limiting is an incrementing number in the same config file. Just reset it to 0 and keep trying. 2. "UseBiometricAuth" is a boolean, also in the same file. Set it to false and it just skips that step. Seriously @vonderleyen - this product will be the catalyst for an enormous breach at some point. It's just a matter of time.

Deutsch
6
0
83
2.8K
Rich
Rich@preppycx·
@f4micom This absolutely doesn’t matter. To perform this kind of action an attacker need access to your phone. And if he got his hands on the device, he need to know the code and even if he knows the code - the least thing you need to worry about is this app
English
0
0
0
26
f4mi ‼️
f4mi ‼️@f4micom·
HAHAHAHAHAHAHAHAHA
Paul Moore - Security Consultant @Paul_Reviews

Hacking the #EU #AgeVerification app in under 2 minutes. During setup, the app asks you to create a PIN. After entry, the app *encrypts* it and saves it in the shared_prefs directory. 1. It shouldn't be encrypted at all - that's a really poor design. 2. It's not cryptographically tied to the vault which contains the identity data. So, an attacker can simply remove the PinEnc/PinIV values from the shared_prefs file and restart the app. After choosing a different PIN, the app presents credentials created under the old profile and let's the attacker present them as valid. Other issues: 1. Rate limiting is an incrementing number in the same config file. Just reset it to 0 and keep trying. 2. "UseBiometricAuth" is a boolean, also in the same file. Set it to false and it just skips that step. Seriously @vonderleyen - this product will be the catalyst for an enormous breach at some point. It's just a matter of time.

Filipino
16
31
685
17.4K
Rich
Rich@preppycx·
@UK_Daniel_Card This absolutely doesn’t matter. To perform this kind of action an attacker need access to your phone. And if he got his hands on the device, he need to know the code and even if he knows the code - the least thing you need to worry about is this app
English
0
0
0
29
mRr3b00t
mRr3b00t@UK_Daniel_Card·
Paul is on fire today!
Paul Moore - Security Consultant @Paul_Reviews

Bypassing #EU #AgeVerification using their own infrastructure. I've ported the Android app logic to a Chrome extension - stripping out the pesky step of handing over biometric data which they can leak... and pass verification instantly. Step 1: Install the extension Step 2: Register an identity (just once) Step 3: Continue using the web as normal The extension detects the QR code, generates a cryptographically identical payload and tells the verifier I'm over 18, which it "fully trusts". This isn't a bug... it's a fundamental design flaw they can't solve without irrevocably tying a key to you personally; which then allows tracking/monitoring. Of course, I could skip the enrolment process entirely and hard-code the credentials into the extension... and the verifier would never know.

English
3
2
43
4.7K