Главная
Study mode:
on
1
Intro
2
What's inside the smartphone?
3
Data acqusition methods
4
Cloud: backup, sync or just storage?
5
Cloud services: backups
6
Cloud data by platform
7
Apple keychains
8
Backup vs iCloud keychains
9
iOS keychain (credit card data)
10
iOS backup keychain protection classes
11
ITunes backup password breaking
12
Set up 2FA
13
arow proxy architecture
14
SRP protocol
15
Keychain recovery
Description:
Explore the intricacies of Apple's iCloud Keychain security in this revealing conference talk from HITB2017AMS. Delve into the various types of data synced and stored in iCloud, including contacts, calendars, notes, passwords, and credit card information. Discover how certain data, such as call logs, are transmitted to Apple servers even when syncing is disabled. Learn why two-factor authentication may not provide the level of protection users expect and how it can potentially make accessing sensitive information easier. Gain insights into data acquisition methods, cloud services, and the differences between backup and iCloud keychains. Examine iOS keychain protection classes, iTunes backup password breaking techniques, and the setup of two-factor authentication. Understand the arrow proxy architecture and SRP protocol used in iCloud security. Presented by Vladimir Katalov, CEO of ElcomSoft Co. Ltd., this 37-minute talk offers a comprehensive look at the vulnerabilities and complexities of Apple's cloud-based security systems. Read more

Breaking Apple's iCloud Keychain

Hack In The Box Security Conference
Add to list
0:00 / 0:00