PocketPC exploitation
I would like to contribute to the list a paper i just had published that
discusses the vulnerabilities of current virus detectors for pocket pc's, it
is scary to think that such simplistic detectors are the current state of
the art for such powerfull devices, it leads one to think that the lessons
of the past have not been learned, feedback on the paper is appreciated and
welcomed, i hope it helps those interested in this area of research feel
free to contact me. I should be presenting the paper at the workshop on
software security assesment tools, tactics and metrics in long beach
california in early november in conjunction with the automated software
engineering conference. the paper can be downloaded at
http://www.cs.fiu.edu/~jmora009/
Jose.
********************************************************************************************
Jose Andre Morales
Computer Specialist
Master of Science in Computer Science, FIU 2004
Email: jose@xxxxxxxxxxxxxxxx
********************************************************************************************
From: Nicolas RUFF <nicolas.ruff@xxxxxxxxx>
To: "Vuln-Dev@Securityfocus. Com" <vuln-dev@xxxxxxxxxxxxxxxxx>
CC: Jerome Athias <jerome.athias@xxxxxxx>
Subject: Re: PocketPC exploitation
Date: Mon, 19 Sep 2005 17:47:14 +0200
> i would like to know if some of you have experience with exploitation of
> PocketPCs and could give me some ways and tools (debugger...).
> since some vulns come ( http://www.securityfocus.com/bid/13807 )
> I know that writing a DLL (Fuser) is quite easy with eVC++ (Embedded),
> so a "download and execute"-like shellcode could be amazing...
Pointers to begin with :
- Microsoft Embedded Visual C++, with on-target debugging :
http://www.microsoft.com/downloads/details.aspx?FamilyID=1dacdb3d-50d1-41b2-a107-fa75ae960856&displaylang=en
- Phrack #63 "Hacking Windows CE"
http://www.phrack.org/phrack/63/p63-0x06_Hacking_WindowsCE.txt
- And the upcoming IDA Pro 4.9 with Windows CE on-target debugging :
http://www.datarescue.com/idabase/wince/index.htm
Regards,
- Nicolas RUFF
Security researcher @ EADS-CCR