4.9 • 696 Ratings
🗓️ 24 June 2016
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Friday, June 24th, 2016 edition of the Santernut Storm Center's Stormcast. |
| 0:07.6 | My name is Johannes Ulrich and the I'm recording from Jackson, Florida. |
| 0:11.8 | Portuguese security posted a nice blog about various bugs they found in Uber's platform as part of Uber's buck bounty. |
| 0:23.6 | The key vulnerability really sort of found among different issues that they point out here is |
| 0:29.6 | the ability to retrieve a user's unique UUID from the user's phone number. |
| 0:36.6 | The UUID is large, hard to prude force, but of course a phone number isn't. |
| 0:43.3 | And once you have this unique ID, you're then able to access a number of different APIs |
| 0:50.3 | without additional authentication. |
| 0:53.3 | With this, an attacker could for example retrieve past |
| 0:57.6 | trips either from a driver's point of view or from a passenger's point of view and |
| 1:03.4 | conduct a number of other operations like for example retrieving the user's |
| 1:09.5 | email address. |
| 1:11.1 | Uber already has fixed these vulnerabilities, but nevertheless this report makes a pretty |
| 1:18.2 | good case study as to how different web vulnerabilities are being discovered and how they |
| 1:24.5 | can be exploited in particular in collaboration with mobile applications |
| 1:29.8 | that are being used by Uber. |
| 1:32.2 | And yesterday I mentioned how Apple did not encrypt the iOS kernel in the latest beta. |
| 1:40.0 | Turns out this was indeed done intentionally and Apple states they did it for performance reasons. |
| 1:46.8 | Of course, decrypting the kernel does add performance, does add battery usage and with that |
| 1:53.4 | they decided to just go with an unencrypted kernel. |
| 1:56.6 | This of course does not really put any user data at risk. |
| 2:00.0 | It does however open up some of the internals of how iOS works. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.