Have you left your iPad unattended in a hotel room? Or perhaps, have seen an unattended iPad in locations like a coffee shop? All it takes is a brief moment of negligence for a third party to access them, and guess what, MILLIONS of people leave their iPads unattended everyday.
iOS security features such as the passcode lock are typically sufficient to protect the data on the device from being retrieved or manipulated. However, near to nothing is known about the security risk of the accessories often sold along the iPad (Apple Pencil, Apple SmartKeyboard). Can these connected accessories be manipulated to record your actions on the iPad, keystrokes, or launch attacks against the device itself?
In this session we will:
– Show how both devices house embedded ARM CPUs and run firmware that can be upgraded from the iPad
– Describe the firmware update process and discuss its security
– Demonstrate how we got started into reversing the firmware and evaluating the attack surface of these accessories
– Evaluate the security of the Apple Pencil and Apple SmartKeyboard and try to answer the questions above