CH15_CEHv9_Hacking Mobile Platforms.pptx - CH 15 Hacking Mobile Platforms Chapter 15 Objectives Understanding Mobile Platform Attack Vectors

CH15_CEHv9_Hacking Mobile Platforms.pptx - CH 15 Hacking...

This preview shows page 1 - 24 out of 102 pages.

CH. 15: Hacking Mobile Platforms
Image of page 1
Chapter 15: Objectives Understanding Mobile Platform Attack Vectors Understanding Various Android Threats and Attacks Understanding Various iOS Threats and Attacks Understanding Various Windows Phone OS Threat and Attacks Understanding Various BlackBerry Threats and Attacks Understanding Mobile Device Management (MDM) Mobile Security Guidelines and Security Tools Overview of Mobile Penetration Testing
Image of page 2
The Future of Mobile
Image of page 3
Module Flow
Image of page 4
Mobile Platform Attack Vectors pg 1917 Vulnerable Areas in Mobile Business Environment
Image of page 5
Mobile Platform Attack Vectors pg 1918 OWASP Mobile Top Ten Risks
Image of page 6
Mobile Platform Attack Vectors pg 1921 - 27 Anatomy of a Mobile Attack
Image of page 7
Mobile Platform Attack Vectors pg 1928 How a Hacker can Profit from Mobile attacks
Image of page 8
Mobile Platform Attack Vectors pg 1929 Mobile Attack Vectors
Image of page 9
Mobile Platform Attack Vectors pg 1930 Mobile Platform Vulnerabilities and Risks
Image of page 10
Mobile Platform Attack Vectors pg 1931 Security Issues Arising from App Stores
Image of page 11
Mobile Platform Attack Vectors pg 1932 App Sandboxing Issues
Image of page 12
Mobile Platform Attack Vectors pg 1933 Mobile Spam
Image of page 13
Mobile Platform Attack Vectors pg 1934 SMS Phishing Attack (SMiShing) (Targeted Attack Scan)
Image of page 14
Most of the consumers access the internet through a mobile Easy to set up a mobile phishing campaign Difficult to detect and stop before they cause harm Mobile users are not conditioned to receiving spam text messages on their mobile No mainstream mechanism for weeding out spam SMS Most of the mobile anti-virus does not check the SMS Mobile Platform Attack Vectors pg 1935 Why SMS is Effective and Examples You Can't Patch Stupid!
Image of page 15
Mobile Platform Attack Vectors pg 1936 Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections Open or discoverable mobile devices are a considerable risk of Bluetooth attacks to include: BlueSnarfing – Theft of information from a wireless device through BT. Allows attacker access to contact lists, emails, text messages, photos, videos and any other data on the phone. Bluebugging – Attacker gaining remote access to use its features without victims knowledge. Attacker creates backdoor allowing sniffing of all data, receive calls, text messages, intercept phone calls and messages, as well as forwarding the messages. Attacker also has access to photos, videos and contact list.
Image of page 16
Module Flow
Image of page 17
Hacking Android OS pg 1939 Android OS
Image of page 18
Hacking Android OS pg 1940 Android OS Architecture
Image of page 19
Introduced in Android 2.2 provides device administration features. Allowing rich control over employees devices in an enterprise environment. Hacking Android OS pg 1942 Android Device Administration API
Image of page 20
Image of page 24

You've reached the end of your free preview.

Want to read all 102 pages?

  • Spring '15
  • Tom Mabe
  • App Store, Windows Mobile, Mobile operating system

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture