CH. 15: Hacking Mobile Platforms
Chapter 15: Objectives • Understanding Mobile Platform Attack Vectors • Understanding Various Android Threats and Attacks • Understanding Various iOS Threats and Attacks • Understanding Various Windows Phone OS Threat and Attacks • Understanding Various BlackBerry Threats and Attacks • Understanding Mobile Device Management (MDM) • Mobile Security Guidelines and Security Tools • Overview of Mobile Penetration Testing
The Future of Mobile
Mobile Platform Attack Vectors pg 1917 Vulnerable Areas in Mobile Business Environment
Mobile Platform Attack Vectors pg 1918 OWASP Mobile Top Ten Risks
Mobile Platform Attack Vectors pg 1921 - 27 Anatomy of a Mobile Attack
Mobile Platform Attack Vectors pg 1928 How a Hacker can Profit from Mobile attacks
Mobile Platform Attack Vectors pg 1929 Mobile Attack Vectors
Mobile Platform Attack Vectors pg 1930 Mobile Platform Vulnerabilities and Risks
Mobile Platform Attack Vectors pg 1931 Security Issues Arising from App Stores
Mobile Platform Attack Vectors pg 1932 App Sandboxing Issues
Mobile Platform Attack Vectors pg 1933 Mobile Spam
Mobile Platform Attack Vectors pg 1934 SMS Phishing Attack (SMiShing) (Targeted Attack Scan)
• Most of the consumers access the internet through a mobile • Easy to set up a mobile phishing campaign • Difficult to detect and stop before they cause harm • Mobile users are not conditioned to receiving spam text messages on their mobile • No mainstream mechanism for weeding out spam SMS • Most of the mobile anti-virus does not check the SMS Mobile Platform Attack Vectors pg 1935 Why SMS is Effective and Examples You Can't Patch Stupid!
Mobile Platform Attack Vectors pg 1936 Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections Open or discoverable mobile devices are a considerable risk of Bluetooth attacks to include: BlueSnarfing – Theft of information from a wireless device through BT. Allows attacker access to contact lists, emails, text messages, photos, videos and any other data on the phone. Bluebugging – Attacker gaining remote access to use its features without victims knowledge. Attacker creates backdoor allowing sniffing of all data, receive calls, text messages, intercept phone calls and messages, as well as forwarding the messages. Attacker also has access to photos, videos and contact list.
Hacking Android OS pg 1939 Android OS
Hacking Android OS pg 1940 Android OS Architecture
• Introduced in Android 2.2 provides device administration features. Allowing rich control over employees devices in an enterprise environment. Hacking Android OS pg 1942 Android Device Administration API
You've reached the end of your free preview.
Want to read all 102 pages?
- Spring '15
- Tom Mabe
- App Store, Windows Mobile, Mobile operating system