11B: Launch Attacks on Mobile Devices Flashcards
3.2 Given a scenario, research attack vectors and perform wireless attacks. 3.5 Explain common attacks and vulnerabilities against specialized systems.
1
Q
A method used by attackers to send out unwanted text messages, images, or videos to a mobile phone, tablet, or laptop using a Bluetooth connection.
A
BlueJacking
2
Q
A more aggressive attack than Bluejacking, as a malicious actor is able to read information from a victim’s Bluetooth device. The end goal is to glean sensitive data from the victim, like their contacts, calendars, email messages, text messages, etc.
A
BlueSnarfing
3
Q
Using a virtualized environment, this provides a safe environment to analyze malware.
A
Sandbox Analysis