3.7 Attacks & exploits: Attacks on Mobile Devices Flashcards

1
Q

Enterprise Mobility Management: what is Enterprise Mobility Management (EMM)?

A

Enables centralized management and control of corporate mobile devices
● Tracking
● Controlling
● Securing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enterprise Mobility Management: what is Mobile Device Management (MDM)? What technical control features a MDM has?

A

Tool for securing, managing, and monitoring mobile devices within an organization:
- Application control
- Password and Passcode functionality
- MFA requirement
- Token-based access
- Patch management
- Remote wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Enterprise Mobility Management: what is Remote Wipe?

A

Reverts a device back to its factory default settings and sanitizes the sensitive data from the device’s onboard storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Enterprise Mobility Management: what is Trust Certificates used for device? Is it a secure way to certify a device?

A

Globally identifies a trusted device within an organization. A trust certificate can be copied by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Enterprise Mobility Management: what is User-Specific Certificates used for device?

A

Assigned to a device to uniquely identify it on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Enterprise Mobility Management: what is Firmware Update?

A

Updates the baseband of the radio modem used for cellular, Wi-Fi, Bluetooth, NFC, and GPS connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Deployment Options: what are the different deployment options for MDM (5)? Explain each of them

A

o Corporate-Owned, Business Only (COBO): Purchased by the company for use by the employees only for work-related purposes (Most secure, Most restrictive, Most expensive)
o Corporate-Owned, Personally-Enabled (COPE): Provides employees with a company procured device for work-related and/or personal use
o Choose Your Own Device (CYOD): Allows employees to select a device from an approved list of vendors or devices
o Bring Your Own Device (BYOD): Allows employees to bring their own devices into work and connect them to the corporate network. BYOD brings up privacy concerns and is the most difficult to secure
o Virtual Mobile Infrastructure (VMI): Like VDI, but utilizes a virtualized mobile operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mobile Reconnaissance Concerns:

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mobile Device Insecurity: list the potentials insecurity related to mobile devices (4)

A

o Jailbreaking
o Rooting
o Sideloading
o Unauthorized app stores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mobile Device Insecurity: what is Jailbreaking?

A

Enables a user to obtain root privileges, sideload apps, change or add carriers, and customize the interface of an iOS device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mobile Device Insecurity: what is Rooting and how can you do it (2)?

A

▪ Custom Firmware/Custom ROM: A new Android OS image that can be applied to a device
▪ Systemless Root: Does not modify system partitions or files and is less likely to be detected than a custom ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile Device Insecurity: what is Sideloading?

A

Installs an app on a mobile device directly from an installation package instead of an official store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mobile Device Insecurity: what is Unauthorized app stores?

A

Android and iOS devices block the installation of third-party applications by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mobile Device Insecurity: list the security configuration to secure your mobile device (7)

A

o Device Configuration Profiles/Protocols
o Full Device Encryption
o VPN
o Location Services
o Geolocation
o Geofencing
o Geotagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mobile Device Insecurity: explain Device Configuration Profiles/Protocols

A

▪ Implement settings and restrictions for mobile devices from centralized mobile device management systems
▪ Profiles are mainly used for security, but can also provide a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mobile Device Insecurity: explain Full Device Encryption and their options on iOS, Android v6/v7/v9 and HSM

A

▪ iOS: 256-bit unique ID
▪ Android v6: 128-bit AES keys
▪ Android v7: File-based encryption
▪ Android v9: Metadata encryption
▪ MicroSD Hardware Security Module (HSM): Stores the different cryptographic keys securely inside the mobile device, like a TPM module in a desktop or laptop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Mobile Device Insecurity: explain VPN

A

Some MDM solutions provide a third-party VPN client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Mobile Device Insecurity: explain Location Services

A

Refers to how a mobile device is allowed to use cellular data, Wi-Fi, GPS, and Bluetooth to determine its physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Mobile Device Insecurity: explain Geolocation, Geofencing and Geotagging

A

o Geolocation: Uses a device’s ability to detect its location to determine if access to a particular resource should be granted
o Geofencing: Creates virtual boundaries based on geographical locations and coordinates
o Geotagging: Adds location metadata to files or devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Multifactor Authentication: what is the difference between Identification and Authentication?

A

o Identification: Provides identity
o Authentication: Validates identity

21
Q

Multifactor Authentication: explain MFA and authentication attributes (5)

A

Uses two or more means (or factors) to prove a user’s identity:
● Knowledge (Something you know)
● Ownership (Something you have)
● Characteristic (Something you are)
● Location (Somewhere you are)
● Action (Something you do)

22
Q

Multifactor Authentication: explain FAR, FRR and CER

A

o False Acceptance Rate (FAR): Rate that a system authenticates a user as authorized or valid when they should not have been granted access to the system
o False Rejection Rate (FRR): Rate that a system denies a user as authorized or valid when they should have been granted access to the system
o Crossover Error Rate (CER): An equal error rate (ERR) where the false acceptance rate and false rejection rate are equal

23
Q

Multifactor Authentication: explain the OTP algorithms (2)

A

▪ Time-Based One-Time Password (TOTP): Computes password from a shared secret and the current time
▪ HMAC-Based One-Time Password (HOTP): Computes password from a shared secret and is synchronized across the client and the server

24
Q

Multifactor Authentication: explain In-Band Authentication and Out-of-Band Authentication. Which one is the most secure?

A

▪ In-Band Authentication: Relies on an identity signal from the same system requesting the user authentication
▪ Out-of-Band Authentication: Uses a separate communication channel to send the OTP or PIN
o Implement 2FA or MFA that relies on out-of-band authentication system for high-security networks

25
Q

Mobile Device Attacks: which OS is the most secure and why ?

A

o iOS is considered a “walled garden” as it is more restrictive
o Android was developed to be an open operating system

26
Q

Mobile Device Attacks: explain Overreach of Permissions type of mobile attack

A

▪ Occurs when third-party apps request more permissions than they actually need
▪ Overreach of permissions can be used by penetration testers to their advantage

27
Q

Mobile Device Attacks: what Social Engineering attacks mobile device are exposed to?

A

Social Engineering
▪ Vishing
▪ Smishing
▪ Spamming

28
Q

Mobile Device Attacks: what Bluetooth attacks mobile device are exposed to? Explain them (2)

A

▪ Bluejacking: Sending unsolicited messages to a Bluetooth device. Sending information
▪ Bluesnarfing: Making unauthorized access to a device via Bluetooth connection. Taking information

29
Q

Malware Analysis: explain Sandboxing. What does it do?

A

A computing environment that is isolated from a host system to guarantee that the environment runs in a controlled and secure fashion.
● Determine if the file is malicious
● Effects of the file on a system
● Dependencies with files and hosts

30
Q

Malware Analysis: what features can you find in a sandboxing tool (8)?

A

● Monitor system changes
● Execute known malware
● Identify process changes
● Monitor network activity
● Monitor system calls
● Create snapshots
● Record file creation/deletion
● Dump virtual machine’s memory

31
Q

Malware Analysis: what is Reverse Engineering and how it can be use in malware analysis?

A

▪ The process of analyzing the structure of hardware or software to reveal more about how it functions
▪ Malware reverse engineers can determine who wrote the code by learning their patterns
▪ Malware writers often obfuscate the code before it is assembled or compiled to prevent analysis

32
Q

Malware Analysis: how reverse engineers attempt to identify malware? What are the strings to look for (3)?

A

By finding strings to use as a signature for rule-based detection. String to look for:
● Any sequence of encoded characters that appears within the executable file
● If the malware contains a string with a function called InternetOpenUrl, and another string that is a URL, it probably attempts to download something from that web address
● The Strings tool will dump all strings with over three characters in ASCII or Unicode encoding

33
Q

Malware Analysis: what is Disassembler?

A

A computer program that translates machine language into assembly language

34
Q

Malware Analysis: what is Machine Code?

A

The binary code executed by the processor, typically represented as 2 hex digits for each byte

35
Q

Malware Analysis: what is Assembly Code?

A

The native process or instruction set used to implement a program

36
Q

Malware Analysis: what is Decompiler?

A

Software that translates a binary or low-level machine language code into higher level code

37
Q

Malware Analysis: what is High-Level Code?

A

Real or pseudocode in human readable form that makes it easier to identify functions, variables, and programming logic used in the code

38
Q

Malware Analysis: what is Program Packer?

A

▪ A method of compression in which an executable is mostly compressed and the part that isn’t compressed contains the code to decompress the executable
▪ A packed program is a type of self-extracting archive
▪ A packed program does not necessarily mean it is malicious as many proprietary software also uses packing to deter theft and piracy
▪ Packed malware can mask string literals and effectively modify its signatures to avoid triggering signature-based scanners

39
Q

Mobile Device Tools: what is Drozer?

A

A complete security audit and attack framework that provides the tools to use and share public exploits for the Android OS

40
Q

Mobile Device Tools: what is Android APK Decompiler (APKX)?

A

A tool that can extract an APK file, an Android binary, or application back to its Java source code

41
Q

Mobile Device Tools: what is APK Studio?

A

A cross-platform Integrated Development Environment (IDE) used for writing the source code to make job applications for the Android operating system

42
Q

Mobile Device Tools: what is Android SDK (APK SDK)?

A

A large set of tools, libraries, documentation, code samples, processes, and guides created specifically for the Android OS

43
Q

Mobile Device Tools: what is Frida?

A

▪ An open-source tool that provides custom developer tools for penetration testers when conducting application pentesting on mobile apps
▪ Frida supports both iOS and Android applications, as well as Windows, macOS, and Linux

44
Q

Mobile Device Tools: what is Objection?

A

A runtime mobile exploration toolkit that is built to help assess the security posture of mobile applications, without requiring the device to be jailbroken

45
Q

Mobile Device Tools: what is Needle?

A

▪ An open-source, modular framework used to streamline the security assessment process on iOS application
▪ Frida is a better choice for iOS exploitation as Needle has already been decommissioned

46
Q

Mobile Device Tools: what is Ettercap?

A

A comprehensive toolkit for conducting on-path attacks

47
Q

Mobile Device Tools: what is Mobile Security Framework (MobSF)?

A

An automated, all-in-one mobile application pentesting, malware analysis, and security assessment framework capable of performing both static and dynamic analysis

48
Q

Mobile Device Tools: what is Burp Suite?

A

▪ Allows for the interception, inspection, and modification of the raw traffic passing through
▪ Burp Suite has a special module designed to test iOS devices

49
Q

Mobile Device Tools: what is Postman?

A

An API platform for building and using APIs that simplifies each step of the API lifecycle and streamlines collaboration