3.7 Attacks & exploits: Attacks on Mobile Devices Flashcards
Enterprise Mobility Management: what is Enterprise Mobility Management (EMM)?
Enables centralized management and control of corporate mobile devices
● Tracking
● Controlling
● Securing
Enterprise Mobility Management: what is Mobile Device Management (MDM)? What technical control features a MDM has?
Tool for securing, managing, and monitoring mobile devices within an organization:
- Application control
- Password and Passcode functionality
- MFA requirement
- Token-based access
- Patch management
- Remote wipe
Enterprise Mobility Management: what is Remote Wipe?
Reverts a device back to its factory default settings and sanitizes the sensitive data from the device’s onboard storage
Enterprise Mobility Management: what is Trust Certificates used for device? Is it a secure way to certify a device?
Globally identifies a trusted device within an organization. A trust certificate can be copied by an attacker
Enterprise Mobility Management: what is User-Specific Certificates used for device?
Assigned to a device to uniquely identify it on the network
Enterprise Mobility Management: what is Firmware Update?
Updates the baseband of the radio modem used for cellular, Wi-Fi, Bluetooth, NFC, and GPS connectivity
Deployment Options: what are the different deployment options for MDM (5)? Explain each of them
o Corporate-Owned, Business Only (COBO): Purchased by the company for use by the employees only for work-related purposes (Most secure, Most restrictive, Most expensive)
o Corporate-Owned, Personally-Enabled (COPE): Provides employees with a company procured device for work-related and/or personal use
o Choose Your Own Device (CYOD): Allows employees to select a device from an approved list of vendors or devices
o Bring Your Own Device (BYOD): Allows employees to bring their own devices into work and connect them to the corporate network. BYOD brings up privacy concerns and is the most difficult to secure
o Virtual Mobile Infrastructure (VMI): Like VDI, but utilizes a virtualized mobile operating system
Mobile Reconnaissance Concerns:
Mobile Device Insecurity: list the potentials insecurity related to mobile devices (4)
o Jailbreaking
o Rooting
o Sideloading
o Unauthorized app stores
Mobile Device Insecurity: what is Jailbreaking?
Enables a user to obtain root privileges, sideload apps, change or add carriers, and customize the interface of an iOS device
Mobile Device Insecurity: what is Rooting and how can you do it (2)?
▪ Custom Firmware/Custom ROM: A new Android OS image that can be applied to a device
▪ Systemless Root: Does not modify system partitions or files and is less likely to be detected than a custom ROM
Mobile Device Insecurity: what is Sideloading?
Installs an app on a mobile device directly from an installation package instead of an official store
Mobile Device Insecurity: what is Unauthorized app stores?
Android and iOS devices block the installation of third-party applications by default
Mobile Device Insecurity: list the security configuration to secure your mobile device (7)
o Device Configuration Profiles/Protocols
o Full Device Encryption
o VPN
o Location Services
o Geolocation
o Geofencing
o Geotagging
Mobile Device Insecurity: explain Device Configuration Profiles/Protocols
▪ Implement settings and restrictions for mobile devices from centralized mobile device management systems
▪ Profiles are mainly used for security, but can also provide a vulnerability
Mobile Device Insecurity: explain Full Device Encryption and their options on iOS, Android v6/v7/v9 and HSM
▪ iOS: 256-bit unique ID
▪ Android v6: 128-bit AES keys
▪ Android v7: File-based encryption
▪ Android v9: Metadata encryption
▪ MicroSD Hardware Security Module (HSM): Stores the different cryptographic keys securely inside the mobile device, like a TPM module in a desktop or laptop
Mobile Device Insecurity: explain VPN
Some MDM solutions provide a third-party VPN client
Mobile Device Insecurity: explain Location Services
Refers to how a mobile device is allowed to use cellular data, Wi-Fi, GPS, and Bluetooth to determine its physical location
Mobile Device Insecurity: explain Geolocation, Geofencing and Geotagging
o Geolocation: Uses a device’s ability to detect its location to determine if access to a particular resource should be granted
o Geofencing: Creates virtual boundaries based on geographical locations and coordinates
o Geotagging: Adds location metadata to files or devices