Chapter 8 - Mobile Communications & IoT Flashcards
KingoRoot
Android rooting tool
TunesGo
Android rooting tool
OneClickRoot
Android rooting tool
MTK Droid
Android rooting tool
Rooting vs Jailbreaking
Rooting applies to android, Jailbreaking applies to iOs
evasi0n7
Tool for jailbreaking iOS device
GeekSn0w
Tool for jailbreaking iOS device
Pangu
Tool for jailbreaking iOS device
RedSn0w
Tool for jailbreaking iOS device
Absinthe
Tool for jailbreaking iOS device
Cydia
Tool for jailbreaking iOS device
What are 3 jailbreaking techniques?
Untethered, Semi-Tethered, Tethered
Untethered Jailbraking
Kernel remains patched after reboot, with or without a system connection
Semi-Tethered Jailbraking
Reboot no longer retains patch; must use installed jailbreak software to re-jailbreak
Tethered Jailbreaking
Reboot removes all jailbreaking patches; phone may get in boot loop requiring USB to repair
Jailbreak Type: Userland Exploit
Found in the system itself; gains root access; does not provide admin access can be patched by Apple
Jailbreak Type: iBoot Eexploit
Found in bootloader called iBoot; uses vulnerability to turn codesign off; semi-tethered ; can be patched
Jailbreak Type: BootROM exploit
Allow access to file system, iBoot and custom boot logos; found in device’s first bootloader; cannot be patched
Mobile Attack - App Store Attacks
Since some App stores are not vetted, malicious apps can be placed there
Mobile Attack - Phishing
Mobile phones have more data to be stolen, just as vulnerable as desktop
Android Device Administration API
Allows for security-aware apps that may help
Mobile Attack - BYOD Attack
Dangerousfor organizations since not al phones can be locked down by default
What is MDM ?
Mobile Device Management. Basically group policy fo mobile phones
What are some MDM solutions?
Airwatch, XenMobile, IBM, MaaS360, MobiControl
Bluetooth - Discovery Mode
How the device reacts to inquiries from other devices
Bluetooth - Limited Discoverable
Restricts the action
Bluetooth - Nondiscoverable
Ignores all inquiries
Bluetooth - Pairing Mode
How the device deals with pairing requests
Bluetooth - Nonpairable
Rejectts all connection requests
Obad
Mobile device Trojan
Fakedefender
Mobile Device Trojan
TRAMPS
Mobile device trojan
ZitMo
Mobile device trojan
Mobile Spy
Mobile Spyware
Spyera
Mobile spyware
What are 3 common Mobile Attack platform tools?
Nmap, Network Spoofer, DroidSheep
Bluesmacking
Denial of Service against device
Bluejacking
Sending unsolicited messages
Bluesniffing
Attempt to discover bluetooth devices
Bluebugging
Remotely using a device’s features
Bluesnarfing
Theft of data from a device
Blueprinting
Collecting device information over bluetooth
Bluescanner
Finds devices around you
BT Browser
Another tool for finding and enumerating devices
Bluesniff & btCrawler
Sniffing programs with GUI
Bloover
Can perform Bluebugging
PhoneSnoop
Good spyware option for Blackberry
Super Bluetooth Hack
All-in-one package that allows you to do almost anything