Chapter 8 - Mobile Communications & IoT Flashcards

1
Q

KingoRoot

A

Android rooting tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TunesGo

A

Android rooting tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OneClickRoot

A

Android rooting tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MTK Droid

A

Android rooting tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rooting vs Jailbreaking

A

Rooting applies to android, Jailbreaking applies to iOs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

evasi0n7

A

Tool for jailbreaking iOS device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GeekSn0w

A

Tool for jailbreaking iOS device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pangu

A

Tool for jailbreaking iOS device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RedSn0w

A

Tool for jailbreaking iOS device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Absinthe

A

Tool for jailbreaking iOS device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cydia

A

Tool for jailbreaking iOS device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 3 jailbreaking techniques?

A

Untethered, Semi-Tethered, Tethered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Untethered Jailbraking

A

Kernel remains patched after reboot, with or without a system connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Semi-Tethered Jailbraking

A

Reboot no longer retains patch; must use installed jailbreak software to re-jailbreak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tethered Jailbreaking

A

Reboot removes all jailbreaking patches; phone may get in boot loop requiring USB to repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Jailbreak Type: Userland Exploit

A

Found in the system itself; gains root access; does not provide admin access can be patched by Apple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Jailbreak Type: iBoot Eexploit

A

Found in bootloader called iBoot; uses vulnerability to turn codesign off; semi-tethered ; can be patched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Jailbreak Type: BootROM exploit

A

Allow access to file system, iBoot and custom boot logos; found in device’s first bootloader; cannot be patched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Mobile Attack - App Store Attacks

A

Since some App stores are not vetted, malicious apps can be placed there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Mobile Attack - Phishing

A

Mobile phones have more data to be stolen, just as vulnerable as desktop

21
Q

Android Device Administration API

A

Allows for security-aware apps that may help

22
Q

Mobile Attack - BYOD Attack

A

Dangerousfor organizations since not al phones can be locked down by default

23
Q

What is MDM ?

A

Mobile Device Management. Basically group policy fo mobile phones

24
Q

What are some MDM solutions?

A

Airwatch, XenMobile, IBM, MaaS360, MobiControl

25
Q

Bluetooth - Discovery Mode

A

How the device reacts to inquiries from other devices

26
Q

Bluetooth - Limited Discoverable

A

Restricts the action

27
Q

Bluetooth - Nondiscoverable

A

Ignores all inquiries

28
Q

Bluetooth - Pairing Mode

A

How the device deals with pairing requests

29
Q

Bluetooth - Nonpairable

A

Rejectts all connection requests

30
Q

Obad

A

Mobile device Trojan

31
Q

Fakedefender

A

Mobile Device Trojan

32
Q

TRAMPS

A

Mobile device trojan

33
Q

ZitMo

A

Mobile device trojan

34
Q

Mobile Spy

A

Mobile Spyware

35
Q

Spyera

A

Mobile spyware

36
Q

What are 3 common Mobile Attack platform tools?

A

Nmap, Network Spoofer, DroidSheep

37
Q

Bluesmacking

A

Denial of Service against device

38
Q

Bluejacking

A

Sending unsolicited messages

39
Q

Bluesniffing

A

Attempt to discover bluetooth devices

40
Q

Bluebugging

A

Remotely using a device’s features

41
Q

Bluesnarfing

A

Theft of data from a device

42
Q

Blueprinting

A

Collecting device information over bluetooth

43
Q

Bluescanner

A

Finds devices around you

44
Q

BT Browser

A

Another tool for finding and enumerating devices

45
Q

Bluesniff & btCrawler

A

Sniffing programs with GUI

46
Q

Bloover

A

Can perform Bluebugging

47
Q

PhoneSnoop

A

Good spyware option for Blackberry

48
Q

Super Bluetooth Hack

A

All-in-one package that allows you to do almost anything