Lesson 11 - Targeting Mobile Devices Flashcards

1
Q

________ is a class of management software designed to apply security policies to mobile devices and apps in the enterprise

A

Enterprise Mobility Management (EMM)

MDM and Mobile App Management (MAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the “business logic process” and why is that important to mobile devices

A

Flow of information from the time the user requests access to the time the request hits a resource.

A vulnerability can exist in any of the steps taken to access the resource and can include the ability to modify cookies, escalate privelage and circumvent controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the threats that face mobile devices that are physical based

A

Deperimerization - employees take sensitive data outside of the corp permimeter and are not properly secured - exfiltration

Strained Infrastructure - too many devices can place strain on network and lead to an unintentional DoS

Forensic Complications - BYOD can prove to be difficult and compromise any investigation

Lost or Stolen Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the threat term when mobile devices are not patched in a timely manner

A

Patching Fragmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the type of attacks that can impact a mobile device if it has been jail breaked

A

Execution of activities using root

Over-reach of permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the network that involved Bluetooth enabled devices in close proximity called

A

Personal Area Network

Need to use Best Practice Guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the method used by attacker that sends out unwanted text messaged, images, or videos to a mobile phone, tablet, or laptop using a Bluetooth Connection

A

Bluejacking attack
typically an annoyance but can be used as a vector to carry our more insidious attacks

users will tend to trust these messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the more aggressive Bluetooth attack that allows a malicious actor to read information from a victims Bluetooth device

A

Bluesnarfing

both Bluejacking and Bluesnarking are ineffective against devices that are set in non-discoverable mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T or F Apple IoS devices are less secure than Android?

A

False
Android is less restrictive by design and one setting can make it possible to install apps from third-party sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Metasploit Frameworks tool to create a malicious apps for Android devices

A

msfvenom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name the common security suites for testing mobile devices

A

Kali LInux - ettercap, Android SDK, and Burpsuite

Mobile Security Framework (MobSF) - uses both Static and Dynamic Analyis

Mobile Security Testing Guide (OWASP) - intuitive assessment process. Recommendations and checklists. specs on testing resiliency against reverse engineering and tampering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the open source tool that includes custom developer tools that can be used for application PenTesting and works with a wide Range of OS

A

Frida

Dump Process memory
In process fuzzing
Anti-jailbreak (or root) detection
Change a programs behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the runtime exploration toolkits that works on IOS Devices and what tool does it compliment

A

Objection
scriptable debugger and it works with custom Frida scripts and can interact with with the filesystem on non- jailbroken iOS devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name some common App debuggers for Android devices

A

Drozer - open source software for testing vulnerablilities

APK File - app designed for Android

APKX - is an APK decompiler that allows you pull and analyze the Java Source code to see what is going on inside

APK Studio - Integrated dev env (IDE) designed so you can decompile and/or edit APK file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an API and what is a good tool to test the level of security

A

Set of commands that is used to send and receive data between systems.

Postman - interactive and automatic environment for interacting and testing HTTP API’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly