Mobile Communications and IoT Flashcards
What are the 3 main attack types for Mobile devices?
- Device attacks (Browser, SMS, App, Rooted/Jailbroken devices)
- Network attacks (DNS cache poisoning, rogue/evil twin APs, packet sniffing)
- Cloud attacks (Databases, photos, cloud data e.g. Apple iCloud)
OWASP Top 10 Mobile Risks
M1 - Improper Platform Usage
Misuse of features or security controls (Android intents, TouchID, Keychain)
OWASP Top 10 Mobile Risks
M2 - Insecure Data Storage
Improperly stored data and data leakage
OWASP Top 10 Mobile Risks
M3 - Insecure Communications
Insecure handshaking, incorrect SSL, clear-text communication
OWASP Top 10 Mobile Risks
M4 - Insecure Authentication
Authenticating end user or bad session management
OWASP Top 10 Mobile Risks
M5 - Insufficient Cryptography
Code that applies cryptography to an asset, but is insufficient
OWASP Top 10 Mobile Risks
M6 - Insecure Authorization
Failures in authorization such as access rights
OWASP Top 10 Mobile Risks
M7 - Client Code Quality
Code level implementation problems
OWASP Top 10 Mobile Risks
M8 - Code Tampering
Binary patching, resource modification, dynamic memory modification
OWASP Top 10 Mobile Risks
M9 - Reverse Engineering
Reverse core binaries to find vulnerabilities and exploits
OWASP Top 10 Mobile Risks
M10 - Extraneous Functionality
Use of hidden or unknown functionality which could introduce series of vulnerabilities and exploits, such as backdoors that were inadvertently placed by coders
What is mean by untethered jailbroken device?
iOS device remains jailbroken after a reboot.
What is mean by tethered jailbroken device?
Device only usable in a single boot when jailbroken this way, and patch is removed upon reboot. Device may get stuck in a boot loop if not repaired via computer based tools.
What is meant by Semi-Tethered jailbreak?
iOS device remains jailbroken for a single session and removes the patch upon reboot, but is able to boot back up as normal without any issues such as boot loop.
List 3 different Bluetooth discovery modes
- Discoverable - Answers all inquiries
- Limited Discoverable - Restricts some actions
- Non-Discoverable - Ignores all inquiries
Why type of Mobile tools are:
1. KingoRoot
2. TunesGo
3. OneClickRoot
4. MTK Droid
Used for Android Rooting
What type of mobile tools are:
1. evasi0n7
2. GeekSn0w
3. Pangu
4. Redsn0w
5. Absinthe
6. Cydia
Used for iOS jailbreaking
What type of mobile exploits are these:
1. Userland Exploit
2. iBoot exploit
3. BootROM exploit
iOS jailbreaking exploits
Which mobile attack method uses the following tools:
1. Obad
2. Fakedefender
3. TRAMPS
4. ZitMo
Trojans, can be used in phishing
Which mobile attack method uses the following tools:
1. Mobile Spy
2. Spyera
Spyware
What type of mobile tools are:
1. BlueScanner
2. BT Browser
3. BlueSniff
4. btCrawler
5. Bloover
6. PhoneSnoop
7. Super Bluetooth Hack
Used for bluetooth hacking
What are the 3 basic components of IoT architecture?
- Sensing Technology
- IoT gateways
- Cloud