MOD 17 - Hacking Mobile Platforms Flashcards
Agent Smith Attack
Persuade victim to install malicious app. The app then replaces legit apps on victim’s device. Attacker then produces a huge volume of irrelevant advertisements on device for financial gain. Optionally the attacker could steal sensitive information. Lots of attack options at this point.
AndroidManifest.xml
Every Android application must include this file. It describes essential info about the app, such as the app’s name, components, permissions, activities, services, broadcast receivers, etc. (this is demonstrated in an iLab)
Jailbreaking iOS devices
Gain full access
iOS Trustjacking
Exploits the iTunes Wi-Fi Sync functionality between an iPhone and a computer. Allows an attacker to capture sensitive information on the phone, even remotely.
- Trident
Spyware that attacks an iPhone to spy on the user
- Blackjacking
Hijacking someone’s Blackberry to gain access to their corp. network. Often uses the BBProxy tool.
- Spearphone attack
A malicious Android app gets installed that allows the attacker to “listen” to what’s coming out of your phone’s speaker.
- Reverse Engineering
Dissassembling and extracting the source code (of a mobile app for example) in order to find the underlying vulnerabilities.
Tethered Jailbreak:
device cannot boot up unless it is connected to a computer
Semi-Tethered Jailbreak:
device can boot on its own, but can’t use jailbreak functionality unless connected to a computer
Semi-Untethered Jailbreak:
device can boot on its own, jailbreak functionality is accessed by launching an app on the device
Untethered Jailbreak:
device can boot on its own, and jailbreak functionality is automatically enabled upon each bootup