Specialized and Fragile Systems Flashcards
What is the process of installing applications that are unapproved for the device or that came from a source that is unapproved?
Sideloading
What is the process of exploiting a software vulnerability in a mobile OS that enables low-level execution with elevated privileges to bypass security mechanisms in a mobile OS?
Jailbreaking
What are the four classifications of a jailbroken device?
- Untethered - can be powered on and off without the help of a computer
- Tethered - a computer and software are required to boot the jailbroken device each time
- Semi-tethered - if the device is rebooted, you will need to jailbreak the device again to patch the kernel using a computer
- Semi-untethered - Same as semi-tethered but can be accomplished using the jailbreak app that is already installed on the device
What is the difference between an emulator and a simulator for mobile devices?
An emulator will mimic the hardware and operating system for the application being tested, but a simulator will only mimic the software environment
What is a tool Apple provides to allow researches to test iOS without having to defeat Apple’s protection mechanisms?
Apple Security Research Device (Apple SRD)
What kind of devices are mobile devices typically built on?
System on Chip (SoC), which is an integrated circuit that connects together common components that makes up a mobile device
What kind of interface is a hardware mechanism used for debugging and connecting to embedded devices on a circuit board?
JTAG - Joint Test Action Group
Though what feature does Apple mark memory locations as nonexecutable on its devices?
Execute Never (XN)
For iOS, how do third-party applications gain access to user information and extensions or other features?
Through dedicated entitlements, which are key-value pairs that allow authentication for applications outside of normal runtime parameters.
On which layer of a mobile Android voice do users interact?
Application layer
What are the primary components of an Android application?
- Activities - parts of the application the user can see
- Fragments - A behavior that is placed in an activity
- Intents - Used for sending messages between other components
- Broadcast receivers - Allow an application to receive notifications from other apps
- Content providers - A SQLite database to store data in the form of a flat file
- Services - Used to start intents, send notifications, and process data
Which layer of the Android operating system interacts with built-in hardware components on the device?
HAL - Hardware Abstraction Layer
Which standard describes the common areas of concern to be evaluated during mobile pentests?
The OWASP Mobile App Security Checklist
What is the difference between hybrid and progressive web apps?
Hybrid apps are a combination of web and native applications. They use a web-to-native abstraction layer to use both web and native features. Progressive web apps load like web pages, but allow offline use and can access limited device functions depending on the platform.
How does Apple ensure only approved applications are run in iOS?
Using code signing via certificate validation
What tool is a GUI used to install IPA files to an iDevice?
Cydia Impractor
What is the app store for “jailbroken” iDevices?
Cydia Package Manager
What is a modular framework designed for assessing the security of mobile apps on iOS, Android, Windows, Linux, macOS, and QNX?
Frida