1. Trang chủ
  2. » Công Nghệ Thông Tin

Ethical hacking and countermeasures - phần 36 pdf

90 123 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Ethical Hacking and Countermeasures Countermeasures Version 6 Module XXXVI Hacking Mobile Phones, PDA and Handheld Devices News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://news.zdnet.com/ Module Objective This module will familiarize you with: • Different OS in Mobile Phone This module will familiarize you with: • What Can A Hacker Do • Vulnerabilities in Mobile Phones • BlackBerry • PDA • PDA •iPod • Mobile: Is It a Breach to Enterprise Security •Viruses ii • A nt i v i rus • Security Tools • Mobile Phone Security Tips • Defending Cell Phones and PDAs against Attack EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Defending Cell Phones and PDAs against Attack Module Flow PDA Atii Different OS in PDA A n ti v i rus Mobile Phone What Can A Hacker Do iPod Security Tools Vulnerabilities in Mobile Phones Mobile Phone Security Tips Mobile: Is It a Breach to Enterprise Security BlackBerr y Viruses Defending Cell Phones and PDAs against Attack EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited y and PDAs against Attack Different OS in Mobile Phone Palm OS Windows Mobile Symbian OS Linux EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Different OS Structure in Mobile Phone Phone EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Evolution of Mobile Threat Mobile phone operating systems consist of open APIs which may be lnerable to attack v u lnerable to attack OS has a number of connectivity mechanisms through which malware can s p read • Connectivity to mobile networks and the Internet Malware propagates on the network by: p • Connectivity to mobile networks and the Internet • Symbian installation files (SIS) •SMS • MMS MMS • Bluetooth • Wireless •USB EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Infrared Threats Mobile Malware Propagation: • Malware propagates across the Internet and infects PCs • Infected PC can infect a smartphone via: •IR Bl t th • Bl ue t oo th • Infected smartphone can in turn propagate the malware through wireless LAN to other smartphones • Botnets on infected mobile devices wait for instructions from their owner DDoS Floods: • After getting instruction to launch DDoS floods, the mobile provider’s core infrastructure may be overwhelmed with a high volume of seemingly legitimate requests • It results into denial of service , failure in connectin g call as well as EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited ,g transmitting data What Can A Hacker Do Steal y our information: y • Hackers can download addresses and other personal information from your phone Rob Your Money • Hacker can transfer money from your account to another account Spying Access your voice mails EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Insert the virus Vulnerabilities in Different Mobile Phones Mobile Phones A format string vulnerability in Research In Motion Ltd.'s BlackBerry 7270 • Allows a remote hacker to disable the phone's calling features HTC HyTN using AGEPhone is vulnerable to malformed SIP messages sent over wireless LAN connections wireless LAN connections • Active calls are disconnected A buffer overflow vulnerability in Samsung SCH-i730 phones that run SJPhone SIP Clients Clients • Allows an attacker to disable the phone and slow down the operating system A Dell Axim running SJPhone SIP soft phones is vulnerable to denial of service attacks attacks • It can freeze the phone and drain the battery SDP parsing module of D-Link DPH-540 and DPH-541 Wi-Fi phones EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Allows remote attackers to disable the phone's calling features [...]... attachment sent to your PC e-mail inbox, and check all unsolicited messages and software on g PDAs and phones with suspicion EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Blackberry l kb EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited News Source: http://www.vnunet.com/ EC-Council Copyright © by EC-Council All Rights... channel between the BlackBerry server and handheld device is encrypted and cannot be properly inspected by typical security products EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited BlackBerry Wireless Security The BlackBerry Enterprise Solution uses Advanced Encryption Standard (AES) or Data Encryption Standard (Triple-DES) encryption methods to encrypt data... transit and is not decrypted between the BlackBerry Enterprise Server and the handheld devices EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited BlackBerry Signing Authority Tool It helps the developers by protecting the data and intellectual property It enables the developers to handle access to their sensitive APIs (Application Program Interfaces) and data... these ports and access private information or unleash the malicious code i i f i l h h li i d EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited PDA Virus: Brador Brador is the first known backdoor for the Pocket PC hand held hand-held devices When run, the backdoor copies itself to startup folder, mails the IP address of the PDA to the backdoor author, and starts... on PDAs End-user behavior policy states that PDAs should not be used for receipt or sending of e-mails with private and sensitive information By creating end-user behavior security policies, organizations can hold the end-users accountable for security violations Users can create a policy that requires the synchronization capability (hotsync) to be turned off EC-Council Copyright © by EC-Council All... data by using public and private signature keys It uses asymmetric private/public key cryptography to validate the authenticity of signature request It allows external developers to request, receive, and verify the signatures for accessing specified API and data in a secure environment g p EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Countermeasures Clean... server Encrypt application password and storage on the BlackBerry device Protect storage of user data on a locked Blackberry device Limit the Password authentication to ten attempts Use AES (Advanced Encryption Standard) technology to secure the storage of password keeper and password entries on BlackBerry device (e.g banking passwords and PINs) EC-Council Copyright © by EC-Council All Rights Reserved Reproduction... phone Trojan It tracks text messages and copies log files with the phone number of incoming and outbound phone calls EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Best Practices against Malware Make sure all host systems that you sync your devices have the latest anti-virus protection Activate Bluetooth when necessary and y turn it off when not in use Do... TigerSuite PDA includes remote scanning, service detection, penetration testing, and network and file tools such a hex editor IP subnetter host collaboration and remote editor, subnetter, collaboration, Trojan scanner Suite operates from Main Memory or Storage Card, and is compatible with wireless, IR and LAN Internet and/ or network connections d I t t d/ t k ti Features: • Hex Editor File Hack • IP... on bl kb is i l h blackberry devices and allows the device to be used as a proxy between the Internet and the Internal network “Attack vector" links and tricks the users by downloading the malicious software Blackjacking or Hijacking attacks exploit legal users' BlackBerry devices and replaces them on network with y p harmful devices EC-Council Copyright © by EC-Council All Rights Reserved Reproduction . Ethical Hacking and Countermeasures Countermeasures Version 6 Module XXXVI Hacking Mobile Phones, PDA and Handheld Devices News EC-Council Copyright © by EC-Council All Rights. attacks attacks • It can freeze the phone and drain the battery SDP parsing module of D-Link DPH-540 and DPH-541 Wi-Fi phones EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction. server and handheld device is encrypted EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited This channel between the BlackBerry server and handheld

Ngày đăng: 02/08/2014, 17:20

Xem thêm: Ethical hacking and countermeasures - phần 36 pdf

TỪ KHÓA LIÊN QUAN

w