Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
. Mobile Hacking and Cracking
#1

Hacking mobile devices
CONTENTS:
-Motivation / Introduction
-Current methods of attack
- -platform overview
-Other attacks
-Windows Mobile
-BlackBerry
-iPhone
-Symbian

Mobile security:
The mobile devices are complex and portable
- Many interfaces: WLAN, Bluetooth, infrared, UMTS are incorporated in the devices. The mobile devices such as the PDA, MDA and smartphone are all vulnerable to hacking.

Threats
The threats to the security of the conventional mobile phones can be classified as :
-Conventional threats
-Loss of Confidentiality and Integrity
- Availability
-ADDITIONAL mobile threats
- GPS Tracking
-Exploiting by camera

The attack vectors to the mobile devices:
The can be direct attacks, indirect attacks and the malware.
The direct attacks include the Classic Remote Exploits in which the Attacker sends special data that can crash the system , or Code. Tha communication medium to implment this can be done using the Bluetooth, WLAN, USB, UMTS / GPRS / EDGE / HSDPA, SMS / MMS etc. The effects of such attacks include fail of the system to the complete compromise of the data.

for more details, see:
http://ebookchoicean-ethical-guide-to-ha...fadia.html#
http://ebookchoicepdf/gsm-mobile-hacking.html
http://rapidsharefiles/43001155/hacking_...beyond.pdf
http://trifiniteDownloads/trifinite.pres...ackhat.pdf
Reply

#2

i am student of it iwant some info about given topic for the purpose of seminar so please send info.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.