Mobile Hacking

Preview:

DESCRIPTION

Seminar Royal Ambarukmo Yogyakarta

Citation preview

Identification techniques for encrypted data

Mobile Hacking

Oleh:Novizul Evendi

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

#id

Novizul Evendi

WakhostT'Lab

Hatsecure

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

#Agenda

● Mobile Technology

● Threats

● Mobile Attach / as Attach

● Defence

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

#Mobile Technology

is the technology used for cellular communication

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data#Mobile Operating Systems

Identification techniques for encrypted data

#Smart Phone

is a mobile phone built on a mobile operating system, with more advanced computing capability connectivity than a feature phone

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

#Threats

● Bluetooth

● Wifi

● App Cracked

● Root Access (Super Admin)

● Data Storage

● Internet

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

#Threats

● Bluetooth

Cloning device/information, Read SMS. Contact, dll

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

#Threats

● App Cracked

Virus, Keylogger, Malware, Trojan, Backdoor, dll

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

#Threats

● Root Access (ROOTED)

Dell File, Format File System, Backdoor, Malware, dll

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

#Threats

● Data Storage

Virus, Malware, Trojan, Backdoor, dll

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

#Threats

● Internet

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

#Mobile Hacking Tools

PWN PAD

PWN Phone

Linux ./Chroot

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

#Mobile Hacking Tools

PWN PAD

WIRELESS:● Aircrack-ng● Kismet● Wifite

NETWORK TOOLS: OpenVAS,nmap,netcat, tcpdump,

tshark, Ettercap-ng, SSLstrip v9, hydra, Metasploit4, pyrit, scapy, john (JTR)

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

#USB

- USB OTG cable (for USB host-mode)

- USB-Ethernet adapter

- USB Bluetooth adapter

- TP-Link High-gain 802.11b/g/n USB wireless adapter

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted dataMobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

#Mobile Hacking Tools

PWN Phone

- Includes Aircrack-NG, Metasploit, Kismet, GrimWEPa, SET, Fasttrack, Ettercap, nmap, and more

- Custom pentesting desktop with shortcuts to all tools!

- One-click evil AP, WEP cracker, and packet capture!

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

#Android Hacking Tools

- dSpoit

- Orbot

- WhatshappSniffer

- Wifinfect

- AnDOSid

- Anti

- SSH Server

- Linux BT ./chroot (ARM)

ROOTED

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

Conclusion

- Use Firewall / AntiVirus

- App UpToDate

- Don't use cracked App

- Security Lock

Mobile Hacking | 13 - 04 - 2013

Identification techniques for encrypted data

Terima Kasih

karuwak@tlab.co.idWww.hatsecure.com

DEMO...

Mobile Hacking | 13 - 04 - 2013