Professional Documents
Culture Documents
P la tfo r m s
M o d u le 1 6
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Hacking Mobile Platforms
CEH Q
E th ic a l H a c k in g a n d C o u n te rm e a s u re s v8
E xam 3 1 2 -5 0
In J u n e , 3 .7 m i l l i o n p h o n e s w o r l d w i d e b e c a m e i n f e c t e d w i t h
m a lw a r e , B e ijin g re s e a rc h e r f in d s .
M o b i l e m a lw a r e is r i s in g f a s t , in f e c t in g n e a r ly 1 3 m i llio n p h o n e s in t h e
w o r l d d u r i n g t h e y e a r f i r s t h a lf o f 2 0 1 2 , u p 1 7 7 % f r o m t h e s a m e
p e r io d a y e a r a g o , a c c o r d in g t o B e ijin g - b a s e d s e c u r it y v e n d o r N e t Q in .
D u r in g t h i s y e a r 's f i r s t h a lf , N e t Q in f o u n d t h a t m o s t o f t h e d e t e c t e d
m a lw a r e , a t 7 8 % , t a r g e t e d s m a r tp h o n e s r u n n in g A n d r o id , w it h m u c h
o f t h e r e m a in d e r d e s ig n e d f o r h a n d s e t s r u n n in g N o k ia 's S y m b ia n O S .
T h is is a r e v e r s a l f r o m t h e s a m e p e r io d a y e a r a g o , w h e n 6 0 % o f t h e
d e t e c t e d m o b ile m a lw a r e w a s d e s ig n e d f o r S y m b ia n p h o n e s .
S e c u rity N e w s
S o urce : h t t p : / / w w w . c o r n p u t e r w o r l d . c o m
In J u n e , 3 . 7 m i l l i o n p h o n e s w o r l d w i d e b e c a m e i n f e c t e d w i t h m a l w a r e , B e i j i n g r e s e a r c h e r f i n d s .
M o b i l e m a l w a r e is r i s i n g f a s t , i n f e c t i n g n e a r l y 1 3 m i l l i o n p h o n e s in t h e w o r l d d u r i n g t h e y e a r
fir s t h a lf o f 2 0 1 2 , u p 1 7 7 % f r o m th e s a m e p e rio d a y e a r ago, a c c o rd in g t o B e ijin g - b a s e d s e c u rity
v e n d o r N e tQ in .
In total, NetQin detected 17,676 mobile malware programs during 2012's first half, up 42%
from the previous six months in 2011.
About a quarter of the detected malware came from China, which led among the world's
countries, while 17% came from Russia, and 16.5% from the U.S.
In China, malware is mainly spread through forums, ROM updates, and third-party app stores,
according to NetQin. So-called "remote control" Trojan malware that sends spam ads infected
almost 4.7 million phones in China.
NetQin also detected almost 3.9 million phones in China being infected with money-stealing
malware that sends out text messages to trigger fee-based mobile services. The high number of
infections would likely translate into the malware's creators netting $616,533 each day.
The surge in mobile malware has occurred at the same time that China has become the world's
largest smartphone market by shipments. Android smartphone sales lead with a 68% market
share, according to research firm Canalys.
The country's Guangdong and Jiangsu provinces, along with Beijing, were ranked as the three
highest areas in China for mobile malware.
By Michael Kan
h ttp ://w w w .c 0 m p u te rw 0 rld .c 0 m /s/a rtic le /9 2 2 9 8 Q 2 /M 0 b ile m alw a re cases n early trip le in first
M o d u le O b je c tiv e s CEH
r----- —
j M o b i l e A t t a c k V e c to r s J G u id e lin e s f o r S e c u r in g W i n d o w s OS
D e v ic e s
j M o b i l e P la t f o r m V u ln e r a b i l it ie s a n d
R isks J B la c k b e r r y A t t a c k V e c to r s
j A n d r o i d OS A r c h it e c t u r e J G u id e lin e s f o r S e c u r in g B la c k B e r r y
j A n d r o i d V u ln e r a b ilit ie s D e v ic e s
j A n d r o i d T r o ja n s J M o b i l e D e v ic e M a n a g e m e n t ( M D M )
j S e c u rin g A n d r o i d D e v ic e s J G e n e r a l G u id e lin e s f o r M o b i l e P la t f o r m
j J a ilb r e a k in g iO S S e c u r ity
j G u id e lin e s f o r S e c u r in g iO S D e v ic e s J M o b i l e P r o t e c t io n T o o ls
j W i n d o w s P h o n e 8 A r c h it e c t u r e J M o b i l e P e n T e s tin g
U
M o d u le O b je c tiv e s
T h e m a i n o b j e c t i v e o f t h i s m o d u l e is t o e d u c a t e y o u a b o u t t h e p o t e n t i a l t h r e a t s o f
m o b ile p la tfo rm s and how to use th e m o b ile d e v ic e s s e c u re ly . T h is m o d u le m akes you
fa m ilia riz e w ith :
9 A n d r o i d OS A r c h i t e c t u r e 9 B la c k b e rry A tt a c k V e c to rs
9 A n d ro id V u ln e ra b ilitie s 9 G u i d e l i n e s f o r S e c u r i n g B l a c k B e r r y D e v ic e s
9 A n d ro id T ro ja n s 9 M o b i l e D e v ic e M a n a g e m e n t ( M D M )
M o d u le F lo w
M l
F o r b e t t e r u n d e r s t a n d i n g , t h i s m o d u l e is d i v i d e d i n t o v a r i o u s s e c t i o n s a n d e a c h s e c t i o n
d e a ls w i t h a d i f f e r e n t t o p i c t h a t is r e l a t e d t o h a c k i n g m o b i l e p l a t f o r m s . T h e f i r s t s e c t i o n d e a ls
w it h m o b ile p la tfo r m a tta c k v e c to rs .
• A n d ro id M o b ile T h re at
M o b ile T h re at • S y m b ia n b y T y p e Q2 2012
R e p o r t Q2 2012 • P o c k e t PC
( 5 ) J2M E
M o b ile T h re a t R e p o rt Q 2 2012
Source: http://www.f-secure.com
In the report, malware attacks on Android phones continue to dominate the other mobile
platforms. The most attacks were found in the third quarter of 2011. And in 2012, Q2 came in
at 40%.
FIG U R E 1 6 .1 : M o b ile T h r e a t R e p o r t Q 2 2 0 1 2
Note: T h e t h r e a t s t a t i s t i c s u s e d in t h e m o b i l e t h r e a t r e p o r t Q 2 2 0 1 2 a r e m a d e u p o f f a m i l i e s
a n d v a r ia n ts in s te a d o f u n iq u e file s .
M o b ile T h re a t b y T y p e Q 2 2012
S o urce : h t t p : / / w w w . h o t f o r s e c u r it v . c o m
M o b ile T h re a t
b y T y p e Q 2 2012
T r o ja n M o n it o r in g R is k w a r e A p p li c a t i o n A d w a re
Tool
FIGURE 1 6 .2 : M o b ile T h r e a t b y T y p e Q 2 2 0 1 2
I t is t h e d e f a u l t R O M ( o p e r a t i n g s y s t e m ) o f a n A n d r o i d d e v ic e
s u p p lie d b y t h e m a n u f a c tu r e r
CyanogenMod
I t is a m o d i f i e d d e v i c e R O M w i t h o u t t h e r e s t r i c t i o n s i m p o s e d b y
d e v ic e ’s o r ig in a l R O M
A l t e r i n g t h e d e v i c e O S u s i n g r o o t i n g o r j a i l b r e a k i n g in a w a y t h a t
c a u s e s t h e m o b ile d e v ic e t o b e c o m e u n u s a b le o r in o p e r a b le
e m p l o y e e s t o b r i n g t h e i r p e r s o n a l m o b i l e d e v ic e s t o t h e i r w o r k
p la c e
T e rm in o lo g y
T h e f o l l o w i n g is t h e b a s ic t e r m i n o l o g y a s s o c i a t e d w i t h m o b i l e p l a t f o r m h a c k i n g :
© Stock ROM: It is t h e d e f a u l t R O M ( o p e r a t i n g s y s t e m ) o f a n a n d r o i d d e v i c e s u p p l i e d b y
th e m a n u fa c tu re r
© CyanogenMod: It is a m o d i f i e d d e v i c e R O M w i t h o u t t h e r e s t r i c t i o n s i m p o s e d b y d e v i c e 's
o rig in a l R O M
Extracted s c r a p ’*® ״
a n d s c re e n
tand rootkit P r in t s c re e n
0f backup
APPlication U S B ^ e V a n d ' ° ss
m°drficati0n o copvto
\
0s׳n° dificatic
o $ r/1
Wp«cati0nv-
U n a p P r0 '
° o
M o b ile A tta c k V e c to rs
M a lw a re :
9 V ir u s a n d r o o t k i t
6 OS m o d i f i c a t i o n
D a ta E x filt r a tio n :
9 D a ta l e a v e s o r g a n i z a t i o n a n d e m a i l
9 P rin t scre e n a n d s c re e n sc ra p in g
9 C o p y t o USB k e y a n d lo ss o f b a c k u p
D a ta T a m p e r in g :
© U n d e te c te d ta m p e r a tte m p ts
© J a il-b ro k e n d e v ic e
D a t a Loss:
© U n a p p r o v e d p h y s i c a l a c ce s s
© Loss o f d e v i c e
M o b ile P la t f o r m V u ln e r a b ilit ie s
a n d R is k s
A p p S a n d b o x in g D ata S e c u rity
' 9
3
O S a n d A p p U p d a te s C o m m u n ic a tio n S e c u rity
5 ] 1 1
V 1 ׳' —דז
c ר
J a ilb r e a k in g a n d R o o tin g P h y s ic a l A tta ck s
6 ] 1 2
------------------------ - ■
.. ...:----------- J
M o b i l e p l a t f o r m v u l n e r a b i l i t i e s a n d ris k s a r e t h e c h a l l e n g e s f a c e d b y m o b i l e u s e r s d u e
t o t h e f u n c t i o n a l i t y a n d i n c r e a s i n g u s e o f m o b i l e d e v i c e s a t w o r k a n d in o t h e r d a i l y a c t i v i t i e s .
T h e n e w f u n c t i o n a l i t i e s a m p l i f y t h e a t t r a c t i o n o f t h e p l a t f o r m s u s e d in m o b i l e d e v i c e s , w h i c h
p ro v id e an easy p a th f o r a tta c k e rs t o la u n c h a tta c k s a n d e x p lo ita tio n . A tta c k e rs use d iffe r e n t
t e c h n o l o g i e s s u c h as A n d r o i d s a n d o t h e r m u l t i p l e i n s t a n c e s t o i n s e r t m a l i c i o u s a p p l i c a t i o n s
w i t h h id d e n f u n c t io n a l it y t h a t s te a lth ily g a th e r a u s e r's s e n s itiv e i n f o r m a t io n . T h e c o m p a n ie s
th a t a re in to d e v e lo p in g m o b ile a p p lic a tio n s a re m ore c o n ce rn e d a b o u t s e c u rity because
v u l n e r a b le a p p lic a t io n s can c a u se d a m a g e t o b o th p a rtie s . T h u s , l e v e ls o f s e c u r i t y a n d d a t a
p r o t e c t i o n g u a r a n t e e s a re m a n d a t o r y . B u t t h e a ssis ta n c e s a n d s e rvice s p r o v id e d by m o b ile
d e v ic e s f o r s e c u re usage a re s o m e tim e s n e u tr a liz e d by fr a u d a n d s e c u rity th r e a ts .
T h e f o l l o w i n g a r e s o m e o f t h e ris k s a n d v u l n e r a b i l i t i e s a s s o c i a t e d w i t h m o b i l e p l a t f o r m s :
0 A p p S to re s
© M o b ile M a lw a re
Q A p p S a n d b o x in g
© D e v ic e a n d A p p E n c r y p t i o n
© OS a n d A p p U p d a t e s
e J a ilb re a k in g a n d R o o tin g
e P r i v a c y Is su e s ( G e o l o c a t i o n )
Q D a ta S e c u r i t y
e E x c e s s iv e P e r m i s s i o n s
e C o m m u n ic a tio n S e c u rity
e P h y s ic a l A t t a c k s
S e c u r it y I s s u e s A r is in g fr o m
A p p S to re s
CEH
A tta c k e r s c a n a ls o s o c ia l e n g in e e r u s e rs
J In s u ffic ie n t o r n o v e t t in g o f a p p s le a d s t o
t o d o w n lo a d a n d ru n a p p s o u t s id e th e
m a lic io u s a n d fa k e a p p s e n t e r in g a p p
o ffic ia l a p p s to re s
m a r k e tp la c e
M a lic io u s a p p s c a n d a m a g e o t h e r a p p lic a t io n
J A p p s to re s a re c o m m o n ta r g e t f o r a tta c k e r s
a n d d a ta , a n d s e n d y o u r s e n s itiv e d a ta t o
t o d is t r ib u t e m a lw a r e a n d m a lic io u s a p p s
a tta c k e r s
A p p S to re ■ 11 n 11
:......>d
•...... < f ייi m
JLp
A•
h i ®»*>’ :
\ T h ir d P a r ty
■A p p S t o r e
M o b ile A p p N o V e ttin g
......>
.......
M a lic io u s app sends s e n s itiv e data t o a tta c k e r
C a ll lo g s / p h o t o / v id e o s / s e n s it iv e d o c s
FIG U R E 1 6 .3 : S e c u r ity Is s u e s A r is in g f r o m A p p S to re s
T h re a ts o f M o b ile M a lw a re
In r e c e n t y e a r s , m a n y s y s t e m u s e r s a r e m o v i n g a w a y f r o m u s in g p e r s o n n e l c o m p u t e r s
to w a rd s m a rtp h o n e s and t a b l e t s . T h is in c re a s e d a d o p tio n o f m o b ile d e v ic e s by u sers fo r
b u s in e s s a n d p e rs o n a l p u rp o s e s a n d c o m p a r a t iv e ly le sse r s e c u r ity c o n tr o ls has s h ifte d th e
fo c u s o f a tta c k e r s a n d m a lw a r e w r it e r s f o r la u n c h in g a tta c k s o n m o b ile d e v ic e s . A t t a c k e r s a re
a t t a c k i n g m o b i l e d e v i c e s b e c a u s e m o r e s e n s i t i v e i n f o r m a t i o n is s t o r e d o n t h e m . S M S s p o o f i n g ,
to ll fr a u d s , e tc . a re a tta c k s p e r f o r m e d b y a tta c k e r s o n m o b ile d e vice s. M o b i le m a lw a r e in c lu d e
v iru s e s , S M S -s e n d in g m a lw a r e , m o b ile b o tn e t s , s p y w a r e , d e s tr u c tiv e T ro ja n s , e tc . T h e m a lw a r e
is e i t h e r a p p l i c a t i o n o r fu n c tio n a lity h id d e n w ith in o th e r a p p lic a tio n . For in fe c tin g m o b ile
d e v ic e s , th e m a lw a r e w r i t e r o r a tt a c k e r d e v e lo p s a m a lic io u s a p p lic a tio n a n d p u b lis h e s th is
a p p lic a tio n t o a m a jo r a p p lic a tio n s to r e a n d w a it s u n til users in s ta ll th e s e m a lic io u s m o b ile
a p p lic a tio n s o n t h e ir m o b ile d e v ic e s . O n c e t h e u s e r in s ta lls th e a p p lic a tio n h o s te d by th e
a t t a c k e r , as a r e s u l t , t h e a t t a c k e r t a k e s c o n t r o l o v e r t h e u s e r ' s m o b i l e d e v i c e . D u e t o m o b i l e
m a l w a r e t h r e a t s , t h e r e m a y b e lo ss a n d t h e f t , d a t a c o m m u n i c a t i o n i n t e r r u p t i o n , e x p l o i t a t i o n
a n d m is c o n d u c t, a n d d ire c t a tta c k s .
A c c o r d in g t o th e t h r e a t s r e p o r t , t h e s e c u r ity th r e a ts t o m o b ile d e v ic e s a re in c re a s in g d a y by
d a y . In 2 0 0 4 , m a l w a r e t h r e a t s a g a i n s t m o b i l e d e v i c e s w e r e f e w e r w h e n c o m p a r e d t o r e c e n t
ye ars. T h e f r e q u e n c y of m a lw a re th re a ts to m o b ile d e v ic e s in th e year 2012 d ra s tic a lly
in c re a s e d .
FIG U R E 1 6 .4 : T h r e a ts o f M o b ile M a lw a r e
A p p S a n d b o x in g Is s u e s
Sandboxing separates the running program with the help of a security mechanism. It
helps protect systems and users by limiting the resources the app can access in the mobile
platform; however, malicious applications may exploit vulnerabilities and bypass the sandbox.
Sandboxing is clearly explained by comparing a computer and a smartphone. In normal
computers, a program can access any of the system resources such as entire RAM i.e. not
protected, hard drive information, and more can be read easily by anyone, unless and until it is
locked. So if any individual downloads malicious software believing it as genuine, then that
software can read the keystrokes that are typed in your system, scan the entire hard drive for
useful file types, and then send that data back through the network. The same occurs in mobile
devices; if an application is not given a working environment, it accesses all the user data and
all the system resources. If the user downloads a malicious application, then that application
can access all the data and resources and can gain complete control over the user's mobile
device.
S e cu re s a n d b o x e n v ir o n m e n t
In a secure sandbox environment, each individual application is given its own working
environments. As a result, the application is restricted to access the other user data and system
resources. This provides protection to mobile devices against malware threats.
O th e r
U s e r D ata
A
s U se r D ata
ו
N *•
Unrestricted
No A ccess D
Access
B
App
O
S y stem
rriw iiif S y stem
X
R esources R esources
FIG U R E 1 6 .5 : S e c u re s a n d b o x e n v ir o n m e n t
V u ln e r a b le S a n d b o x E n v ir o n m e n t
In v u l n e r a b l e s a n d b o x e n v i r o n m e n t , t h e m a l i c i o u s a p p l i c a t i o n e x p l o i t s l o o p h o l e s o r w e a k n e s s e s
f o r b y p a s s i n g t h e s a n d b o x . As a r e s u l t , t h e a p p l i c a t i o n c a n a c c e s s o t h e r u s e r d a t a a n d s y s t e m
re so u rce s t h a t a re re s tric te d .
s U se r D ata
U se r D ata
1“ nr A
M
Unrestricted
A ccess
Access
B ypass
the App
S an dbox
S y stem S y stem
R esources R esources
FIG U R E 1 6 .6 : V u ln e r a b le S a n d b o x E n v ir o n m e n t
• • •
1 1 e H . fl^:^־ -
M o b ile P latform
Attack Vectors
M o d u le F lo w
w So f a r , w e h a v e d i s c u s s e d v a r i o u s p o t e n t i a l a t t a c k v e c t o r s o f m o b i l e p l a t f o r m s . N o w
w e w i l l d is c u s s h a c k i n g t h e A n d r o i d OS.
T h is s e c t i o n in tro d u c e s yo u to th e A n d ro id OS a n d i ts a r c h i t e c t u r e , v a r i o u s v u l n e r a b i l i t i e s
a s s o c i a t e d w i t h it, A n d r o i d r o o t i n g a n d A n d r o i d r o o t i n g t o o l s , v a r i o u s A n d r o i d T r o j a n s , A n d r o i d
s e c u rity to o ls , A n d r o id p e n e tr a tio n te s t in g to o ls , a n d A n d ro id d e v ic e tra c k in g to o ls .
Android OS CEH
A n d r o i d is a s o f t w a r e e n v i r o n m e n t d e v e l o p e d b y G o o g l e f o r m o b i l e d e v i c e s
Features
A p p lic a t io n f r a m e w o r k e n a b lin g r e u s e a n d r e p la c e m e n t o f
c o m p o n e n ts
D a lv ik v ir t u a l m a c h in e o p t im iz e d f o r m o b ile d e v ic e s
I n te g r a t e d b r o w s e r b a s e d o n t h e o p e n s o u r c e W e b K it e n g in e
S Q L ite f o r s t r u c t u r e d d a ta s to ra g e
M e d ia s u p p o r t f o r c o m m o n a u d io , v id e o , a n d s t ill im a g e f o r m a t s (M P E G 4 , H .2 6 4 ,
M P 3 , A A C , A M R , JPG, P N G , G IF)
Rich d e v e lo p m e n t e n v ir o n m e n t in c lu d in g a d e v ic e e m u la to r , to o ls f o r d e b u g g in g ,
m e m o ry a n d p e r fo rm a n c e p r o filin g , a n d a p lu g in f o r t h e E clipse IDE
http://developer.android.com
Copyright © by E&Cauac!. All Rights Reserved. Reproduction is Strictly Prohibited.
A n d ro id O S
A n d r o i d is a s o f t w a r e s t a c k d e v e l o p e d b y G o o g l e s p e c i f i c a l l y f o r m o b i l e d e v i c e s s u c h
as s m a r t p h o n e s a n d t a b l e t c o m p u t e r s . It is c o m p r i s e d o f a n o p e r a t i n g s y s t e m , m i d d l e w a r e , a n d
k e y a p p l i c a t i o n s . A n d r o i d ' s m o b i l e o p e r a t i n g s y s t e m is b a s e d o n t h e L i n u x k e r n e l . T h e A n d r o i d
a p p l i c a t i o n r u n s in a s a n d b o x . T h e s a n d b o x s e c u r i t y m e c h a n i s m is e x p l a i n e d o n a p r e v i o u s s l id e .
A n tiv iru s s o ftw a re such as Lookout M o b ile S e c u rity , AVG T e c h n o lo g ie s , and M c A fe e a re
r e l e a s e d b y s e c u r i t y f i r m s f o r A n d r o i d d e v i c e s . H o w e v e r , t h e s a n d b o x is a l s o a p p l i c a b l e t o t h e
a n tiv iru s s o ftw a re . As a re s u lt, t h o u g h th is a n tiv iru s s o ftw a re has t h e a b ility to scan th e
c o m p l e t e s y s t e m , i t is l i m i t e d t o s c a n n i n g u p t o a c e r t a i n e n v i r o n m e n t .
T h e fe a tu re s o f a n d r o id o p e r a tin g s y s te m in c lu d e :
0 D a lv ik v ir tu a l m a c h in e o p tim iz e d f o r m o b ile d e v ic e s
© In te g ra te d b ro w s e r based on th e o p e n s o u rc e W e b K it e n g in e
0 S Q L ite f o r s t r u c t u r e d d a t a s t o r a g e
0 M e d i a s u p p o r t f o r c o m m o n a u d i o , v i d e o , a n d s ti l l i m a g e f o r m a t s ( M P E G 4 , H . 2 6 4 , M P 3 ,
A A C , A M R , JPG, P N G , GIF)
Q R ich d e v e lo p m e n t e n v iro n m e n t in c lu d in g a d e v ic e e m u la to r, to o ls fo r d e b u g g in g ,
m e m o r y a n d p e r f o r m a n c e p r o f i l i n g , a n d a p l u g i n f o r t h e E c lip s e IDE
APPLICATION
C o n ta c t s Phone
APPLICATION FRAMEWORK
A c t iv ity M a n a g e r W in d o w M a n a g e r C o n te n t P ro vid e rs
Package M a n a g e r
C o re L ib ra rie s
\
LIBRARIES O p en G L | ES
D a lv ik V ir tu a l M a c h in e
SG I
LINUX KERNEL
A n d ro id O S A rc h ite c tu re
A n d r o i d is a L i n u x - b a s e d o p e r a t i n g s y s t e m e s p e c i a l l y d e s i g n e d f o r p o r t a b l e d e v i c e s
s u c h as s m a r t p h o n e s , t a b l e t s , e t c . T h e p i c t o r i a l r e p r e s e n t a t i o n t h a t f o l l o w s s h o w s t h e d i f f e r e n t
l a y e r s s u c h as a p p l i c a t i o n , a p p l i c a t i o n f r a m e w o r k , l i b r a r i e s , a n d r o i d r u n t i m e , a n d L i n u x k e r n e l ,
w h ic h m a k e u p th e A n d ro id o p e ra tin g s ys te m .
Jf\PPLI CATION
Hom e C o n ta c ts Phone B ro w s e r
APPLICATION FRAMEWORK
Package M a n a g e r
C o re Libraries
LIBRARIES O pen G L | ES Fre eT y p e W e b K it
D a lvik V ir tu a l M a c h in e
SGL SSL libc
LINUX KERNEL
D isplay D riv e r C am ara D riv e r Flash M e m o r y D riv e r B in d e r (IPC) D riv e r
Applications:
The applications provided by Android include an email client, SMS, calendar, maps, Browser,
contacts, etc. These applications are written using the Java programming language.
Application Framework
Q As Android is an open development platform, developers have full access tothe API
that is used in the core applications
© The View System can be used to develop lists, grids, text boxes,buttons, etc. in the
application
Q The Content Provider permits applications to access data from other applications in
order to share their own data
© The Resource Manager allocates the non-code resources like localized strings, graphics,
etc.
Q The Notification Manager helps applications to show custom messages in the status bar
Q The Activity Manager controls the lifecycle of applications
Libraries
Libraries comprise each and every code that provides the main features of an Android OS. For
example, database support is provided by the SQLite library so that an application can utilize it
for storing data and functionalities for the web browser provided by the Web Kit library. The
Android core library includes Surface Manager, Media Framework, SQLite, OpenGL | ES,
FreeType, WebKit, SGL, SSL, libc, SQLite (database engine), and LibWebCore (web browser
engine).
Android Runtime
Android Runtime includes core libraries and the Dalvik virtual machine. The set of core
libraries allows developers to write the Android applications using the Java programming
language. Dalvik virtual machine is helpful in executing Android applications. Dalvik can run
multiple VMs efficiently.
Linux Kernel
The Android operating system was built based on the Linux kernel. This layer is made up of all
the low-level device drivers such as Display Driver, Camara Driver, Flash Memory Driver, Binder
(IPC) Driver, Keypad Driver, WiFi Driver, Audio Driver, and Power Management for various
hardware components of an Android device.
P o lic ie s s u p p o r t e d b y
t h e D e v ic e A d m in is t r a t io n A P I
I*
Password enabled 6 Minimum uppercase letters
M inim um password length required in password
Alphanumeric password © Password expiration timeout
required © Password history restriction
Complex password required
9 Maximum failed password
M inim um letters required in
attempts
password
a Maximum inactivity time lock
M inim um lowercase letters
required in password 0 Require storage encryption
M inim um non-letter characters o Disable camera
required in password
« Prompt user to set a new
M inim um numerical digits password
required in password
9 Lock device immediately
M inim um symbols required in
password
S Wipe the device's data
h ttp://developer. android, com
Copyright © by E&Caincl. All Rights Reserved. Reproduction is Strictly Prohibited.
The Device Administration API introduced in Android 2.2 provides device administration
features at the system level. These APIs allow developers to create security-aware applications
that are useful in enterprise settings, in which IT professionals require rich control over
employee devices. The device admin applications are written using the Device Administration
API. These device admin applications enforce the desired policies when the user installs these
applications on his or her device. The built-in applications can leverage the new APIs to
improve the exchange support.
Policy Description
Complex password Requires that passwords must contain at least a letter, a numerical
required digit, and a special symbol. Introduced in Android 3.0.
Minimum letters required The minimum number of letters required in the password for all
in password admins or a particular one. Introduced in Android 3.0.
Minimum lowercase The minimum number of lowercase letters required in the password
letters required in for all admins or a particular one. Introduced in Android 3.0.
password
Minimum non-letter The minimum number of non-letter characters required in the
characters required in password for all admins or a particular one. Introduced in Android
password 3.0.
Minimum numerical digits The minimum number of numerical digits required in the password
required in password for all admins or a particular one. Introduced in Android 3.0.
Minimum symbols The minimum number of symbols required in the password for all
required in password admins or a particular one. Introduced in Android 3.0.
Minimum uppercase The minimum number of uppercase letters required in the password
letters required in for all admins or a particular one. Introduced in Android 3.0.
password
Password expiration When the password will expire, expressed as a delta in milliseconds
timeout from when a device admin sets the expiration timeout. Introduced in
Android 3.0.
Password history This policy prevents users from reusing the last רוunique passwords.
restriction This policy is typically used in conjunction with
setPasswordExpirationTimeout(), which forces users to update their
passwords after a specified amount of time has elapsed. Introduced
in Android 3.0.
Maximum failed Specifies how many times a user can enter the wrong password
password attempts before the device wipes its data. The Device Administration API also
allows administrators to remotely reset the device to factory
defaults. This secures data in case the device is lost or stolen.
Maximum inactivity time Sets the length of time since the user last touched the screen or
lock pressed a button before the device locks the screen. When this
happens, users need to enter their PIN or passwords again before
they can use their devices and access data. The value can be
between 1 and 60 minutes.
Require storage Specifies that the storage area should be encrypted, if the device
encryption supports it. Introduced in Android 3.0.
Disable camera Specifies that the camera should be disabled. Note that this doesn't
have to be a permanent disabling. The camera can be
enabled/disabled dynamically based on context, time, and so on.
Introduced in Android 4.0.
T A B L E 1 6 .1: A n d r o id D e v ic e A d m in is tr a tio n API
I S M o 2:0977]
A p p /D e v ic e A d m in
c o m m a n d s s u c h as: d e v ic e in c lu d in g :
Im p ro v e d p e rfo rm a n c e
W i-F i a nd B lu e to o th te th e rin g
Android Rooting
Rooting is the process of removing the limitations and allowing full access. It allows
Android users to attain "super user" privileged control (known as "root access") and permission
within Android's subsystem. After rooting the Android phone, an Android user will have control
over SETTINGS, FEATURES, and PERFORMANCE of his or her phone and can even install
software that is not supported by the device. The root users will have "super -user" privileges
using which they can easily alter or modify the software code on the device. Rooting is basically
hacking Android devices and is equivalent to "jailbreaking" in iPhone. Rooting exploits a
security vulnerability in the device firmware, and copying the su binary to a location in the
current process's PATH (e.g. /system/xbin/su) and granting it executable permissions with the
chmod command.
Rooting enables all the user-installed applications to run privileged commands such as:
9 Modifying or deleting system files, module, ROMs (stock firmware), and kernels
Q Removing carrier- or manufacturer-installed applications (bloatware)
Q Low-level access to the hardware that are typically unavailable to the devices in their
default configuration
© Improved performance
J R u n S u p e r O n e C lic k . e x e ( a v a i la b le i n T o o l s D V D )
J
Copyright © by E&Cauaci. All Rights Reserved. Reproduction is Strictly Prohibited.
Li —
© USB connection USB debugging
Stay awake mm
1
Windows Media Sync o Saeen will never sleep while charging
1 Charge Only o
OK | Cancel
© 1
Superuser Request
ft P u t y o u r A n d r o id p h o n e in
b o o t lo a d e r m o d e
m D e p e n d in g o n y o u r c o m p u t e r 's
O S , d o o n e o f th e f o llo w in g :
J W h e n t h e b a t t e r y ic o n a p p e a r s o n s c r e e n , M a c : O p e n a te r m in a l w in d o w t o t h e d ir e c to r y
p o p t h e b a t t e r y b a c k in c o n ta in in g t h e files, a n d ty p e " c h m o d +x in sta ll-
s u p e r b o o t- m a c .s h " f o llo w e d b y " ./in s ta ll-
al N o w t a p t h e P o w e r b u t t o n w h i l e h o ld i n g
s u p e r b o o t- m a c .s h "
d o w n t h e C a m e r a k ey
L in u x : O p e n a te r m in a l w in d o w to t h e d ir e c to r y
J F o r A n d r o id p h o n e s w i t h a t r a c k b a l L T u r n
c o n ta in in g t h e files, a n d ty p e " c h m o d +x in sta ll-
o ff t h e p h o n e , p r e s s a n d h o ld t h e tr a c k b a ll,
s u p e r b o o t- lin u x .s h " fo llo w e d b y 1'./in s ta ll-
th e n tu rn th e p h o n e b a c k o n
s u p e r b o o t- l in u x .s h "
6 Linux: Open a terminal window to the directory containing the files, and type chmod +x
install-superboot-linux.sh" followed by ./install-superboot-linux.sh.
Step 4: Your Android device has been rooted.
un re v o k e d
(DB a ׳a m a 9:15am
?!
y r Universal Androot
tho tutron to root your phono Wo don't antiripa!!
a t
Allow this application to:
A Storage
in i
modify/delete SD card contents
A Phone calls
read phone state and identity
A System tools
ctange W i-Fi state, prevent phone from
sleeping
O S h o w a ll
R e c o v e r y F la s h e r
ר
U n iv e r s a l A n d r o o t
U n lo c k R o o t
C O J
Android Rooting Tools
In addition to SuperOneClick and Superboot, there are many other tools that can be
used for rooting Android phones:
© Unrevoked available at http://unrevoked.com
© Recovery Flasher available at https://sites.google.com/site/adlxmod
© Universal Androot available at http://forum.xda-developers.com
© Unlock Root available at www.unlockroot.com
i & B D 0 9:15 AM
un re v o k e d
, \u Universal Androot
P r e s s t h e b u tt o n t o r o o t y o u r p h o n e . W e d o n 't a n tic ip a te
o r e a ld n g y o u r p r io n * , b u t w e 'r e n o i lia b le if It (t o o t O n Ev
UntocfcRoot v2 0
y o u ’l h a r e t o d o th i5 e a c h tim e y o u r e b o o t . H a v e fu n !
Do you w a nt to install this
application?
UnlockRoot.com
A S torage
m odify/delete 50 can) contents
A
Phone c a lls
read phone state and identity
S ystem to o ls
i n
change W i-Ft state, prevent phone from
sleeping
O Show a ll 1 _ . I
Install || Cancel
Root
Contort devic• wtfh U S 8 coblo and
J It l i s t e n s f o r H T T P p a c k e t s s e n t v ia a w i r e l e s s ( 8 0 2 . 1 1 ) n e t w o r k ». . ^ [http7/www.facebook...
m IP=192.168 0.100 Anil Sardiwal [http7Mw..
c o n n e c t i o n a n d e x t r a c t s t h e s e s s i o n ID s f r o m t h e s e p a c k e t s in o r d e r http://www.google.co.in
to re u s e th e m צ IP=192.168.0.100 ID: 1239002684
http://xsltcache.alexa.com
IP=192.168.0.100 ID: 1120334729
J D r o i d S h e e p c a n c a p t u r e s e s s i o n s u s i n g t h e l i b p c a p li b r a r y a n d http://api.mywot.com
s u p p o rts : O PEN N e tw o r k s , W E P e n c ry p te d n e tw o rk s , W PA a n d IP-192.168.0.100 ID: 166224861
http://apis.google.com
W P A 2 (P S K o n l y ) e n c r y p t e d n e t w o r k s IP=192.168 0.100 ID: -561222905
http://www.blogger.com
IP=192.168.0.100 ID: •70447663
http://platform.linkedin.com
in IP“ 192.168.0.100 ID: •2082712684
o n ■
http://platform .twitter.com
IP-192.168.0.100 ID: 1933430236
http://s7.addthis.com
A A
U ser
w IP-192.168 0.100 ID: 1667993814
In te rn e t
ARP http://www.stumbleupon.com
Spoofing Attacker modifies the W IP-192.168.0.100 ID: •1486882064
Attacker intercepts session IDs and relay them
client's request for a *«. m to web server ✓ c
web page
A tta c k e r
o RUNNING AND
SPOOFING
A A
User Internet
ARP
S p o o f in g A t t a c k e r m o d if ie s t h e
A t t a c k e r i n te r c e p t s s e s s io n ID s a n d r e la y t h e m
webpage
Attacker
^ rid I © 2:0 2 PM
C o n nected to -•••■• י״ י י י י
Spoofing IP: 192.168.0.1
[http://www.facebook....
IP=192.168.0.100 Anil Sardiwal [http://ww...
http://www.google.co.in
IP=192.168.0.100 ID: 1239002684
http://xsltcache.alexa.com
IP=192.168.0.100 ID: 1120334729
http://api.mywot.com
IP=192.168.0.100 ID: 166224861
http://apis.google.com
IP=192.168.0.100 ID: -561222905
http://www.blogger.com
IP=192.168.0.100 ID: -70447663
http://platform.linkedin.com
IP=192.168.0.100 ID: -2082712684
http://platform.twitter.com
IP=192.168.0.100 ID: -1933430236
http://s7.addthis.com
IP=192.168.0.100 ID: -1667993814
http://www.stumbleupon.com
IP=192.168.0.100 ID: -1486882064
RUNNING AND
o SPOOFING
|ז
Vibration
V ib rate w h e n n ew praM e is fo u td
H
Android-based Sniffer: FaceNiff
Source: http://faceniff.ponury.net
FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the
Wi-Fi that your mobile is connected to. It is possible to hijack sessions only when Wi-Fi is not
using EAP, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK).
Note: If webuser uses SSL this application won't work.
m u
L _ J STOP
Fitter services
V ibration
am azon.com
Vibrate w t * n new proMe it found
f71f| bponury
pubel MAC TO V e ndor reso lv in g
am azon.co uk
Try fry in g out (he device vendor
tw itte r.c o m
tu m b lr.c o m
m einvz.net
%
& •
Unlock ap p Request n ew key Go to w ebsite
studivz.net
r t ©
Export sessions Im p o rt sessions Settings b lo n o e r c o m
Z itm o is th e n o to r io u s m o b ile
c o m p o n e n t o f th e Zeu s b a n k in g
T ro ja n t h a t c irc u m v e n ts t w o - Ml » » יי » »
f a c to r a u th e n tic a tio n by Car Home Contacts Car Home onucn c״ ״ * ״
Custom Dev Tool!
in te rc e p tin g SMS c o n fir m a tio n local* lAraU
c o d e s t o access b a n k a c c o u n ts
^ 5 Zertifikat
T he n e w v e rs io n s f o r A n d ro id H m Q
a n d B la c k B e rry have n o w add e d Email Galery Mnugng Music
b o tn e t-lik e fe a tu re s , such as I n s ta l la t io n erfolgreich
e n a b lin g c y b e r c r im in a ls t o
r m * 4 I h r A k tiv ie ru n g sk o d e lau tet
c o n tr o l th e T ro ja n via SMS
com m ands
7725486193
SBD® 1 0 :5 3 am I
AndroidOS/GingerBreak is a
trojan that affects mobile devices
GingerBreak v l.l running the Android operating p GingerBreak
system
Options It drops and executes another Do you w a n t to in s ta ll t h is
trojan detected as Exploit: application?
Q ) GingerBreak
Android0s/CVE-2011-1823,
Please m ake sure o f the which, if run successfully, gains
Allow th is a p p lic a tio n t o :
fo llo w in g before rooting: administrator privileges on the
- You have an SD card inserted device A S y stem to o ls
a n d m o unted ׳e»d system log riles
- USB debugging is enabled
G in g e rB re a k
A System to ols
r e a d s y ste m log files
8:06 AM a n a 8:06 AM
Quote!!! Slim
Be social! plugin
32.C0KB
A Your messages
v R ), E xam ple w a llp a p e rs rcterve SMS
ookb
A Network communication
(til Inifinrt K e n t
Sam ple Soft Keyboard
• 1600KR A Storage
A
r r o a ify /a eltteS O ca rd co m c o r
Services that cost you
money
se n d SM S r n e s u g e s
A Phone calls
read p h o n e t u t e ar>d identity
Cawitt
Cawitt operates silently in the background, gathering device information which it later
forwards to a remote server. Collected information includes device ID, International Mobile
Equipment Identity (IMEI) number, phone number, Bot ID, and modules. This Trojan doesn't
place any launcher icon in the application menu in order to avoid being detected by the device
user.
tr iR & G 8:06 A M
Manage applications Application Info
A Your m essages
w T) Exam ple W allp ap ers re c e iv e SMS
20.00K B
A N e tw o rk co m m u n ica tio n
full In te r n e t a c c e s s
Sam ple Soft Keyboard
A Storage
3600K B
m o d ify /d e le te SO c a rd c o n te n ts
A Phone calls
r e a d p h o n e s ta te a n d id en tity
Frogonal
J F r o g o n a l.A is a r e p a c k a g e d v e r s i o n o f a n o r i g i n a l a p p l i c a t i o n
w h e r e e x tr a f u n c tio n a litie s u s e d f o r m a lic io u s i n t e n t h a v e
b e e n a d d e d in to th e n e w p a c k a g e
J It h a r v e s t s t h e f o l l o w i n g i n f o r m a t i o n f r o m t h e c o m p r o m i s e d
d e v ic e s u c h a s id e n tif ic a tio n o f t h e T ro ja n e d a p p lic a tio n ,
p h o n e n u m b e r , IM EI n u m b e r , IM S I n u m b e r , S IM s e r ia l
n u m b e r, d e v ic e m o d e l, o p e r a tin g s y s te m v e rs io n , r o o t
a v a ila b ility
Gamex
-I G a m e x .A h i d e s its m a l i c i o u s c o m p o n e n t s i n s i d e t h e p a c k a g e
f ile
_J O n c e it is g r a n t e d a r o o t a c c e s s b y t h e u s e r , it c o n n e c t s t o a
c o m m a n d a n d c o n t r o l (C & C ) s e r v e r t o d o w n l o a d m o r e
a p p l i c a t i o n s a n d t o f o r w a r d t h e d e v i c e IM EI a n d IMSI n u m b e r s
J It a l s o e s t a b l i s h e s a c o n n e c t i o n t o a n e x t e r n a l lin k w h ic h
c o n t a i n s a r e p a c k a g e d A PK f ile , a n d p r o c e e d s t o d o w n l o a d i n g
a n d i n s t a l l i n g t h e file
m @My G am es
✓ Your messages
receive SMS
ft m
✓ N etw ork comm unication
Jull Internet access
✓ Storage
modify/delete SO card contents
✓ Hardware controls
take pictures and videos
✓ Phone calls
read ohone state and identity
*s מ«י»א
Gamex
Gamex is an Android Trojan that downloads and installs the files on a compromised
mobile device. It hides the malicious content inside the file that is to be installed; once it is
granted a root access by the device owner, it connects to a command and control (C&C) server
to download more applications and to forward the device's IMEI and IMSI numbers. It also
establishes a connection to an external link that contains a repackaged APK file, and proceeds
to download and install the file.
com.android.gesture. builder
32.00KB
Example Wallpapers
20.00KB
A N e tw o rk c o m m u n ic a tio n
fu l Internet access
A Phone calls
read phone state and identity
J M a lic io u s c o d e in t h e m a lw a r e is h ig h ly d e s tr u c tiv e ; J A n y re p ly f r o m th is n u m b e r is r e d i r e c t e d t o
it d e s t r o y s im a g e s f o u n d i n t h e s d c a r d / D C I M a n o t h e r d e v ic e to p r e v e n t u s e r fr o m b e c o m in g
/ c a m e r a f o l d e r t h a t s t o r e s im a g e s t a k e n w ith t h e s u s p ic io u s
d e v ic e 's c a m e r a
J M an ia .A is k n o w n f o r u s in g t h e tr o ja n iz a tio n
J E v e ry fiv e m i n u t e s , t h e m a lw a r e c h e c k s th is f o ld e r
te c h n iq u e , w h e r e it is r e p a c k a g e d w ith a n o t h e r
a n d m o d ifie s a fo u n d im a g e b y o v e r w r itin g it w ith a
o rig in a l a p p lic a tio n in o r d e r to d u p e v ic tim s
p r e d e f i n e d im a g e
£| ce« h
^ t1M*ewwa
a u11p
p jp
jp e
cn
n H c o m . a n d r o l d . g e s t u r e .b u l l d e r
W m 3*.00KB
m t*n
KabStamper is an Android Trojan that modifies images found in the target mobile
device by overwriting them with a predefined image. It is distributed via Trojanized
applications that deliver news and videos about the AKB48 group. It is very destructive and
destroys images found in the sdcard/DCIM/camera folder that stores images taken with the
device's camera.
6 S4 AM 6 :5 4 AM
r r- ־
704 1 * י2 זKB
com.android.gesture.builder
• 32.00KB
■ RV E x a m p le W a llp a p e r s
S t/ 20.00KB
S a m p le S o ft K e y b o a r d
• 36.00KB
M a n ia
Mania is an Android Trojan that pretends to perform license checking to cover up its
SMS-sending activities in the background. It is SMS-sending malware that sends out messages
with the content "tel" or "quiz" to the number 84242. Any reply from this number is redirected
to another device to prevent the device owner from becoming suspicious. While running,
Mania appears to be performing license checking, but this process always fails and never seems
to be completed. The license checking is a coverup for the SMS sending activities that are taking
place in the background.
a n e 6 :2 6 A M y b S G 6 :2 8 AM
2. N u m b e r: 1161
s. * 7
C o n te n t: 6 9 2 0 4 6 169 BG Q C b 5 T 3 w 1 •
3. N u m b e r: 3381
ft * < 1 *
C o n te n t: 6 9 2 0 4 6 169 BG Q C b 5 T 3 w
q §ז/ ft m
(«•< &*r.y Snlun
f e &
W.K Phone Setting* Spoic hits
PremiumSMS is an Android Trojan that reaps profit from its SMS-sending activities. It
has a configuration file that contains data on the content of the SMS messages and the
recipient numbers.
Example of send messages:
1. Number: 1151
4. Number: 1005
Content: kutkut clsamg 6758150
5. Number: 5373
6. Number: 7250
Content: kutkut clsamg 6758150
S m sS py
SmsSpy is an Android Trojan that poses as an Android Security Suite application that
actually does nothing in ensuring the device's security. However, it records received SMS
messages into secsuite.db instead. It targets banking consumers in Spain, posing as an Android
Security Suite application.
Text Messages
A i •
U ׳n(»M1 llrowv*
4P
OMOiMtOr
S
Cillfnnni
; D roidLive M a in
Add » »י ־
Contact* D«v loolt
a
I m*l
ShutdownReceiver Device
A C o n tro lle r Admin
י &ז8 fe
SmsMessageReceiver
Call Phone
WakeLockReceiver Numbers D e v ic e A d m in
(Pfll W
Send
B o o tR eceiver
T e x t M essages
A
LiveR eceiver
Add
DroidLive Main D evice
S h u td o w n R e ceive r
Controller A d m in
SmsMessageReceiver
V
Call Phone
W a ke L o c kR e ce iv er N um bers DeviceAdmin
A n d ro id T ro ja n : U p d tK ille r
7:51 AM
•• • 1$ 2
Alarm Clock Browser Calculator C alendar
$!7 5 P &
G allery Gestures Messaging Music
Builder
B
Phone Settings
# ־E
Sparc Parts
A n d r o id T r o ja n : F a k e T o k e n C E H
C«rt1fW4 ttfciul ■Uckw
F a k e T o k e n s t e a ls b o t h b a n k i n g a u t h e n t i c a t i o n f a c t o r s ( I n t e r n e t
p a s s w o r d a n d m T A N ) d i r e c t l y f r o m t h e m o b i l e d e v ic e
Permissions Permissions
This application can access the following on This application can access the following on
D is t r ib u t io n T e c h n iq u e s your phone: your phone:
Permissions Permissions
This application can access the following on This application can access the following on
your phone: your phone:
■ 1
Copyright © by EC-Coind. All Rights Reserved Reproduction is Strictly Prohibited.
G o o g le A p p s D e v ic e P o lic y C E H
Google Apps Device Policy app allows Google J This app allows IT administratorto enforce
Apps domain admin to set security policies for security policies and remotely wipe your
your Android device device
It is a device administration app for Google J Additionally, this app allows you to ring, lock,
Apps for Business, Education, and Government or locate your Android devices through the
accountsthat makes your Android device more My Devices page:
secure for enterprise use h t t p s : //w w w . g o o g le . c o m /a p p s /m y d e v ic e s
Dc sic p .ir tn n is W fd u r d « g o o g le
O o r u ir o d r u m stfjto f s ca n **I
p o 1c * « nrxl rtirn lr iy w ip • lb*
q o o q e cc n V a p ta /m ir cfcv c es
cl 1c changrpauvora
h ttp s ://p lo y .g o o g le .c o m
Device administered under rpogle Some device details arp shared with ✓ Successfully synced with Domain administrators can v
I com domain administrators server retails about your device
Oו2:ו2.
Kernel version 3 08-fll»4feC9
Click 10 ch a n g e p assw ord
Basftv.no Version IS?SOXXI A?
Successfully synced with Iasi Sync: 2012rtWQ316:IS
Lock timeout must not be greaier than ✓ server.
kUCAdd’ess a: S»7cJ«J4rtft
15 minutes.
Unregister this account so it is no Click to change timeout Account registered.
lenger managed by your domain
administrators. Domain administrators w il be able to
remotely wipe the riei/ic#*
Jmegistei
נ
J If users have Google Sync installed on a supported mobile device or an Android device
with the Google Apps Device Policy app, they can use the Google Apps control panel
to remotely wipe the device
Mobile settings
T o r e m o t e w ip e
O n S te m s A ctM ton
a lo s t o r s to le n d e v ic e :
S ign in t o y o u r G o o g le A p p s c o n t r o l
p a n e l.
In t h e D e v ic e s t a b , h o v e r y o u r c u r s o r
o v e r t h e u s e r w h o s e d e v ic e y o u w a n t t o
w ip e .
C lic k R e m o te W ip e in t h e b o x t h a t
a p p e a rs .
A s e c o n d b o x a p p e a rs a s k in g y o u t o
c o n f ir m t h a t y o u w a n t t o r e m o te ly w ip e
t h e d e v ic e . I f y o u a r e s u r e y o u r w a n t t o
w ip e t h e d e v ic e , c lic k W ip e D e v ic e .
M o b ile s e tt in g s
ם AdpI 2TTA4T Doctor Brode 00V<« ID 38c60Sd IS Google Sync 10/20/11 Approved
■ M ID 86743096674 309
H a rd w a re
ם ABfiLDUMT Hi ifaart OuMn IS Google Sync 10/20/11 Approved
F T»t Sync 4/1(111 926 PM
□ Am U EX M I l- . k lr o k . r o d i Last Sync 1 (y2 * 1 1 208 PM IS Google Sync 10/20/11 Approved
c And JCSA4T JucquKRetm i [ Block Remote Woe View Details רIS Google Sync 10/15/11 Approved
ם Afifif.PniMS Vic l a ! t o ] 1 A. IS Google Sync 10/18/11 Approved
ם Acd EYD3NS Tom Castro tome att1 0 **acatr *teem ■Phone 3Gs ■OS 4 3 Google Sync 10/14/11 Approved
ם AP0L.50XA4T Gervaslo Montonwro am nlom on •4K«t1Mcom iPhone 4 iOS 4.3 Google Sync 10/13/11 Approved
C 3cSO Ie7a0§ Erik Lontito( etklomot >a«astfatcom Oqtad MT Andro!d235 Android 1013/11 ׳ ן
ם Ado WQ8A4T 1
B<wtr /Vllofbo beatimasfbo - altos trat com ■Phone 4 !os 4 נ Google Sync 10/8/11 Biocaod
□ 3336 &04a6d Ptofro Monaid ptMiememrdialostialcoai Ixjiad UT Android 2 3 5 Android 1<y7/11 Approved
A0PLZPDFHW Silas Haslam stoslmlamaaaostiatcom iPad 2 ■OS4 3 Google Sync 10/6/11
D ro id S h e e p G u a rd m o n i to r s
y o u r p h o n e s A R P -T ab le a n d
. ^ 1* ®״ *יי י27.12.2011
ג י20•:)« 51<
p o p - u p a l e r t s in c a s e it
d e t e c ts s u s p ic io u s e n tr ie s in m -
t h e p h o n e s A R P-T able וז מ ח ה
It c a n im m e d ia te ly d is a b l e
W iFi c o n n e c tio n to p r o te c t
C h e c k s p er Minute: 60
y o u r a c c o u n ts
V ' Autoslart/ slop depending WiFi
D ro id S h e e p G u a rd w o r k s S O M E O N E SEEM S TO BE HIJACKING USING
ARP S P O O FIN G ON THIS NETWORK'
w ith all A R P -B a se d a t ta c k s ,
V / Disable WiFi on alert
like D ro id S h e e p a n d F ace n iff Open DroidSheep Guard
y / Notify in system
111mil
4K
^^^TL
־r r -
\ f Notify in system
Android Vulnerability
Scanner: X-Ray CEH
Wunderbar
ZcrgRuch
U1l«.KWrl Jjl, 71^ JtW
Gingerbr^nk V׳
t Ml rrvVy/M JmV WH
Zim peilkh
X-Ray is automatically updated with the V׳
♦כד־ O י ם
ability to scan for new vulnerabilitiesas
they are discovered and disclosed © L ____________________
ייt 9 t * ▼4 ■ »« « | f M v 1 4 • IN
X Local Target!
IDHQ.3
•
•
ft■
1 ;
1000JV24 10001
•
Scar
w ; ip •
•
•
CennMi 02
100 100.0J
׳W • MM
• 1HWlHW
■ • iMMUMMl• •
•
\ «R«I
m
100.0s
■
׳ 19
006
•
I 10
MJ.TM Altxk
m
^
! mW •
••
V 1!«׳ A 0
to!■4D 711w
Security Settings
p r e y
Total Equipment
Pr te c tio n
app
□ Btctup my ptauw fromQniMvKi
o
iH ound G adgetTrak M o b ile S e cu rity Total E q u ip m e n t P ro te c tio n A pp A n d ro id L o s t.c o m
https://ww w . ihoundsoftware. com http://w w w . gadgettrak. com https://protection. sprint, com http ://www. android lost, com
F in d M y P h o n e
Source: http://findmyphone.mangobird.com
Find My Phone is an Android phone app that helps you find your lost, stolen, or misplaced
phone. When you lose your phone, just send it a text msg (SMS) and the phone will reply with
its current location. You can also make your phone ring loudly if you lose it somewhere close,
like inside your home.
P r e y A n ti-T h e ft
Source: http://preyproject.com
Prey lets you keep track of your laptop, phone, or tablet if it is stolen or missing. It supports
geolocation. It's lightweight, open source software that gives you full and remote control, 24/7.
A n d ro id A n ti-T h e ft S e c u r ity
— Source: http://www.snuko.com
The Android anti-theft security tool Snuko is anti-theft software that allows you to use it on
multiple platforms protecting thousands of PCs, mobile phones, laptops, etc. It offers a
complete online back-up solution; as part of the anti-theft package Snuko subscribers' files can
be stored safely and securely in the cloud. This can generate important tracking information
and security for your data by using its Mobile Dashboard. If the mobile device is lost, then the
device is locked to prevent any unauthorized access. If the device's SIM card is replaced without
your knowledge, the new SIM card number, phone number, and the IMEI/IMSI numbers will be
recorded. The phone cannot be used until the correct PIN code is entered.
1•
• 0■ a o n
M . b|fSf»*r>
ANDROID ANTI-THEFT
O tv K • lo c a tio n
y .
m • -_ • ־
I
'*
y V
* #
־-* •
A c c u • c y to iM h n € 0 r « c « « n o f
t o c j d o n C k t 1 r u f » « o r r M r w T V t n \j p ,
W h e re s M y D ro id
Source: http://wheresmydroid.com
Where's My Droid is an Android device tracking tool that allows you to track your phone from
anywhere, either with a text messaged attention word or with an online Commander. The app
can also get the GPS coordinates with a link to Google Maps; if you're not near enough to your
phone to hear the ringer, it can turn the ringer volume up and make your phone ring. One of
the features is Activity Log, which enables you to see what the app does, when it does it, and
who is using it.
%•!■>)<™י-•
iH o u n d
iHound is an Android device tracking tool that allows you to track your mobile using its GPS and
WiFi, 3G, or Edge signals built into your devices to determine its location. Using its tracking
website, you can track the location of your device, remotely lock your phone, and remotely
erase important personal information such as: SMS messages, contacts, phone call logs, photos,
videos, and/or SD storage data. You can also set Geofencing location alerts by its intuitive
mobile website optimized for iPhone, iPod Touch, and Android phones. You can track multiple
devices on multiple platforms and set up Geofences.
G a d g e tT r a k M o b ile S e c u rity
Source: http://www.gadgettrak.com
GadgetTrak Mobile Security tool helps you to moderate the risk of mobile device loss or theft.
It allows you to track its location, back up data, and even wipes the data in the device remotely.
With the combination of GPS, Wi-Fi positioning, and cell tower triangulation, you can easily
track the location of your device. If your device is lost or stolen, you can remotely enable a
piercing alarm, even if it's in silent mode. Once tracking is activated, the software settings
cannot be modified unless deactivated.
' B f f f l U l 2 2 4 PM
II w a n e t o b e a b e t o w ip e m y p ic t u r e s
if (his Susan s N e xjs One gets stolen
T o ta l E q u ip m e n t P r o te c tio n A p p
Total E q u ip m e n t
P r te c tio n
app
a su n o n
A n d r o id L o s t.c o m
4 9 ’! ^ * י ן/ ■ ( : u i n
www.Androidlost.com
IM k U
Dm s •n •pp (M l M you rwnott coMrol yaw
Jfton* from *form 4nar04O(»t.(0m UtcfUl m c««
fOu pul your im M c on ite it and lew n «
u»n«w«Mr•. of In cm• ■ (•o *cm
8 »0
iooa ntwt • your prion* • «ir*Mfy r#f » f m
fo o t* vo trw־y can vmd to you Non
0
I |v> to wwrw mdroOott com 411*0 יוto
wnottcantroi your phone.
I■01
M odu.le Flow c EH
Uttiftod IU kjI lUchM
ft ft ft
r ls M . r ׳
Mobile Platform
Attack Vectors
Hacking
BlackBerry
Module Flow
iOS is a mobile operating system developed by Apple. Apple does not license iOS for
installation on non-Apple hardware. The increasing use of Apple devices for many purposes has
grabbed the attention of attackers. Attackers are concentrating on hacking iOS so that they can
gain access to Apple devices at the root level.
This section introduces you to the Apple iOS and focuses on hacking iOS. This section describes
iOS attack vectors such as jailbreaking and types of jailbreaking, and also covers the guidelines
to be followed in order to secure iOS devices.
H om e A b o u t Us P ortfolio | T ec h N e w s | S e r v ic e
24-Sep-2012
Researchers Hack iPhone Running Latest
^ Apple iOS, Steal Data
A h W h it e - h a t h a c k e rs b r o k e in to t h e d e v e lo p e r v e r s io n o f iOS 6, m e a n in g A p p le 's ^
n e w iP h o n e 5 c o u ld b e v u ln e r a b le . P™ / ,
..... R esearchers h a v e b ro k e n in to a n iP h o n e 4S ru n n in g th e la te s t v e rs io n o f A p p le
מ I iOS, m a k in g it p o s s ib le t o e x p lo it th e sa m e v u ln e ra b ility in th e iP h o n e 5.
Security News
R e s e a r c h e r s H a c k iP h o n e R u n n in g L a t e s t A p p le iO S ,
S te a l D a ta
Source: http://www.computerworld.in
White-hat hackers broke into the developer version of iOS 6, meaning Apple's new iPhone 5
could be vulnerable.
Researchers have broken into an iPhone 4S running the latest version of Apple iOS, making it
possible to exploit the same vulnerability in the iPhone 5.
The white-hat hackers Joost Pol and Daan Keuper showed how they were able to steal contacts,
browsing history, photos and videos to win $30,000 in the mobile Pwn20wn contest
Wednesday at EUSecWest in Amsterdam, IT World reports.
Because the hacked iPhone was running a developer version of iOS 6, it's likely the same
vulnerability could be used to break into an iPhone 5 or the latest iPad and iPod Touch devices.
The WebKit browser exploit took only a few weeks to make, the researchers told IT World.
Using the malicious code in a website would enable a cybercriminal to bypass the security
mechanisms in Safari to gain access to the phone's data.
WebKit is a layout engine used by browsers to render Web pages. The open source technology
is used in the Safari Web browser in iOS and in Google's Chrome, which recently became the
default browser for Android.
The Dutch researchers are not the first penetrate the iPhone's defenses through WebKit, said
Chenxi Wang, an analyst for Forrester Research. Hackers typically target WebKit because Apple
does not use a number of standard security practices in using the engine.
Apple has not said why, but it could be related to phone performance and battery life. In
addition, Apple doesn't vet code executed on the browser, like it does apps before allowing
them to be offered to iPhone users.
"This opens doors to remote exploitation," Wang said. "But to [Apple's] credit, we haven't seen
a lot of that going on, which is actually quite impressive."
Wang does not believe the risk of the latest vulnerability is very high. That's because a
cybercriminal would have to find a way to get iPhone users to a compromised site. A hacker
could inject malicious code into a popular Web site, but this would also be difficult.
"It's certainly possible and certainly is a threat, but I don't see it becoming a massively popular
way of attacking iPhone users," he said.
The Dutch researchers held back some of the details of their work, in order to prevent giving
cybercriminals a hacking roadmap to the iPhone.
"Apple will have to come up with an update and then people need to upgrade as fast as
possible," Pol told IT World.
Speed in plugging the hole is key to reducing risk, said Peter Bybee, president and chief
executive of cloud security provider Security On-Demand.
"Whether you're likely to be attacked depends on how long the gap will be between when
Apple fixes the problem and attackers repeat the researcher's success," Bybee said. "Just
because the exploit is shared only with the vendor doesn't mean that it won't get out into the
open market. There was enough detail in how they found the exploit and used it that it could
be replicated by an experienced malware creator."
Other participants in the hacker contest demonstrated breaking into the Samsung Galaxy S3 via
its near field communication (NFC) technology. The researchers from security company MWR
Labs were able to beam an exploit from one Galaxy S3 to another.
Once the malicious app is installed in the receiving phone, a hacker would have full access to
the phone's data, Tyrone Erasmus, a security researcher at MWR told IT World. The app runs in
the background, making it invisible to the phone's user.
The exploit targets vulnerability in the document viewer application that comes as a default app
in the Galaxy S2, S3 and some HTC phones. The flaw enables a hacker to steal text messages,
emails, contact information and other data.
The researchers said the vulnerability, which also exists in the Galaxy S2, could be exploited by
malware sent via email, the MWR team said. The researchers also won $30,000 for the hack.
Zero Data Initiative by Hewlett-Packard's DVLabs organized the competition. DVLabs will send
details of the hacks to Apple and Samsung, respectively.
By Antone Gonsalves
http://www.computerworld.in/news/researchers-hack-iphone-running-latest-apple-ios-steal-
data-29822012
Core Services
Core OS
Apple iOS
m iOS is the Apple mobile's operating system established for its iPhones. It maintains and
sustains other Apple devices such as iPod Touch, iPad, and Apple TV. Using the Mac OS X, the
iOS operating system is fabricated. The user interface is based on the concept of direct
manipulation, using multi-touch gestures. This has many other options and features using
which daily work becomes easy and this can be updated on your iPhone, iPad, or iPod Touch
using Wi-Fi and other wireless networks.
FIGURE 1 6 .3 9 : A p p le lo s S c r e e n s h o t
J a ilb r e a k in g , lik e r o o t in g , a ls o c o m e s w it h m a n y s e c u r i t y
a n d o t h e r r i s k s t o y o u r d e v i c e in c l u d in g ?
V o id s y o u r p h o n e 's
M a lw a r e in fe c tio n
w a rra n ty
P o o r p e r fo r m a n c e B ric k in g t h e d e v ic e
Jailbreaking iOS
Jailbreaking is a method of getting control of the iOS operating system that is used on
Apple devices. It relaxes the device from the barriers of dependencies on exclusive Apple
source applications and allows the user to use third-party apps unavailable at the official app
store. It is accomplished by installing a modified set of kernel patches that allow you to run
third-party applications not signed by the OS vendor. It is used to add more functionality to
standard Apple gadgets. It can also provide root access to the operating system and permits
download of third-party applications, themes, extensions, etc. This removes sandbox
restrictions, which enables malicious apps to access restricted mobile resources and
information.
Jailbreaking, like rooting, also comes along with many security and other risks to your device
including:
r ,---------------------------------------------------------------------------------------------------------
^ ^ iB o o t E x p lo it
w i
f c j
, J An iboot jailbreak allows user-level access and iboot- I m
r —1\
level access
)
L, — Bootrom Exploit
Types of Jailbreaking
When the device starts booting, it loads Apple's own iOS at start, but to get more apps
from third parties, the device must then be broken and have the kernel patched each time it is
turned on. There are three types of jailbreaking methods used:
Userland Exploit: A userland jailbreak allows user-level access but doesn't allow iboot-level
access. This type of exploit cannot be tethered as it cannot have recovery mode loops. These
can be patched by Apple. The userland exploits use a loophole in the system application to gain
control of that application. This exploit can only give control to the filesystem. This type of
exploit can access non-vital code in the application and is user friendly and platform
independent.
iBoot Exploits: An iBoot jailbreak allows file system and iboot level access. This type of exploit
can be semi-tethered ifthe device has a new bootrom. This is mostly used to reduce low-level
iOS controls. This exploit method takes the help of the hole in iBoot to delink the code signing
appliance and then the customer can download required applications. Using this method users
configure the mobile to accept custom firmware and probably jailbreak more.
Bootrom Exploits: A bootrom jailbreak can break all the low-level authentications such as
providing filesystem, iBoot, and NOR access (custom boot logos). This process finds a hole in
the application to discard the signature checks. It can't be corrected by Apple. A bootrom
jailbreak allows user-level access and iBoot-level access. These cannot be patched by Apple.
A ■ I ^ ^ h e l d Jailbreaking^
W i th a t e t h e r e d j a i l b r e a k , if t h e
d e v i c e s t a r t s b a c k u p o n it s o w n ,
i t w ill n o l o n g e r h a v e a p a t c h e d
k e r n e l , a n d it m a y g e t s t u c k in a
Untethered Jailbreaking p a r t i a l l y s t a r t e d s t a t e ; in o r d e r
f o r it t o s t a r t c o m p l e t e l y a n d
A n u n te th e r e d ja ilb r e a k h a s th e w i t h a p a t c h e d k e r n e l , it
p r o p e r t y t h a t if t h e u s e r t u r n s t h e e s s e n tia lly m u s t b e "re-
d e v ic e o ff a n d b a c k o n , t h e d e v ic e ja ilb r o k e n " w ith a c o m p u te r
w ill s t a r t u p c o m p l e t e l y , a n d t h e ( u s in g t h e " b o o t t e t h e r e d "
k e r n e l w ill b e p a t c h e d w i t h o u t t h e f e a tu r e o f a ja ilb r e a k in g to o l)
h e l p o f a c o m p u t e r - in o t h e r e a c h t i m e i t is t u r n e d o n
w o r d s , it w ill b e j a i l b r o k e n a f t e r
ea ch re b o o t
Jailbreaking Techniques
There are two jailbreaking techniques:
Untethered Jailbreaking
Untethered jailbreak is a method of rebooting the mobile device without connecting
it to the system every time you boot. If the battery of the device is spoiled, after changing it
boots as usual. Some jailbreak solutions are greenpoisOn, PwnageTool, limeraln, and
snOwbreeze.
Tethered Jailbreaking
With a tethered jailbreak, if the device starts back up on its own, it will no longer have
a patched kernel, and it may get stuck in a partially started state; in order for it to start
completely and with a patched kernel, it essentially must be "re-jailbroken" with a computer
(using the "boot tethered" feature of a jailbreaking tool) each time it is turned on.
H in t• troaaatraod'ylocal> יייי
management system, which means that the Ute' OUKMS rZ.' Mutk Cofitroli Pro •■. , •־ >
packages available in Cydia are provided by a F ieq uan tly A »k*d O u eslton a MyWI OnOemana --1 w »> ) ״׳
decentralized system of repositories (also Copying FMo« l»*nm novk-o
t s HhotoAtjum*. !wag* • M n >
called sources) that list these packages O p n I M Aoom • Mm> To Q PrcTcba paimcraYouTub• >
Hoa Hat■word How-To ^ Paim •Pm) , ho > •כיי
Oovdopar* Onty B Sw״lySMJ <Mm«MV>u> M >
H D D
«־a
httD://bloa.lDhone-dev.ora iPnone 4s with 10S 5.1.1 (9B206) detected. Click the button to begin.
FIGURE 1 6 .4 1 : R e d s n O w S c r e e n s h o t
A b sin th e
A b s in th e is a j a i l b r e a k s o lu tio n fo r y o u r A p p le m o b ile d e v ic e s , in c lu d in g th e iP h o n e , iP a d , iP o d
u n te th e r e d ja ilb r e a k to o lk its .
jailbreak
ChronK-DevAbsintheC2011-2012 Chronic-OevTeam.
5.1.xexploits by 0 pod2g. planet being, and $pimskeks
S.O.xexploits by ppod2g. ftplanetbeing. (tiaunk. pptmskeks.
ppOsixninja. $Musc1eNerd. and pxvolks.
Artwork by01OPK. CUl byMan*neSamaraA$p1mskeks.
Support us (PayPal) http //greenpouOn.com/
T e t h e r e d J a i l b r e a k i n g o f i O S 6 .
E H
U s i n g R e d S n O w
S te p 3: C lick Ja ilb re a k
S te p 6: P u t y o u r d e v ic e back in to DFU m o d e
RedSnOw:
re le a s in g P o w e r w h i l e s till h o l d i n g H o m e fo r a n a d d itio n a l 1 0 s e c o n d s .
S t e p 3 : C lic k J a ilb r e a k .
S te p 4 : S e le c t In s ta ll C y d ia u n d er th e P le a s e s e le c t y o u r o p tio n s p r o m p t a n d c lic k N e x t .
S te p 5: W a it fo r a p p ro x im a te ly 5 m in u te s u n til t h e ja il b r e a k in g p r o c e s s is c o m p l e t e a n d y o u are
re d ire c te d to th e H o m e screen.
S te p 6: P u t y o u r d e v ic e b a c k in to DFU m o d e.
J a i l b r e a k i n g T o o l s : S n O w b r e e z e _ _ ״
a n d P w n a g e T o o l .--------------------
J a ilb r e a k in g T o o ls: S n O w b re e z e a n d P w n a g e T o o l
S n O w b reeze
S n O w B reeze is a j a i l b r e a k i n g to o l fo r W in d o w s OS to c re a te a c u s to m P re -J a ilb ro k e n
c u s to m iz e a d v a n c e d o p tio n s su ch as y o u r r o o t p a rtitio n s iz e .
- t f c j f ■Phono 3 G S
MB \
Q G « n s ra l U n lo c k s
^ C u s to m b o o t k tg o r V f B u i l d I P g Y O •
P w n a g e T o o l
fu tu re u n l o c k is f o u n d . T h i s t o o l is c o m p a t i b l e w i t h M ac OS.
J a i l b r e a k i n g T o o l s : L i m e R a l n
C E H
a n d J a i l b r e a k m e
Ja ilb re a k m e
JailbreakMe
JaibreakMe is the easiest way 10 free your device Experience iOS as it could be,
fully customizable themeable. and with every tweak you coukJ possibly imagine
Safe and completely reversible (jus* restore in iTunes) jaibreaking gives you
control over the device you own זזonly lakes a minute or two and as always., it's L im e R a ln
completely free.
M o re Inform atio n
C y d ia
Jay Freeman (saurik)
Jailbreak by comex.
T e ll * F rien d
m
zero pictures of my facc
known hujjs
3GS new bootrom is broken, fix ponding
sonx people need to restart to gel the Cydia icon to show up after nualling
some people still don't have windows
beat iOS versions aren't supported
onr.stall tr. kmeraln app doew t work, you can ju« delete the blackra In .app directory. 1 need rctresuon icson*
http://www.limeraln.com
C o p y r ig h t © b y E&Cauaci. A l l R ig h ts R e s e rv e d . R e p ro d u c tio n is S t r ic t ly P ro h ib ite d .
& 1=1
B' Q L im eR aln
L im e R a ln is a j a i l b r e a k i n g to o l in v e n te d by a G e o H o t (p ro fe s s io n a l h acker) to h a lt C h ro n ic D ev
s y s te m s .
FIGURE 1 6 .4 5 : L i m e R a ln S c r e e n s h o t
Jailb reak m e
o n l i n e s e r v i c e s . I t is u s e d t o p ro v id e a ja ilb r e a k fo r th e iP a d 2 u n t e t h e r e d .
JarfbreaklAe
C y d ia
Jay Freemen (eeurtk)
Jaibreak by comax
J a i l b r e a k i n g T o o l s : B l a c k r a l n
C E H
a n d S p i r i t
S p irit
Spirit
Jailb rea k
P le a s e c o n n e c t d e v ic e .
S pirit J a ilb re a k
iFad.iFnone.iPod touch
http://spiritjb.com
B la c k ra ln
S o u rc e : h ttp ://b la c k r a ln .c o m
a d v a n c e in t h e s o f t w a r e . It w o r k s o n b o th W in d o w s and M a c O S . I t is d e s i g n e d by G e o h o t.
FIGURE 1 6 .4 7 : B l a c k r a l n S c r e e n s h o t
S pirit
Source: http://spiritjb.com
׳, » יn
Spirit
P I « M C 0 n n « t 0 * » <ייו
Sp i r it j a i l b r c a k
iF a d .iliio n e .iP o d touch
G u i d e l i n e s f o r S e c u r i n g i O S
C E H
D e v i c e s
»I ♦ •I ♦I
•I •I •I •I
1
G u id e lin e s fo r S e c u rin g iO S D e v ic e s
G u i d e l i n e s f o r S e c u r i n g i O S
C E H
D e v i c e s ( c o m ׳d )
Config
Configure Find M y iPhone and utilize it to w ipe a lost o r stolen device
■
Enable Jailbreak d e te ctio n and also protect access to iTunes A p p le lD and
Google accounts, w hich are tied to sensitive data
G u i d e l i n e s f o r S e c u r i n g i O S D e v i c e s ( C o n t ’d )
Guidelines t h a t are to be followed by every user in or der to secure iOS devices against
attacks include:
Q Enable Jailbreak detection and also protect access to iTunes ApplelD and Google
accounts, which are tied to sensitive d a ta
Q Along with this follow th e c o m m o n security guidelines for all th e mobile devices
outlined in t h e later slides
i O S D e v i c e T r a c k i n g T o o l s C E H
11:02 AM K>0N i
iLocalh
© 1.1-6
■Qj Change Package Settings >
Author
Package Details
Section Utiites
Contact poetcjpiy
■ ■י.
M i;
C o p y r ig h t © b y E C C a i n d . A l l R ig h ts R e s e rv e d . R e p ro d u c tio n is S t r ic t ly P ro h ib ite d .
iO S D e v ic e T r a c k in g T o o ls
F in d M y iP h o n e
Find My iPhone iOS Device Tracking Tool allows you t o track a lost or misplaced mobile, iPhone,
iPad, iPod touch, or Mac. This allows you to use a n o th e r iOS device t o find it and p r o te c t your
data. To use this, you need to install t h e app on a n o th e r iOS device, ope n it, and sign in with
your Apple ID. It helps you locate your missing device on a map, play a sound, and even display
a message, remotely.
iH o u n d
iHound is a iOS device tracking tool th at allows you to track your device by simply turning on
iHound; minimize it and let it run. You can even delete it from t h e fast ap p switching bar. It can
still locate your p h on e anytime, a nywhere.
.*״942 AM IfS
■*׳ : scftwa* ^
> WOM I r K l* r
G a d g e t T r a k iO S S e c u rity
GadgetTrak iOS Security is an iOS device tracking tool th at allows you to recover your iPhone,
iPad, or iPod touch by using t h e ability to track your device by using GPS, Wi-Fi positioning, and
cell to w e r triangulation to pin poin t location. Using t h e built-in cameras, you can collect crucial
evidence to help catch th e thief. W he n tracking occurs, you'll receive an email with detailed
information a bo ut its current location. Once tracking is activated th e so ftware settings c annot
be modified unless deactivated. Whe n tracking data is being t r a n s m i t t e d from your device, a
secure SSL connection is used. Only you can access your location reports and camer a. All
images, network information, and location data are s e n t directly to you from your device.
G o dgefT rak
» ( «•׳
(M C M ta u u
Gadget
iL o calis
Source: http://ilocalis.com
iLocalis iOS device tracking tool allows you to control yo ur iPhone from your c o m p u t e r
co nne cte d to t h e Internet. If your iPhone has be en stolen you can find it with th e track feat ure
or even make a r e m o t e call or SMS to see t h e new nu m b e r if th e SIM has been changed. It has
many feat ure s such as location tracking and sharing location with others, r e m o t e iPhone
control, and SMS c o m m a n d s with backup and r e m o t e wipe of data. It has alert zone, push
support, and r e m o t e audio recording with iPhone lock.
-j A u th o r .... >
Package D etails
S ection Utilities
V ( ־f)
C
y
ii
U
© m
M
a
ne
ge
ex
t—
r
ch
FIGURE 1 6 .5 2 : iL o ca lis S c r e e n s h o t
M o d u . l e F l o w C E H
(•rMwd tu«4i lUchM
• • •
1 1 eH .
•
i ^ :־
4^ ־
^
^
M o b ile P la tfo rm
A tta c k V e c to rs
C o p y r ig h t © b y E ( M i« I I iG i. A l l R ig h ts R e s e rv e d . R e p ro d u c tio n is S t r ic t ly P ro h ib ite d .
M o d u le F lo w
So far, we have discussed how to hack iOS. Now we will discuss hacking th e Windows
Phone OS. Similar to Apple's iOS, Windows Phone OS is a n o th e r operating system in tended for
mobile devices.
H a c k in g A n d r o i d iO S M o b ile D e v ic e M a n a g e m e n t
*
IL Jl
H a c k in g iO S M o b i l e S e c u r ity G u id e lin e s a n d T o o ls
9
^5 H a c k in g W in d o w s P h o n e OS ^ M o b ile P e n T e s tin g
This section introduces you to Windows Phone 8 and its architecture and secure bo ot process.
W i n d o w s P h o n e 8 C E H
(
•r
tr
f
w di
t
fcK
4lN
Mh
M
Native 128-bit Bitlocker encryption and remote device Carrier control and branding of "wallet" element is
management of Windows Phone possible via SIM or phone hardware
W in d o w s P h o n e 8
© Trusted s hared Windows core and im pr ove d s upp ort for r em ovable storage.
© Core co m p o n e n t s from Windows 8, including kernel, file system, drivers, network stack,
security c o m po ne nt s , media and graphics s uppo rt.
© Supports native code (C and C++), simplified porting from platforms such as Android,
Symbian, and iOS.
© United Extensible Firmware Interface (UEFI) secu re b o o t protocol and Firmware over
th e air for Windows Phone updates.
6 Features improved ap p sandboxing and VoIP and video chat integration for any VoIP or
video chat app.
W i n d o w s P h o n e 8 A r c h i t e c t u r e C E H
W in d o w s P h o n e - W in d o w s 8 N a tiv e API D if f e r e n c e s
neous
( W in R T )
CoreApplication (WinRT)
Base
H
CR T(C /C + + ), T h r e a d i n g ( W in R T ) , M o C O M ( W in R T ) , B a s e T y p e s / W i n d o w s . F o u n d a t io n ( W in R T )
W in d o w s P h o n e 8 A rc h ite c tu re
FIGURE 1 6 .5 3 : W in d o w s P h o n e 8 A r c h ite c tu r e
S e c u re B oot P ro c e s s
Source: http://www.uefi.org
W hen you first switch on th e pow er th e firmware starts a Unified Extensible Firmware
Interface (UEFI) background t h a t validates t h e hash of t h e s e keys c o m p a r e d to th e signatures
on th e initial boot loaders to confirm t h e operating environment. In this stage t h e signatures
are co mp ar ed on th e Windows Phone b o o t m a n a g e r t o permit t h e genuine and trust ed
applications to start.
Microsoft nee ds their own binaries along with OEM binaries and they should also have a digital
signature signed by Microsoft, which is used to shield th e application and th e boot system from
malware. No one can access all th e keys t h a t are required to start th e system run, and it is not
possible t o build convenient ROMs and t h e signa tures as th ey may differ from th e original
signatures.
P o w e r On
W in d o w s
Phone 8
F irm w a re W in d o w s OS B o o t
O E M UEFI
Boot Phone Boot
A p p lic a t io n s
L o a d e rs M anager
W in d o w s
Phone 8
S y s te m -o n -c h ip U p d a te
(SoC) v e n d o rs B o o t to OS B o o t
Secure F la s h in g
UEFI M ode
TechEd
be ch anged th at are not man da to ry but e n h a n ce security if applied. The following are
a few guidelines th at help in securing Windows OS devices:
© Make sure t o clear all your browsing history from Internet Explorer
© Try to avoid accessing password pro tec ted websites in your windows phone while you
are in unsecured Wi-Fi networks
© Protect your WP8 SIM (Subscriber Identity Module) with a PIN (personal identification
number)
M o d u l e F l o w C E H
Itfc'ul IU<h«
M o d u le F lo w
H a c k in g A n d r o i d iO S M o b ile D e v ic e M a n a g e m e n t
»
I -------
H a c k in g iO S M o b i l e S e c u r ity G u id e lin e s a n d T o o ls
H a c k in g W in d o w s P h o n e O S M o b ile P e n T e s tin g
This section introduces you to t h e BlackBerry operating system, BlackBerry enterprise solution
architecture, and attack vectors. It also covers guidelines for securing BlackBerry devices.
B l a c k B e r r y O p e r a t i n g S y s t e m E H
(
ct
t
c
i
fwdI
tkK
JlI
l
M k
M
N a t iv e s u p p o r t B la c k B e r ry B la c k B e r r y B la c k B e r r y B la c k B e r r y
f o r c o r p o r a te E n te r p ris e M essenger In te rn e t e m a il c lie n t
e m a il S e rv e r S e rv ic e
a:
-
© BlackBerry Messenger
B l a c k B e r r y E n t e r p r i s e S o l u t i o n
A r c h i t e c t u r e
The enterprise server, to g e t h e r with e nt e rp ris e messaging and collaboration systems, provides
email access t o mobile users, enterprise instant messaging, and personal information
m a n a g e m e n t tools. Poorly c onfigured firewalls increase t h e risk of attacks. The Web, Database,
and Application Server contain vulnerabilities. Ift he attacker detec ts t h o s e vulnerabilities, t h e n
he or she can easily carry out an a ttack and t ake control over th e entire server.
Wireless
BlackBerry
Networks
Instant Messaging Servers Enabled Devices
B l a c k b e r r y A t t a c k V e c t o r s C E H
©
I
M e m o ry and T C P /IP
P ro c e s s e s I E m a il C o n n e c tio n s y B la c k b e r r y
V u ln e r a b ilit ie s M a lw a r e s
M a n ip u la tio n s I E x p lo its
r \ r \ r \ r \ r \
JA D F ile 1 S h o rt M e s s a g e | P IM D a ta T e le p h o n y
E x p lo its S e rv ic e (S M S ) 1 A tta c k s A tta c k s
E x p lo its
m if
C o p y r ig h t © b y E&Cauaci. A l l R ig h ts R e s e rv e d . R e p ro d u c tio n is S t r ic t ly P ro h ib ite d .
C E H
■v* ■*־/:
•« l ,״o
|K gP | P u b lis h o n t h e U s e r d o w n lo a d s
a p p w o r ld m a lic io u s a p p
£
Code Signing Service Malicious App Blackberry App
User
A World
A C re a te
m a lic io u s A p p
©
O b t a in c o d e - s ig n in g k e y s M a l i c i o u s a p p s e n d s a ll i n c o m i n g
a n o n y m o u s ly u s in g p r e p a id m e s s a g e s a n d s e n s it iv e d a t a
c r e d it - c a r d s a n d f a l s e d e t a i l s
Attacker
—
C o p y r ig h t © b y E&Cauaci. A l l R ig h ts R e s e rv e d . R e p ro d u c tio n is S t r ic t ly P ro h ib ite d .
........ 11 M a lic io u s C o d e S ig n in g
J A D F i l e E x p l o i t s a n d M e m o r y /
E H
P r o c e s s e s M a n i p u l a t i o n s (
ccitifw
dIt
kKJ
lNM
k
w
I II I I I I I I I I I I I I I I I I I
M e m o r y /P r o c e s s e s M a n ip u la tio n s
A ttacke rs can cre ate m alicious a pp lic a tio n s by c re a tin g an in fin ite lo o p , w ith a
b rea k c o n d itio n in th e m id d le th a t w ill a lw a ys be false to bypass c o m p ile r
v e rific a tio n
C o p y r ig h t © b y E f r C a i n c l . A l l R ig h ts R e s e rv e d . R e p ro d u c tio n is S t r ic t ly P ro h ib ite d .
JA D F ile E x p lo its
זוז M e m o ry /P ro c e s se s M a n ip u latio n s
Attackers can c rea te malicious applications by creating an infinite loop, with a break
condition in t h e middle t h a t will always be false to bypass compiler verification. It will cause a
denial-of-service (DoS) attack when t h e malicious application is run, rendering th e device
unresponsive.
S h o r t M e s s a g e S e r v i c e ( S M S )
E x p l o i t s
0 O 0
—— If A pp is n ot signed
A tta c k e r User
י * ז Attacker
A pp sends all in com in g messages
and se nsitive data
@ * » < ׳............................................................u
User agrees Yes No
S hort M e s s a g e S e rv ic e (S M S ) E x p lo its
P re m iu m R ate S c a m
H■
Regular PC users are more likely to be t ar g e te d by premium rate "d ial ers /'
applications th at connect a user's m o d e m to a premium rate t e l e p h o n e number, which results
in more service provider bills than expected. The s a m e mechanism is enforced in BlackBerry but
doe sn 't use prem ium rate SMSes.
y .......... >A
U s e r r e c e iv e s U s e r ag re e s
P re m iu m Rate S e r v ic e P r o v id e r h u g e b i ll
Service
SM S in tercep tio n
Sending and receiving of m essages can be done easily by the unsigned application. The
^ ״ If A p p is n o t s ig n e d A llo w N / W
I ^ .............................................■> C o n n e c tio n ?
.......................................... 0 w -
it B
A p p s e n d s a n o t if ic a t io n S M S 9 E E 1 K .................................. Ifc f
a n d fo r w a r d s a ll in c o m in g m e s s a g e s U s e r a g re e s Yes No
A tta c k e r
נ SM S B ackdoor
[— 3 ^ • • XJ ■•> Connection?
E m a i l E x p l o i t s
U
r
t
rf
W
cdi
tf
cMj
lNM
h
M
E H
. c o d f i l e in s t a l l s i t s e l f
as a s ta rt-u p p ro c e ss
w i t h n o ic o n
mm 1 1 * *- ——־״
S en d s an 0
e m a il t o a F r o m : <mary (®company.com>
S u b je c t: Cool Game
H o s ts m a lic io u s .c o d a p p lic a t io n f i le
o n a w e b s e rv e r: h ttp : / / w w w .
O
ju g g y b o y .c o m /g a m e .c o d a lo n g w i t h
m a t c h i n g .j a d f i l e :
h t t p : / / w w w . ju g g y b o y .c o m / S
g a m e .ja d
i 0 3 i ! 3 < .c o d f i le e n u m e r a t e s
t h e c o n t a c t li s t , a n d
fo r w a r d s t h e e m a il to
■י י e v e r y o n e o n t h e lis t
S 2 l
Web Server Users Contact List
—
C o p y r ig h t © b y E & C a u a c tl. A ll R ig h ts R e s e rv e d . R e p ro d u c tio n is S t r ic t ly P ro h ib ite d .
E m a il E x p lo its
.c o d f i l e in s t a l ls it s e lf
as a s ta rt-u p p ro c e ss
w i t h n o Ic o n
S e n d s an
e m a il to a From: <maryJDcomoany.com>
B la c k B e r r y u s e r T o :' Bob Brickhaus* <bb wcomoony.com>
H o s t s m a li c io u s .c o d a p p l ic a t io n f i le
0
ar*30
o n a W e b s e r v e r : h ttp :/ / w w w .
j u g g y b o y . c o m / g a m e . c o d a lo n g w i t h
m a t c h in g .ja d f ile :
h ttp :/ / w w w . j u g g y b o y . c o m /
g a m e .ja d __________
13 12 .c o d f i l e e n u m e r a t e s
ar* ar*
t h e c o n t a c t lis t , a n d
fo rw a rd s t h e e m a il to
e v e r y o n e o n t h e lis t
P I M D a t a A t t a c k s a n d T C P / I P
C E H
C o n n e c t i o n s V u l n e r a b i l i t i e s
T C P /I P C o n n e c t io n s
P IM D a t a A t t a c k s
V u ln e r a b ilit ie s
aH i
M
y 5®־
V u ln e ra b ilitie s
P IM D a ta A tta c k s
If th e device firewall is off, signed apps can open TCP c o nn ect ion s w it ho ut t h e user being
pr om pt e d. Malicious a pp s installed on t h e device can create a reverse connection with th e
attacker enabling him or her t o utilize infected device as a TCP proxy and gaining access to
organization's internal resources. Attackers can also exploit th e reverse TCP connection for
backdoors and perform various malicious information gathe ring attacks.
B la c k b e rry S p y w a r e : F in S p y M o b i l e C E H
It p r o v id e s t h e r e m o t e u s e r w i t h :
Name: rlc_channel_mode_updater
V ersion: 4.1
V endor: TellCOM Systems LTD
Size: 139.0KB R ec o rd in g o f c o m m o n c o m m u n ic a tio n s lik e Voice
D e s c rip tio n :
Common Communication Update DSCH/
<N> Calls, S M S /M M S and Em ails
USCH V32
■ Set application permissions.
Download I Cancel <M> t Live S u rv e illa n c e th ro u g h S ile n t Calls
Full R e c o rd in g o f a ll B la c k B e rry M e s s e n g e r
O O c o m m u n ic a tio n s
G u i d e l i n e s f o r S e c u r i n g
C E H
B l a c k B e r r y D e v i c e s
Every user must follow guidelines t o protect their BlackBerry devices against various
attacks:
© Use c on te nt protection feat ure for protecting data on BlackBerry Enterprise Network
M o d u l e F l o w C E H
i
U i
talI
U<h
•
*
M o d u le F lo w
So far, we have discussed various mobile platform attack vectors, how to hack
Android OS, iOS, Windows Phone OS, and BlackBerry. Now, we will discuss Mobile Device
M a n a g e m e n t (MDM), software th at secures, monitors, manage s, and su pports mobile devices.
H a c k in g A n d r o i d iO S ^ f M o b ile D e v ic e M a n a g e m e n t
H a c k in g W in d o w s P h o n e OS ^ M o b ile P e n T e s tin g
This section introduces you to MDM and its logical architecture. It also covers various MDM
solutions.
M o b ile D e v ic e M a n a g e m e n t ( M D M ) C E H
Windows
SmartPhone Symbian OS
□ ״3
Tablet PC
M o b ile D e v ic e M a n a g e m e n t (M D M )
Administrative MDM
Console Server
Tablet PC iPhone
FIG U R E 1 6 .6 1 : M o b ile D e v ic e M a n a g e m e n t ( M D M )
A A A
: Initial and Incremental Loads ■(Batch extract, transform , load)
■•■■■■■■■a■■■■..................a■■■■■■■■■■■■■■ ■ ■ ■a■■•■•■■■■■■■■■■■■■■■■■■■■■■.................../
M D M L o g ic al A rc h ite c tu re
E x te rn a l In te rn a l
P a it u e is 1
P a r t ic ip a n t s P a r t ic ip a n t s
E x te r n a l D a ta
P r o v id e r s
“ ‘ל
t t t $ $
M essage R o u t in g P u b li s h S y n c h ro n o u s / Q u a l it y o f S e r v ic e
SOA
M e d ia t io n
J
T ra n s p o rt S u b s c r ib e A sy n c h ro n o u s S e r v ic e I n t e g r a t io n
% t t $ t
C e n tra l M a s te r D a ta I n f o r m a t io n E n t e r p r is e
A n a ly t ic s
M anagem ent M anagem ent I n t e g r a t io n M e ta d a ta
S e r v ic e s < M >
S e r v ic e s S e r v ic e s < w > S e r v ic e s M anagem ent
A•
A
I n itia l a n d I n c r e m e n t a l L o a d s
A
: ( B a t c h e x t r a c t , t r a n s f o r m , lo a c f f
M D M S o l u t i o n : M a a S 3 6 0 M o b i l e
C E H
D e v i c e M a n a g e m e n t ( M D M ) (•rtifwd ithiul •UtkM
MaaS360 supports the com plete m o bile device m a n a g e m e n t(M D M ) lifecycle fo r sm artphones and
tab le ts including iPhone, iPad, Android, W indow s Phone, BlackBerry, and Kindle Fire
J As a fu lly in te g ra te d cloud p la tfo rm , MaaS360 sim plifies M D M w ith rapid deploym ent, and
com prehensive visib ility and co n tro l th a t spans across m obile devices, applications, and docum ents
h ttp : //w w w .m a a s 3 6 0 .c o m
S y M D M S o lu tio n : M a a S 3 6 0 M o b ile D e v ic e
M a n a g e m e n t (M D M )
Source: ht tp : // w w w .m aa s 3 6 0 .c o m
FIG U R E 1 6 .6 3 : M a a S 3 6 0 M o b ile D e v ic e M a n a g e m e n t ( M D M )
M D M S o l u t i o n s C E H
F ^ l
A b s o lu te M a n a g e M D M M o b ile lr o n
-1 j g
http://www.abs olute.com http://www.mobileiron,com
- •_____ ׳
A irW a tc h M e d ia C o n ta c t
http://www.air-watch,com ko m http://www.device-management-software.com
V __ *
M D M S o lu tio n s
© TARMAC available at ht tp : // w w w .t a r m a c - m d m . c o m
M o d u l e F l o w C E H
i
U i
talI
U<h
•
*
M o d u le F lo w
- So far, we have discussed various topics such as mobile platform attack vectors,
hacking m e t h o d s of Android OS, iOS, Windows Phon e OS, BlackBerry, and how t o m an ag e
mobile devices. All t h e s e topics discussed so far help in testing mobile devices. Now, w e will
discuss mobile security guidelines and tools t h a t help in securing t h e mobile devices.
% H a c k i n g A n d r o i d iO S M o b ile D e v ic e M a n a g e m e n t
9
v___ 1
S '
H a c k in g W in d o w s P h o n e OS ^ M o b ile P e n T e s tin g
G e n e r a l G u i d e l i n e s f o r M o b i l e
E H
P l a t f o r m S e c u r i t y
Never connect tw o
separate networks such
Install applications from as Wi-Fi and Bluetooth
trusted application stores simultaneously
G e n e r a l G u i d e l i n e s f o r M o b i l e
C E H
P l a t f o r m S e c u r i t y ( C o n t ’d )
U se Passcode
» Configure a strong passcodc with maximum possible
length to gain access to your mobile devices
ט D o n o t a ll o w R o o tin g o r
J a ilb r e a k in g
e Set an idle timeout to automatically lock the phone » EnsureyourMDM solutions prevent or detect
when not in use rooting/jailbreaking
9 Enable lockout/wipe feature after a certain number e Include this clause in your mobile security policy
of attempts
U p d a te O S a n d A p p s
e Use re m o te w ip e services such as Remote
W ipe (Android) and Find M y iPhone o r
FindMyPhone (Apple iOS) to loca te your
» M &
device should it be lost o r stolen
E n a b le R e m o te M a n a g e m e n t
® I f s u p p o rte d , c o n fig u re y o u r m o b ile device
ט In an enterprise environment, use Mobile Device
to e n c ry p t its s to ra g e w ith h a rd w a re
Management (MDM) software to secure,
monitor, manage, and support mobile devices e n c ry p tio n
deployed across the organization
The following guidelines will help you to secure your mobile device from many type of attack:
1. U se a p a s s c o d e fo r m o b ile d e v ic e s e c u rity
© Configure a stron g passc ode with maximum possible length t o gain access to your
mobile devices
2. U p d a te OS and a p p s re g u la rly
3. E n a b le R e m o te M a n a g e m e n t
5. Use r e m o t e wipe services such as Remote Wipe (Android) and Find My iPhone or
FindMyPhone (Apple iOS) to locate your device should it be lost or stolen
6 . If supp orte d, configure your mobile device t o encrypt its storage with ha rdwa re
encryption
H ard e n b r o w s e r p e rm is s io n ru le s
D e s ig n a n d im p le m e n t m o b ile d e v ic e p o lic ie s
© Set a policy t h a t defines th e accep ted usage, levels of support, type of information
access on different devices
G e n e r a l G u i d e l i n e s f o r M o b i l e
E H
P l a t f o r m S e c u r i t y ( c o n t ’d )
G e n e r a l G u i d e l i n e s f o r M o b i l e
C E H
P l a t f o r m S e c u r i t y ( C o n t ’d )
V e rify th e lo c a tio n o f p r in te r s b e fo re
p rin tin g s e n sitive d o c u m e n ts
R ep o rt a lo s t o r s to le n d e v ic e t o IT so th e y t ^
G e n e r a l G u i d e l i n e s f o r M o b i l e
r
I E H
P l a t f o r m S e c u r i t y ( C o n t ’d ) (
ci
ti
fwd
1 i
tkK
JlN
mI
m
Ask your IT department how to use Citrix If you must have sensitive data on a mobile
technologies to keep data in the datacenter device, use follow-me data and ShareFile as
and keep personal devices personal an enterprise-managed solution
Q Ask your IT d e p a r t m e n t how to use Citrix tec hnol ogies to keep data in t h e d a ta c e n te r
and keep personal devices personal
Q If you must have sensitive data on a mobile device, use follow-me data and ShareFile as
an e n ter pri se- m ana ge d solution
© Configure location services t o disable location tracking for applications t h a t you do not
wa n t t o know your location information
Q Configure AutoFill; Auto-fill Names and Passwords for browsers to reduce password loss
via shoulder-surfing and surveillance (if desired and allowed by enterprise policy)
M o b i l e D e v i c e S e c u r i t y
C E H
G u i d e l i n e s f o r A d m i n i s t r a t o r
n i m
Publish an enterprise policy that specifies the acceptable usage of consumer grade devices
and bring-your-own devices in the enterprise
III Enable security measures such as antivirus to protect the data in the datacenter
Implement policy that specifies what levels of application and data access are allowable
on consumer-grade devices, and which are prohibited
G u
Specify a session timeout through Access Gateway
Specify whether the domain password can be cached on the device, or whether users must
enter it every time they request access
V II Determine the allowed Access Gateway authentication methods from the following: M
The administrator should follow th e guidelines listed here to i mp lem en t mobile device
security:
© No authentication
© Domain only
© SMS authentication
M o b i l e P r o t e c t i o n T o o l :
E H
B u l l G u a r d M o b i l e S e c u r i t y
j Basic Backup
I Backup dtvc• data • Wip• (!•vie• ■RwTY»t*ly(M•*• *II !1«r•anal 41
, Parental Control
1
©
Hartnui control $ enabled
Antitheft
a 4of Ctantitheft features cncbUd
Detected Hems will be listed here
Source: http://www.bullguard.com
BullGuard Mobile Security delivers c om pl e te mobile ph one antivirus against all mobile phone
viruses. It tracks a stolen or lost mobile via th e built-in GPS, locks it, or wipe t h e data off it, t o
make sure no one can access your personal information, passwords, and financial data.
M o b i l e P r o t e c t i o n T o o l : L o o k o u t
L o o k o u t p r o t e c ts y o u r p h o n e f r o m
m o b ile t h r e a ts
M o b ile P r o te c tio n T o o l: L o o k o u t
Lookout is a mobile protection tool th at allows you t o protect your mobile from mobile t hre ats .
It helps you to avoid risky behavior such as connecting to an unsecu red Wi-Fi network,
d o w nl oa di ng a malicious a pp or clicking on a f ra ud ul en t link in order to prevent identity theft,
financial fraud and th e loss of your most personal da ta. This provides safe, secure, and
seamless backup of your mobile data, automatically over t h e air, and allows you to find your
ph on e if it's lost or stolen. The da shboard allows you t o remotely m an a g e your phone.
FIGURE 1 6 .6 5 : L o o k o u t S c r e e n s h o t
M o b ile P r o te c tio n T o o l: W IS e lD
Source: http://www.wiseid.mobi
WISelD provides secure and easy-to-use e n c ry p t e d sto ra g e for perso na l da ta, personal
identifiable information (Pll), PINs, credit and loyalty cards, notes, an d ot her information.
WISelD allows you t o store your websites, user names, and passwords and quickly log on to
your favorite websites through your mobile device.
P re m iu m F e atu re s
ך
A c c o u n ts >
L a n gu a ge >
r ך
D isp la y >
j
In fo rm a tio n >
■ ...... j
• • • • • •
J ? ^ * 3 a m </׳ tt
ltcm% Secure Msg Setting• Mote Kam i Secure Meg Mo#*•
FIG U R E 1 6 .6 6 : W IS e lD S c r e e n s h o t
M o b i l e P r o t e c t i o n T o o l s CEH
. 5 ? M c A fe e M o b ile S e cu rity ► K a sp e rsk y M o b ile S e cu rity
https://www. mcafeemobiles ecurity.com http://www.kaspersky.com
W e broot Secure A n y w h e re
m ^ N o rto n M o b ile S e cu rity
^ http://us. norton.com
M o b ile
http://www.webroot.com
1 M o b ile P ro te c tio n T o o ls
In addition t o the tools including BullGuard Mobile Security, Lookout and WISelD,
th er e are a nu m b e r of ot her tools available for mobile protection:
© McAfee Mobile Security available at https ://ww w.mc afee mo biles ecu rity.c om
M o d u l e F l o w C E H
I
tf
c'ulI
U<h
«
M o d u le F lo w
H a c k i n g A n d r o i d iO S M o b ile D e v ic e M a n a g e m e n t
*
יי--------- ✓
H a c k in g iO S M o b i l e S e c u r ity G u id e lin e s a n d T o o ls
H a c k in g W in d o w s P h o n e OS ^ M o b ile P e n T e s tin g
” . /
A n d r o id P h o n e P e n T e s tin g CEH
(•rtifWd IthKJl IU*kM
O C heck w h e th e r e m a il p a s s w o rd is s to re d as p la in te x t in t h e S Q Lite d a ta b a s e
C heck fo r
and a ls o c h e c k w h e th e r Skype o n A n d ro id uses u n e n c ry p te d SQ Iite d a ta b a s e
v u ln e r a b il iti e s in S Q L ite
t o s to re c o n ta c ts , p r o file in fo r m a tio n and in s ta n t m essage logs
V
Try t o use in te n ts (s te a lin g , m o d ify o r re p la c e ) t o hack th e p h o n e and
C h e c k fo r
o b ta in th e u ser's p riv a c y in fo r m a tio n , and use C o m D ro id to o l t o d e te c t
v u ln e r a b i l i t i e s in I n te n ts
a p p lic a tio n 's c o m m u n ic a tio n v u ln e ra b ilitie s
D e t e c t c a p a b ility
© Use t o o l W o o d p e c k e r t o d e te c t c a p a b ility leaks in A n d ro id devices
le a k s in A n d r o id d e v i c e s
Try to use intents (steal, modify, or replace) to hack the phone and obtain the user's privacy
information and use ComDroid tool to detect application's communication vulnerabilities
Step 6: Detect capability leaks in Android devices
Use tool Woodpecker to detect capability leaks in Android devices.
iP h o n e P e n T e s t i n g CEH
S Use th e M e ta s p lo it to o l t o e x p lo it th e
: C h e c k iOS d e v ic e d a ta
v u ln e ra b ilitie s in iP hone. Try t o send n on -m aliciou s
U n lo c k th e iP h o n e tra n s m is s io n o n W i-F i
code as payload to th e device t o gain access to th e
n e tw o rk s
device
Check for access point with the same name and encryption type.
Step 6: Check iOS device data transmission on Wi-Fi networks
Perform a man-in-the-middle/SSL stripping attack by intercepting wireless parameters of iOS
device on a Wi-Fi network. Send malicious packets on the Wi-Fi network using the Cain & Abel
tool.
Step 7: Check whether the malformed data can be sent to the device
Use social engineering techniques such as sending emails or SMS to trick the user into opening
links that contain malicious web pages.
“
W in d o w s P h o n e P e n T e s tin g c EH
(citifwd ItkKJl NMkM
START .........
Try t o t u r n o f f t h e S S e n d a n S M S t o t h e p h o n e w h ic h t u r n s o f f t h e
p h o n e b y s e n d in g a n SM S m o b ile a n d r e b o o ts a g a in
Try t o j a i l b r e a k e U s e W in d o w B r e a k p r o g r a m t o ja ilb r e a k /u n lo c k Q
W in d o w s p h o n e W in d o w s p h o n e
C h e c k fo r e C h e c k w h e th e r t h e d a ta o n p h o n e c a n b e a c c e s s e d
o n ־d e v ic e e n c r y p t io n w i t h o u t p a s s w o r d o r PIN
in W in d o w s p h o n e a tta c k e rs t o g a in f u ll acc e s s o v e r t h e p h o n e t h r o u g h r e m o t e c o d e
I n t e r n e t E x p lo re r e x e c u tio n
Check whether the flaw in CSS function in Internet Explorer allows attackers to gain full access
over the phone through remote code execution.
B la c k B e r r y P e n T e s tin g CEH
P e r f o r m b la c k ja c k in g
( 5 ) ••••> © U s e B B P ro x y t o o l t o h ija c k B la c k B e rry c o n n e c tio n
o n B la c k B e rr y
START
© S e n d m a ils o r m e s s a g e s t o t r ic k a u s e r t o d o w n lo a d m a lic io u s .c o d
P e r f o r m e m a il e x p l o it
a p p lic a tio n f i l e o n t h e B la c k B e rry d e v ic e
it
« T ry s e n d in g m a lf o r m e d S e rv e r R o u tin g P r o to c o l (SRP) p a c k e ts f r o m
P e r f o r m D O S a t ta c k
B la c k B e rry n e t w o r k t o t h e r o u t e r t o c a u s e DO S a tta c k
~ v ~
— 9 —
S e a rc h f o r p a s s w o r d ® U s e t o o ls s u c h as E lc o m s o ft P h o n e P a s s w o rd B r e a k e r t h a t c a n r e c o v e r
p r o t e c t e d f ile s p a s s w o r d p r o te c te d file s , b a c k u p s f r o m B la c k B e rry d e v ic e s
M o d u le S u m m a ry CEH
Urtiftetf ttku jl lUckM
□ S a n d b o x i n g h e l p s p r o t e c t s y s t e m s a n d u s e r s b y l i m it in g t h e r e s o u r c e s t h e a p p c a n a c c e s s in t h e m o b i l e
p la tfo rm
□ A n d ro id is a s o f tw a r e s ta c k d e v e lo p e d b y G o o g le f o r m o b ile d e v ic e s t h a t in c lu d e s a n o p e r a t in g s y s te m ,
m id d le w a r e , a n d key a p p lic a tio n s
□ J a ilb re a k in g p ro v id e s r o o t a c c e s s t o t h e o p e r a t in g s y s te m a n d p e r m its d o w n lo a d o f th i r d - p a r ty
a p p l i c a t i o n s , t h e m e s , e x t e n s i o n s o n a n iO S d e v i c e s
□ A tta c k e r c a n o b t a i n c o d e - s i g n i n g k e y s a n o n y m o u s l y u s i n g p r e p a i d c r e d i t - c a r d s a n d f a l s e d e t a i l s , s ig n a
m a l i c i o u s a p p l i c a t i o n , a n d p u b l i s h i t o n t h e B la c k b e r r y a p p w o r l d
□ M o b i l e D e v ic e M a n a g e m e n t (M D M ) p r o v i d e s a p l a t f o r m f o r o v e r - t h e - a i r o r w ir e d d i s t r i b u t i o n o f
a p p l i c a t i o n s , d a t a , a n d c o n f i g u r a t i o n s e t t i n g s f o r a ll t y p e s o f m o b i l e d e v i c e s , in c lu d in g
m o b ile p h o n e s , s m a r t p h o n e s , t a b l e t c o m p u te r s , e tc . _____ - I
Module Summary
Q The focus of attackers and malware writers has shifted to mobile devices due
to the increased adoption of mobile devices for business and personal purposes
and comparatively lesser security controls.
Q Sandboxing helps protect systems and users by limiting the resources the app can access
in the mobile platform.
6 Android is a software stack developed by Google for mobile devices that includes an
operating system, middleware, and key applications.
e Rooting allows Android users to attain privileged control (known as "root access") within
Android's subsystem.
9 Jailbreaking provides root access to the operating system and permits download of
third-party applications, themes, and extensions on iOS devices.
Q Attacker can obtain code-signing keys anonymously using prepaid credit-cards and false
details, sign a malicious application and publish it on the BlackBerry app world.