SlideShare a Scribd company logo
1 of 20
Download to read offline
Mobile Hacking




        Oleh:
    Novizul Evendi



            Identification techniques for encrypted- data
                                 Mobile Hacking | 13 - 04 2013
#id

                               Hatsecure

      T'Lab
                               Wakhost




  Novizul Evendi




  Identification techniques for encrypted- data
                       Mobile Hacking | 13 - 04 2013
#Agenda
●   Mobile Technology
●   Threats
●   Mobile Attach / as Attach
●   Defence




                                Identification techniques for encrypted- data
                                                     Mobile Hacking | 13 - 04 2013
#Mobile Technology


is the technology used for cellular communication




                   Identification techniques for encrypted- data
                                        Mobile Hacking | 13 - 04 2013
#Mobile Operating Systems data
   Identification techniques for encrypted
#Smart Phone

is a mobile phone built on a mobile operating system,
with more advanced computing capability connectivity
than a feature phone




                       Identification techniques for encrypted- data
                                            Mobile Hacking | 13 - 04 2013
#Threats

     ●   Bluetooth
     ●   Wifi
     ●   App Cracked
     ●   Root Access (Super Admin)
     ●   Data Storage
     ●   Internet




    Identification techniques for encrypted- data
                         Mobile Hacking | 13 - 04 2013
#Threats

     ●   Bluetooth

         Cloning device/information, Read
         SMS. Contact, dll




    Identification techniques for encrypted- data
                         Mobile Hacking | 13 - 04 2013
#Threats

     ●   App Cracked

         Virus, Keylogger, Malware, Trojan,
         Backdoor, dll




    Identification techniques for encrypted- data
                         Mobile Hacking | 13 - 04 2013
#Threats

     ●   Root Access (ROOTED)

         Dell File, Format File System,
         Backdoor, Malware, dll




    Identification techniques for encrypted- data
                         Mobile Hacking | 13 - 04 2013
#Threats

     ●   Data Storage

         Virus, Malware, Trojan, Backdoor, dll




    Identification techniques for encrypted- data
                         Mobile Hacking | 13 - 04 2013
#Threats




                                         ●   Internet


    Identification techniques for encrypted- data
                         Mobile Hacking | 13 - 04 2013
#Mobile Hacking Tools




     PWN PAD
        PWN Phone
          Linux ./Chroot


                Identification techniques for encrypted- data
                                     Mobile Hacking | 13 - 04 2013
#Mobile Hacking Tools

        PWN PAD

        WIRELESS:
           ● Aircrack-ng
           ● Kismet
           ● Wifite

        NETWORK TOOLS:
           OpenVAS,nmap,netcat, tcpdump,
           tshark, Ettercap-ng, SSLstrip v9, hydra,
           Metasploit4, pyrit, scapy, john (JTR)




              Identification techniques for encrypted- data
                                   Mobile Hacking | 13 - 04 2013
#USB

- USB OTG cable (for USB host-mode)



- USB-Ethernet adapter



- USB Bluetooth adapter



- TP-Link High-gain 802.11b/g/n USB wireless adapter




                                       Identification techniques for encrypted- data
                                                            Mobile Hacking | 13 - 04 2013
Identification techniques for encrypted- data
                     Mobile Hacking | 13 - 04 2013
#Mobile Hacking Tools

PWN Phone

-   Includes Aircrack-NG, Metasploit,
    Kismet, GrimWEPa, SET,
    Fasttrack, Ettercap, nmap, and
    more

-   Custom pentesting desktop with
    shortcuts to all tools!

-   One-click evil AP, WEP cracker,
    and packet capture!




                                        Identification techniques for encrypted- data
                                                             Mobile Hacking | 13 - 04 2013
#Android Hacking Tools

- dSpoit
- Orbot
- WhatshappSniffer
- Wifinfect
- AnDOSid
- Anti
- SSH Server
- Linux BT ./chroot (ARM)                               ROOTED

                            Identification techniques for encrypted- data
                                                 Mobile Hacking | 13 - 04 2013
Conclusion


 - Use Firewall / AntiVirus
 - App UpToDate
 - Don't use cracked App
 - Security Lock




         Identification techniques for encrypted- data
                              Mobile Hacking | 13 - 04 2013
DEMO...




          Terima Kasih



                                         karuwak@tlab.co.id
                                         Www.hatsecure.com


                Identification techniques for encrypted- data
                                     Mobile Hacking | 13 - 04 2013

More Related Content

What's hot (20)

Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
User authentication
User authenticationUser authentication
User authentication
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
OWASP Top 10 for Mobile
OWASP Top 10 for MobileOWASP Top 10 for Mobile
OWASP Top 10 for Mobile
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Cyber security
Cyber securityCyber security
Cyber security
 
Android security
Android securityAndroid security
Android security
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 

Similar to Mobile Hacking

ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013drewz lin
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile ApplicationsDenim Group
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017TecsyntSolutions
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxrichardnorman90310
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Lancope, Inc.
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionNagarro
 
I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2drewz lin
 
An introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh DangwalAn introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh DangwalRishabh Dangwal
 
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?NowSecure
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptxAlAsad4
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 

Similar to Mobile Hacking (20)

NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
Cyber security
Cyber securityCyber security
Cyber security
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Communication security 2021
Communication security 2021Communication security 2021
Communication security 2021
 
Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
880 st011
880 st011880 st011
880 st011
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2
 
An introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh DangwalAn introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh Dangwal
 
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptx
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 

More from Novizul Evendi

More from Novizul Evendi (12)

T'Lab
T'LabT'Lab
T'Lab
 
Hacking Is Not Always a Crime
Hacking Is Not Always a CrimeHacking Is Not Always a Crime
Hacking Is Not Always a Crime
 
Outline course Backtrak Pentest
Outline course Backtrak PentestOutline course Backtrak Pentest
Outline course Backtrak Pentest
 
Virtualisasi Hacking
Virtualisasi HackingVirtualisasi Hacking
Virtualisasi Hacking
 
Wireless Hacking Fast Track
Wireless Hacking Fast TrackWireless Hacking Fast Track
Wireless Hacking Fast Track
 
Dialog Technoprener
Dialog Technoprener Dialog Technoprener
Dialog Technoprener
 
Information System Security
Information System SecurityInformation System Security
Information System Security
 
Virtual hacking Modul
Virtual hacking ModulVirtual hacking Modul
Virtual hacking Modul
 
E-commerce
E-commerceE-commerce
E-commerce
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Hacking Backtrak Mobile
Hacking Backtrak MobileHacking Backtrak Mobile
Hacking Backtrak Mobile
 
Linux & Open Source
Linux & Open SourceLinux & Open Source
Linux & Open Source
 

Recently uploaded

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Mobile Hacking

  • 1. Mobile Hacking Oleh: Novizul Evendi Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 2. #id Hatsecure T'Lab Wakhost Novizul Evendi Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 3. #Agenda ● Mobile Technology ● Threats ● Mobile Attach / as Attach ● Defence Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 4. #Mobile Technology is the technology used for cellular communication Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 5. #Mobile Operating Systems data Identification techniques for encrypted
  • 6. #Smart Phone is a mobile phone built on a mobile operating system, with more advanced computing capability connectivity than a feature phone Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 7. #Threats ● Bluetooth ● Wifi ● App Cracked ● Root Access (Super Admin) ● Data Storage ● Internet Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 8. #Threats ● Bluetooth Cloning device/information, Read SMS. Contact, dll Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 9. #Threats ● App Cracked Virus, Keylogger, Malware, Trojan, Backdoor, dll Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 10. #Threats ● Root Access (ROOTED) Dell File, Format File System, Backdoor, Malware, dll Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 11. #Threats ● Data Storage Virus, Malware, Trojan, Backdoor, dll Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 12. #Threats ● Internet Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 13. #Mobile Hacking Tools PWN PAD PWN Phone Linux ./Chroot Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 14. #Mobile Hacking Tools PWN PAD WIRELESS: ● Aircrack-ng ● Kismet ● Wifite NETWORK TOOLS: OpenVAS,nmap,netcat, tcpdump, tshark, Ettercap-ng, SSLstrip v9, hydra, Metasploit4, pyrit, scapy, john (JTR) Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 15. #USB - USB OTG cable (for USB host-mode) - USB-Ethernet adapter - USB Bluetooth adapter - TP-Link High-gain 802.11b/g/n USB wireless adapter Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 16. Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 17. #Mobile Hacking Tools PWN Phone - Includes Aircrack-NG, Metasploit, Kismet, GrimWEPa, SET, Fasttrack, Ettercap, nmap, and more - Custom pentesting desktop with shortcuts to all tools! - One-click evil AP, WEP cracker, and packet capture! Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 18. #Android Hacking Tools - dSpoit - Orbot - WhatshappSniffer - Wifinfect - AnDOSid - Anti - SSH Server - Linux BT ./chroot (ARM) ROOTED Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 19. Conclusion - Use Firewall / AntiVirus - App UpToDate - Don't use cracked App - Security Lock Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 20. DEMO... Terima Kasih karuwak@tlab.co.id Www.hatsecure.com Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013