TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Mobile Hacking
1. Mobile Hacking
Oleh:
Novizul Evendi
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
2. #id
Hatsecure
T'Lab
Wakhost
Novizul Evendi
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
3. #Agenda
● Mobile Technology
● Threats
● Mobile Attach / as Attach
● Defence
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
4. #Mobile Technology
is the technology used for cellular communication
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
6. #Smart Phone
is a mobile phone built on a mobile operating system,
with more advanced computing capability connectivity
than a feature phone
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
7. #Threats
● Bluetooth
● Wifi
● App Cracked
● Root Access (Super Admin)
● Data Storage
● Internet
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
8. #Threats
● Bluetooth
Cloning device/information, Read
SMS. Contact, dll
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
9. #Threats
● App Cracked
Virus, Keylogger, Malware, Trojan,
Backdoor, dll
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
10. #Threats
● Root Access (ROOTED)
Dell File, Format File System,
Backdoor, Malware, dll
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
11. #Threats
● Data Storage
Virus, Malware, Trojan, Backdoor, dll
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
12. #Threats
● Internet
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
13. #Mobile Hacking Tools
PWN PAD
PWN Phone
Linux ./Chroot
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
14. #Mobile Hacking Tools
PWN PAD
WIRELESS:
● Aircrack-ng
● Kismet
● Wifite
NETWORK TOOLS:
OpenVAS,nmap,netcat, tcpdump,
tshark, Ettercap-ng, SSLstrip v9, hydra,
Metasploit4, pyrit, scapy, john (JTR)
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
15. #USB
- USB OTG cable (for USB host-mode)
- USB-Ethernet adapter
- USB Bluetooth adapter
- TP-Link High-gain 802.11b/g/n USB wireless adapter
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
17. #Mobile Hacking Tools
PWN Phone
- Includes Aircrack-NG, Metasploit,
Kismet, GrimWEPa, SET,
Fasttrack, Ettercap, nmap, and
more
- Custom pentesting desktop with
shortcuts to all tools!
- One-click evil AP, WEP cracker,
and packet capture!
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
18. #Android Hacking Tools
- dSpoit
- Orbot
- WhatshappSniffer
- Wifinfect
- AnDOSid
- Anti
- SSH Server
- Linux BT ./chroot (ARM) ROOTED
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
19. Conclusion
- Use Firewall / AntiVirus
- App UpToDate
- Don't use cracked App
- Security Lock
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013
20. DEMO...
Terima Kasih
karuwak@tlab.co.id
Www.hatsecure.com
Identification techniques for encrypted- data
Mobile Hacking | 13 - 04 2013