Mobile Hacking




        Oleh:
    Novizul Evendi



            Identification techniques for encrypted- data
                                 Mobile Hacking | 13 - 04 2013
#id

                               Hatsecure

      T'Lab
                               Wakhost




  Novizul Evendi




  Identification techniques for encrypted- data
                       Mobile Hacking | 13 - 04 2013
#Agenda
●   Mobile Technology
●   Threats
●   Mobile Attach / as Attach
●   Defence




                                Identification techniques for encrypted- data
                                                     Mobile Hacking | 13 - 04 2013
#Mobile Technology


is the technology used for cellular communication




                   Identification techniques for encrypted- data
                                        Mobile Hacking | 13 - 04 2013
#Mobile Operating Systems data
   Identification techniques for encrypted
#Smart Phone

is a mobile phone built on a mobile operating system,
with more advanced computing capability connectivity
than a feature phone




                       Identification techniques for encrypted- data
                                            Mobile Hacking | 13 - 04 2013
#Threats

     ●   Bluetooth
     ●   Wifi
     ●   App Cracked
     ●   Root Access (Super Admin)
     ●   Data Storage
     ●   Internet




    Identification techniques for encrypted- data
                         Mobile Hacking | 13 - 04 2013
#Threats

     ●   Bluetooth

         Cloning device/information, Read
         SMS. Contact, dll




    Identification techniques for encrypted- data
                         Mobile Hacking | 13 - 04 2013
#Threats

     ●   App Cracked

         Virus, Keylogger, Malware, Trojan,
         Backdoor, dll




    Identification techniques for encrypted- data
                         Mobile Hacking | 13 - 04 2013
#Threats

     ●   Root Access (ROOTED)

         Dell File, Format File System,
         Backdoor, Malware, dll




    Identification techniques for encrypted- data
                         Mobile Hacking | 13 - 04 2013
#Threats

     ●   Data Storage

         Virus, Malware, Trojan, Backdoor, dll




    Identification techniques for encrypted- data
                         Mobile Hacking | 13 - 04 2013
#Threats




                                         ●   Internet


    Identification techniques for encrypted- data
                         Mobile Hacking | 13 - 04 2013
#Mobile Hacking Tools




     PWN PAD
        PWN Phone
          Linux ./Chroot


                Identification techniques for encrypted- data
                                     Mobile Hacking | 13 - 04 2013
#Mobile Hacking Tools

        PWN PAD

        WIRELESS:
           ● Aircrack-ng
           ● Kismet
           ● Wifite

        NETWORK TOOLS:
           OpenVAS,nmap,netcat, tcpdump,
           tshark, Ettercap-ng, SSLstrip v9, hydra,
           Metasploit4, pyrit, scapy, john (JTR)




              Identification techniques for encrypted- data
                                   Mobile Hacking | 13 - 04 2013
#USB

- USB OTG cable (for USB host-mode)



- USB-Ethernet adapter



- USB Bluetooth adapter



- TP-Link High-gain 802.11b/g/n USB wireless adapter




                                       Identification techniques for encrypted- data
                                                            Mobile Hacking | 13 - 04 2013
Identification techniques for encrypted- data
                     Mobile Hacking | 13 - 04 2013
#Mobile Hacking Tools

PWN Phone

-   Includes Aircrack-NG, Metasploit,
    Kismet, GrimWEPa, SET,
    Fasttrack, Ettercap, nmap, and
    more

-   Custom pentesting desktop with
    shortcuts to all tools!

-   One-click evil AP, WEP cracker,
    and packet capture!




                                        Identification techniques for encrypted- data
                                                             Mobile Hacking | 13 - 04 2013
#Android Hacking Tools

- dSpoit
- Orbot
- WhatshappSniffer
- Wifinfect
- AnDOSid
- Anti
- SSH Server
- Linux BT ./chroot (ARM)                               ROOTED

                            Identification techniques for encrypted- data
                                                 Mobile Hacking | 13 - 04 2013
Conclusion


 - Use Firewall / AntiVirus
 - App UpToDate
 - Don't use cracked App
 - Security Lock




         Identification techniques for encrypted- data
                              Mobile Hacking | 13 - 04 2013
DEMO...




          Terima Kasih



                                         karuwak@tlab.co.id
                                         Www.hatsecure.com


                Identification techniques for encrypted- data
                                     Mobile Hacking | 13 - 04 2013

Mobile Hacking

  • 1.
    Mobile Hacking Oleh: Novizul Evendi Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 2.
    #id Hatsecure T'Lab Wakhost Novizul Evendi Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 3.
    #Agenda ● Mobile Technology ● Threats ● Mobile Attach / as Attach ● Defence Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 4.
    #Mobile Technology is thetechnology used for cellular communication Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 5.
    #Mobile Operating Systemsdata Identification techniques for encrypted
  • 6.
    #Smart Phone is amobile phone built on a mobile operating system, with more advanced computing capability connectivity than a feature phone Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 7.
    #Threats ● Bluetooth ● Wifi ● App Cracked ● Root Access (Super Admin) ● Data Storage ● Internet Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 8.
    #Threats ● Bluetooth Cloning device/information, Read SMS. Contact, dll Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 9.
    #Threats ● App Cracked Virus, Keylogger, Malware, Trojan, Backdoor, dll Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 10.
    #Threats ● Root Access (ROOTED) Dell File, Format File System, Backdoor, Malware, dll Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 11.
    #Threats ● Data Storage Virus, Malware, Trojan, Backdoor, dll Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 12.
    #Threats ● Internet Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 13.
    #Mobile Hacking Tools PWN PAD PWN Phone Linux ./Chroot Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 14.
    #Mobile Hacking Tools PWN PAD WIRELESS: ● Aircrack-ng ● Kismet ● Wifite NETWORK TOOLS: OpenVAS,nmap,netcat, tcpdump, tshark, Ettercap-ng, SSLstrip v9, hydra, Metasploit4, pyrit, scapy, john (JTR) Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 15.
    #USB - USB OTGcable (for USB host-mode) - USB-Ethernet adapter - USB Bluetooth adapter - TP-Link High-gain 802.11b/g/n USB wireless adapter Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 16.
    Identification techniques forencrypted- data Mobile Hacking | 13 - 04 2013
  • 17.
    #Mobile Hacking Tools PWNPhone - Includes Aircrack-NG, Metasploit, Kismet, GrimWEPa, SET, Fasttrack, Ettercap, nmap, and more - Custom pentesting desktop with shortcuts to all tools! - One-click evil AP, WEP cracker, and packet capture! Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 18.
    #Android Hacking Tools -dSpoit - Orbot - WhatshappSniffer - Wifinfect - AnDOSid - Anti - SSH Server - Linux BT ./chroot (ARM) ROOTED Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 19.
    Conclusion - UseFirewall / AntiVirus - App UpToDate - Don't use cracked App - Security Lock Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013
  • 20.
    DEMO... Terima Kasih karuwak@tlab.co.id Www.hatsecure.com Identification techniques for encrypted- data Mobile Hacking | 13 - 04 2013