15
Cyber Crime (Mobile Phone Data Hacking) Presented by Md Abu Syeem

Mobile phone Data Hacking

Embed Size (px)

Citation preview

Page 1: Mobile phone Data Hacking

Cyber Crime (Mobile Phone Data

Hacking)

Presented by Md Abu Syeem

Page 2: Mobile phone Data Hacking

Introduction

Threat types

Threat description

Conclusion

Q/A

Agenda

Page 3: Mobile phone Data Hacking
Page 4: Mobile phone Data Hacking

smartphone

a mobile phone that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, an operating system capable of running downloaded apps and storage

Page 5: Mobile phone Data Hacking
Page 6: Mobile phone Data Hacking

All major cellular networks support

• Voice calls• Voice mail (VM)• Short Message Service (SMS)• Location-based Services (LBS)• IP Connectivity

Page 7: Mobile phone Data Hacking

Email

Page 8: Mobile phone Data Hacking

Circuit Switching-Paging effect Packet Switching-GGSN(Gateway GPRS support node) SGSN(Serving GPRS support node) (CDR-Call Detail Record)

Communication Attack

Page 9: Mobile phone Data Hacking

Bluetooth Attack1.Bluesnarfing2.Bluebugging3. Blue jacking4.DOS AttackWi-fi:Packet sniffing NFC:Near field communication

Page 10: Mobile phone Data Hacking

• Apps get permission to do questionable things– Access your Address Book– Access your location– Make calls/Send SMS

• Apple vs. Android– Less of an issue for Apple

•Strong requirements to get into app store Doesn't mitigate risk entirely

– Android is a bigger risk•Play Store is more openPeople don’t always read app permissions or

understand them

Page 11: Mobile phone Data Hacking
Page 12: Mobile phone Data Hacking

Physical Attack

Sim cloneDock connectorlockscreenstole

Page 13: Mobile phone Data Hacking

QR code

Page 14: Mobile phone Data Hacking

Q/A

Page 15: Mobile phone Data Hacking