Upload
novizul-evendi
View
1.510
Download
19
Tags:
Embed Size (px)
DESCRIPTION
Seminar Royal Ambarukmo Yogyakarta
Citation preview
Identification techniques for encrypted data
Mobile Hacking
Oleh:Novizul Evendi
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
#id
Novizul Evendi
WakhostT'Lab
Hatsecure
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
#Agenda
● Mobile Technology
● Threats
● Mobile Attach / as Attach
● Defence
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
#Mobile Technology
is the technology used for cellular communication
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data#Mobile Operating Systems
Identification techniques for encrypted data
#Smart Phone
is a mobile phone built on a mobile operating system, with more advanced computing capability connectivity than a feature phone
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
#Threats
● Bluetooth
● Wifi
● App Cracked
● Root Access (Super Admin)
● Data Storage
● Internet
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
#Threats
● Bluetooth
Cloning device/information, Read SMS. Contact, dll
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
#Threats
● App Cracked
Virus, Keylogger, Malware, Trojan, Backdoor, dll
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
#Threats
● Root Access (ROOTED)
Dell File, Format File System, Backdoor, Malware, dll
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
#Threats
● Data Storage
Virus, Malware, Trojan, Backdoor, dll
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
#Threats
● Internet
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
#Mobile Hacking Tools
PWN PAD
PWN Phone
Linux ./Chroot
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
#Mobile Hacking Tools
PWN PAD
WIRELESS:● Aircrack-ng● Kismet● Wifite
NETWORK TOOLS: OpenVAS,nmap,netcat, tcpdump,
tshark, Ettercap-ng, SSLstrip v9, hydra, Metasploit4, pyrit, scapy, john (JTR)
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
#USB
- USB OTG cable (for USB host-mode)
- USB-Ethernet adapter
- USB Bluetooth adapter
- TP-Link High-gain 802.11b/g/n USB wireless adapter
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted dataMobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
#Mobile Hacking Tools
PWN Phone
- Includes Aircrack-NG, Metasploit, Kismet, GrimWEPa, SET, Fasttrack, Ettercap, nmap, and more
- Custom pentesting desktop with shortcuts to all tools!
- One-click evil AP, WEP cracker, and packet capture!
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
#Android Hacking Tools
- dSpoit
- Orbot
- WhatshappSniffer
- Wifinfect
- AnDOSid
- Anti
- SSH Server
- Linux BT ./chroot (ARM)
ROOTED
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
Conclusion
- Use Firewall / AntiVirus
- App UpToDate
- Don't use cracked App
- Security Lock
Mobile Hacking | 13 - 04 - 2013
Identification techniques for encrypted data
Terima Kasih
DEMO...
Mobile Hacking | 13 - 04 - 2013