20
Identification techniques for encrypted data Mobile Hacking Oleh: Novizul Evendi Mobile Hacking | 13 - 04 - 2013

Mobile Hacking

Embed Size (px)

DESCRIPTION

Seminar Royal Ambarukmo Yogyakarta

Citation preview

Page 1: Mobile Hacking

Identification techniques for encrypted data

Mobile Hacking

Oleh:Novizul Evendi

Mobile Hacking | 13 - 04 - 2013

Page 2: Mobile Hacking

Identification techniques for encrypted data

#id

Novizul Evendi

WakhostT'Lab

Hatsecure

Mobile Hacking | 13 - 04 - 2013

Page 3: Mobile Hacking

Identification techniques for encrypted data

#Agenda

● Mobile Technology

● Threats

● Mobile Attach / as Attach

● Defence

Mobile Hacking | 13 - 04 - 2013

Page 4: Mobile Hacking

Identification techniques for encrypted data

#Mobile Technology

is the technology used for cellular communication

Mobile Hacking | 13 - 04 - 2013

Page 5: Mobile Hacking

Identification techniques for encrypted data#Mobile Operating Systems

Page 6: Mobile Hacking

Identification techniques for encrypted data

#Smart Phone

is a mobile phone built on a mobile operating system, with more advanced computing capability connectivity than a feature phone

Mobile Hacking | 13 - 04 - 2013

Page 7: Mobile Hacking

Identification techniques for encrypted data

#Threats

● Bluetooth

● Wifi

● App Cracked

● Root Access (Super Admin)

● Data Storage

● Internet

Mobile Hacking | 13 - 04 - 2013

Page 8: Mobile Hacking

Identification techniques for encrypted data

#Threats

● Bluetooth

Cloning device/information, Read SMS. Contact, dll

Mobile Hacking | 13 - 04 - 2013

Page 9: Mobile Hacking

Identification techniques for encrypted data

#Threats

● App Cracked

Virus, Keylogger, Malware, Trojan, Backdoor, dll

Mobile Hacking | 13 - 04 - 2013

Page 10: Mobile Hacking

Identification techniques for encrypted data

#Threats

● Root Access (ROOTED)

Dell File, Format File System, Backdoor, Malware, dll

Mobile Hacking | 13 - 04 - 2013

Page 11: Mobile Hacking

Identification techniques for encrypted data

#Threats

● Data Storage

Virus, Malware, Trojan, Backdoor, dll

Mobile Hacking | 13 - 04 - 2013

Page 12: Mobile Hacking

Identification techniques for encrypted data

#Threats

● Internet

Mobile Hacking | 13 - 04 - 2013

Page 13: Mobile Hacking

Identification techniques for encrypted data

#Mobile Hacking Tools

PWN PAD

PWN Phone

Linux ./Chroot

Mobile Hacking | 13 - 04 - 2013

Page 14: Mobile Hacking

Identification techniques for encrypted data

#Mobile Hacking Tools

PWN PAD

WIRELESS:● Aircrack-ng● Kismet● Wifite

NETWORK TOOLS: OpenVAS,nmap,netcat, tcpdump,

tshark, Ettercap-ng, SSLstrip v9, hydra, Metasploit4, pyrit, scapy, john (JTR)

Mobile Hacking | 13 - 04 - 2013

Page 15: Mobile Hacking

Identification techniques for encrypted data

#USB

- USB OTG cable (for USB host-mode)

- USB-Ethernet adapter

- USB Bluetooth adapter

- TP-Link High-gain 802.11b/g/n USB wireless adapter

Mobile Hacking | 13 - 04 - 2013

Page 16: Mobile Hacking

Identification techniques for encrypted dataMobile Hacking | 13 - 04 - 2013

Page 17: Mobile Hacking

Identification techniques for encrypted data

#Mobile Hacking Tools

PWN Phone

- Includes Aircrack-NG, Metasploit, Kismet, GrimWEPa, SET, Fasttrack, Ettercap, nmap, and more

- Custom pentesting desktop with shortcuts to all tools!

- One-click evil AP, WEP cracker, and packet capture!

Mobile Hacking | 13 - 04 - 2013

Page 18: Mobile Hacking

Identification techniques for encrypted data

#Android Hacking Tools

- dSpoit

- Orbot

- WhatshappSniffer

- Wifinfect

- AnDOSid

- Anti

- SSH Server

- Linux BT ./chroot (ARM)

ROOTED

Mobile Hacking | 13 - 04 - 2013

Page 19: Mobile Hacking

Identification techniques for encrypted data

Conclusion

- Use Firewall / AntiVirus

- App UpToDate

- Don't use cracked App

- Security Lock

Mobile Hacking | 13 - 04 - 2013

Page 20: Mobile Hacking

Identification techniques for encrypted data

Terima Kasih

[email protected]

DEMO...

Mobile Hacking | 13 - 04 - 2013