int509 lec 7-8

13
06/24/22 Prepared By:ANSHU VASHISTH 1 Trends in Mobility: Mobile computing era- 3G, 4G, VoLTE I phone from Apple Google - Android

Upload: anshu-vashisth

Post on 11-Apr-2017

15 views

Category:

Engineering


0 download

TRANSCRIPT

Page 1: Int509 lec 7-8

05/03/23 Prepared By:ANSHU VASHISTH 1

Trends in Mobility:

Mobile computing era- 3G, 4G, VoLTE

I phone from Apple

Google - Android

Page 2: Int509 lec 7-8

05/03/23 Prepared By:ANSHU VASHISTH 2

Page 3: Int509 lec 7-8

05/03/23 Prepared By:ANSHU VASHISTH 3

Attack Against 3G mobile network:1. Malware, virus and worms-

Skull Trojan- target series 60 phones equipped with Symbian mobile OS.

Cabir Worm- First worm for phone and scan mobile device to send copy of data.

Brador Tojan- affects Window OS by creating svchost.exe file in the window start-up folder which allow full control of device.

2. DoS:

Page 4: Int509 lec 7-8

05/03/23 Prepared By:ANSHU VASHISTH 4

3. Overbilling Attack: Hijacking subscriber IP address to download paid things for Which legitimate user charged.

4. Spoofed Policy Development Process:

Exploit vulnerabilities in GPRS

5. Signaling- level attacks:

Attack on system which use VoIP

Page 5: Int509 lec 7-8

05/03/23 Prepared By:ANSHU VASHISTH 5

Attacks on Mobile/Cell Phones:

1. Mobile Phone Theft:

Reason of Attack on Mobile Device:

Frequent use by person

Enough functionality

Enough Connectivity

Page 6: Int509 lec 7-8

05/03/23 Prepared By:ANSHU VASHISTH 6

2. Mobile Viruses:

40 Virus family with 300+ mobile virus

XALAN is a virus which erase yours IMEI and IMSI no due to which new phone will be disconnected from network.

Motorola and Nokia confirmed this attack and infected 3 Million mobile phone in the world

Page 7: Int509 lec 7-8

05/03/23 Prepared By:ANSHU VASHISTH 7

3. Mishing:

Combination of mobile phone and phishing.

Use of mobile phones for online action like shopping and transaction can be more vulnerable to Mishing.

When attacker use call termed as Vishing.

When use SMS termed as Smishing.

Page 8: Int509 lec 7-8

05/03/23 Prepared By:ANSHU VASHISTH 8

4. Vishing:

Most common information gained through Vishing:

ID theft

Purchasing luxury good s and service

Transferring money/funds

Monitoring the victims bank account

Making applications for loans and credit cards (Steel credit card number)

Page 9: Int509 lec 7-8

05/03/23 Prepared By:ANSHU VASHISTH 9

How Vishing works?

Through e-mail, Voicemail, Direct phone call.

How to protect from Vishing Attacks?

Report Incident, Do not give your personal information

Page 10: Int509 lec 7-8

05/03/23 Prepared By:ANSHU VASHISTH 10

5. Smishing:

Combination of SMS and phishing.

Send message to victim and ask to click on link that is actually fake and PI will be sent to attacker.

How Smishing works?

Page 11: Int509 lec 7-8

05/03/23 Prepared By:ANSHU VASHISTH 11

How to Protect from Smishing Attacks:

Do not answer the text message.

Never click on link given in message.

Never call those number which are mentioned in Message

Page 12: Int509 lec 7-8

05/03/23 Prepared By:ANSHU VASHISTH 12

6. Hacking Bluetooth:

Bluetooth is an open wireless technology.

Tools which are installed on laptop and can scan nearby device.

Can get your photos, contacts and SIM card details.

Works on 2.4GHz frequency with 3Mbps speed (BLUETOOTH 2.0).

Common used tools are BlueBugger, BlueDiving etc.

Page 13: Int509 lec 7-8

05/03/23 Prepared By:ANSHU VASHISTH 13

Attacks on Bluetooth Security:1. Bluejacking- means Bluetooth + jacking: Sending messages like visiting card with Bluetooth enabled device

2. Bluesnaring: Unauthorized access through Bluetooth to gain the access of e-mails, calendar, SMS etc.

3. Bluebugging: allow attacker to remotely login to nearby Bluetooth device without user attention.

4. Car Whisperer: Piece of software allow attacker to send audio and receive audio from Bluetooth enabled device and could do any serious task link disabling airbags or break etc.

Research is going on that can attacker can access Phone book through this attack.