0% found this document useful (0 votes)
28 views30 pages

Unit 2.8 2.11 Mobile Hacking

The document discusses mobile hacking, including techniques such as call spoofing, SMS forging, and bluesnarfing, which allow hackers to access personal information and commit fraud. It highlights the vulnerabilities of mobile devices and the potential consequences of hacking, such as identity theft and financial loss. The document also suggests preventive measures like using passwords and upgrading devices to mitigate risks.

Uploaded by

Bobbi Bach-Oachs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views30 pages

Unit 2.8 2.11 Mobile Hacking

The document discusses mobile hacking, including techniques such as call spoofing, SMS forging, and bluesnarfing, which allow hackers to access personal information and commit fraud. It highlights the vulnerabilities of mobile devices and the potential consequences of hacking, such as identity theft and financial loss. The document also suggests preventive measures like using passwords and upgrading devices to mitigate risks.

Uploaded by

Bobbi Bach-Oachs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Dr.

Ajay Nagne 1

MOBILE HACKING
Table of Contents
2

 Introduction
 Call Spoofing/forging

 SMS Forging

 Bluesnarfing

Dr. Ajay Nagne


Overview of Mobile Devices
3

 Mobile computers:
– Mainly smartphones, tablets
 Sensors: GPS, camera,
accelerometer, etc.
 Computation: powerful
CPUs (≥ 1 GHz, multi-core)
 Communication:
cellular/4G, Wi-Fi, near field
communication (NFC), etc.
 Many connect to cellular
networks: billing system
 Cisco: 7 billion mobile
devices will have been sold
by 2012 [1]
Dr. Ajay Nagne
Organization
History
4

 The fact of someone hacking cell phone


became public knowledge when Paris
Hilton's cell phone, along with her
information was recently hacked.
 Unfortunately for her, all her celebrity
friends and their phone numbers were
also placed on the Internet - resulting in
a barrage of calls to each of them.
Dr. Ajay Nagne
What Can A Hacker Do?
5

 Steal Your Number


 Your phone number can be accessed and obtained by
cellphone hacking. This allows them to make calls and
have it charged to your account.
 Take Your Information
 Mobilehacking allows a hacker to contact your cell phone,
without your knowledge, and to download your addresses
and other information you might have on your phone.
Many hackers are not content to only get your
information. Some will even change all your phone
numbers! Be sure to keep a backup of your information
somewhere. This particular technique is called
Bluesnarfing. Dr. Ajay Nagne
What Can A Hacker Do? Cont. . . .
6

 Rob Your Money


 Other options might use a particular buying feature
called SMS. This refers to the fact that money can be
taken from your account and transferred into
another and a good hacker can sit in one place and
access a lot of phones and transfer a lot of money
rather quickly - probably in less time than you
think!

Dr. Ajay Nagne


What Can A Hacker Do? Cont. . . .
7

 Give The System A Virus


 By using another cell phone hack code, a hacker
could kidnap your phone, send it a camouflaged
program or send it a virus. But it does not end there,
since, from that point, he can use your phone to
retransmit the virus to many other phones almost
instantly - potentially disabling the system.

Dr. Ajay Nagne


What Can A Hacker Do? Cont. . . .
8

 Spy On You
A hacker can also gain access and take over for cell
phone spying and remote mobile phone hacking.
Literally, once secured, the hacker can have the
phone call him, and then be able to listen to all
conversations going on around the owner of the
phone.

Dr. Ajay Nagne


What Can A Hacker Do? Cont. . . .
9

 Access Your Voice Mails


 Voice mails can also be retrieved by a hacker
through a hacking cell phone. After stealing your
number, this can easily be done - if your password is
disabled. The main thing that needs to be
understood here, is that the electronics that give
you the modern convenience of interacting with the
Internet (getting your voice mails, emails, Web
surfing, etc.) , is also the same technology that
allows you to receive the same ills as can befall
someone on the Internet.

Dr. Ajay Nagne


What Can we Do?
10

 Use Your Passwords


 The cell phone companies tell us that many people
have turned off their passwords when they access
their voice mail messages, or other things. This little
feature, though it may seem to be an annoyance to
some, could protect your phone from unauthorized
purposes.

Dr. Ajay Nagne


What Can we Do? Cont. . . . .
11

 Upgrade Your Phone


 While this cannot guarantee that your phone is not
hackable, it certainly will help. It should be
remembered that the phone companies work hard
to deliver the best technology and conveniences -
but the cell phone hacks work just as hard to be the
first to break the systems designed to defeat them.
It is an ongoing battle.

Dr. Ajay Nagne


Call Spoofing / Forging
12

 Call forging is method to spoof caller id


number displayed on the mobile
phone/landline.
 It relies on VoIP (Voice over Internet
Protocol)
 VoIP is emerging & exciting innovation as far

as Information & communication technology


is concerned.
 Can be considered as GEN Next Cyber Crime.
Dr. Ajay Nagne
About Caller Id Forging/Spoofing
13

 Caller ID Forging the practice of causing the telephone


network to display a number on the recipient's caller ID
display which is not that of the actual originating station;
the term is commonly used to describe situations in
which the motivation is considered nefarious by the
speaker.
 Just as e-mail spoofing can make it appear that a
message came from any e-mail address the sender
chooses, caller ID forging can make a call appear to have
come from any phone number the caller wishes.
 Because people are prone to assume a call is coming
from the number (and hence, the associated person, or
persons), this can call the service's value into question.
Dr. Ajay Nagne
Basics of Call Forging
14

 Firstly the voip is used to call via internet PC to a


telephone.
 In the Voip there is a loop hole which allow a intruder
to spoof a call.
 There are many website on the net which provide the
facility of the internet calling.
 This website work as follows, first the call the source
phone no then the destination number and then
bridge them together.
 Here there is no authentication done by the website
and server are normally located in US and so tracing
of the intruder is not possible.
Dr. Ajay Nagne
Basics of Call Forging Cont. . . . .
15

 Thus the intruder logs on to this server and


gives a wrong source number and then place a
call over internet which is actually a spoofed call
which shows wrong identity.
 Also there a no laws regarding the call spoofing

in India and so a intruder if gets traced is easily


backed by the loophole of no laws for it.
 thus if you get calls from other numbers dont

trust it they may be spoofed calls.


Dr. Ajay Nagne
SMS Forging
16

 SMS is one of the most popular means of


communications.
 SMS Forging is the method to spoof sender
id of SMS.
 One can send SMS to international Number

from any number of sender’s choice.


 Facility to choose sender id upto 11

characters/name.
Dr. Ajay Nagne
17

Bluesnarfing

Dr. Ajay Nagne


Bluesnarfing
18

 Bluesnarfing is the theft of information from


a wireless device through a Bluetooth
connection, often between phones, desktops,
laptops, and PDAs.
 This allows access to a calendar, contact list,

emails and text messages.


 Bluesnarfing is much more serious in relation

to Bluejacking, although both exploit others’


Bluetooth connections without their
knowledge.
Dr. Ajay Nagne
Bluesnarfing
19

 Any device with its Bluetooth connection


turned on and set to “discoverable” (able
to be found by other Bluetooth devices in
range) can be attacked.
 By turning off this feature you can be
protected from the possibility of being
Bluesnarfed.
 Since it is an invasion of privacy,
Bluesnarfing is still illegal in many
Dr. Ajay Nagne
countries.
Bluesnarfing Cont. . . . .
20

 There are people who have predicted


the doom of bluetooth attacks like
bluesnarfing.
 Their reasoning is that WiFi will
eventually replace the need for
bluetooth devices and without
bluetooth, it make sense there will be no
bluetooth attacks.
Dr. Ajay Nagne
Bluesnarfing Cont. . . . .
21

 While convincing and logical, bluetooth have yet to be


phased out long after WiFi is in use.
 In face, there are more and more devices using
bluetooth technology.
 The main reason: It's free. Unlike wifi which is a overall
network and you are just a "user" in the network, you
"own the network".
 You can switch in on and off anytime you like, and you
don't have to pay a cent.
 There is no logic for example to use wifi for connecting
with your headset, but bluetooth fits that function
perfectly. Dr. Ajay Nagne
Bluesnarfing Cont. . . . .
22

 In fact, this neglect on the importance of bluetooth


has led to an added advantage to bluesnarfers.
 Because every is concern about their Wi-Fi security,
they neglect the fact that their short ranged network
which is their Bluetooth can easier be hacked into
for someone who is nearby or even far away but
with the right equipment.
 The reason why there is little news about
bluesnarfing is that there is no good solution to the
problem at the moment, save for switching off your
Bluetooth device. Dr. Ajay Nagne
Bluetooth Networks
23


• Used to establish wireless personal area
networks (PAN)

• Creates small wireless networks on an ad-hoc


basis, known as piconets

• Typically contain a minimum of two and a


maximum of eight Bluetooth peer devices
Dr. Ajay Nagne
Bluetooth Network Example
24

Dr. Ajay Nagne


Piconets
25

• Two or more Bluetooth devices in close


physical proximity that operate on the same
channel

• One device acts as the master while the


others act as slaves

• An example is connection between a mobile


phone and a Bluetooth-enabled ear phone.
Dr. Ajay Nagne
Piconet Example
26

Dr. Ajay Nagne


Scatternets
27

• Two or more inter-connected piconets form a


scatternet

• Time Division Multiplexing allows scheduling


of nodes in multiple piconets to be active in
only one piconet at a time

• Could be used to expand the physical size of


the network beyond Bluetooth's limited
range Dr. Ajay Nagne
Scatternet Example
28

Dr. Ajay Nagne


Cellphone Bluetooth Vulnerabilities

 Bluesnarfing
 Stealing
contact lists, data, pictures on bluetooth
compatible smartphones
 Bluebugging
 Takingcontrol of a phone to make or listen to calls,
send or read text messages

Dr. Ajay Nagne 6-29


30

Thank You . . . . . !

Dr. Ajay Nagne

You might also like