Mobile Device Security: Somesh Sawhney Sales Director - META & India Rohit Sinha Technical Director - META & India
Mobile Device Security: Somesh Sawhney Sales Director - META & India Rohit Sinha Technical Director - META & India
Work Entertainment
SMARTPHONES APPS
Information Financial/Digital
Commerce
Application
Trojans, Adware, Spyware) • Lack of Security • Attachments (PDF,
• Access Abuse (Unsecured Awareness DOC,XLS)
Apps and Privacy Risk) • False sense of security • Spear phishing Emails
• Repackaged Apps • Session Hijacking
• 3rd Party Lib / Back Door • Man In The Browser
L5 – SESSION
• Time Bombs • Fake SSL Certificates
MULTIMEDIA CONTAINERS
Keys • Download & Execute (SSL Decryption)
• Stagefright (24 CVEs) • SSL Stripping • Unlocked Containers
• 11+ Threat Vectors (MMS, • VPN, Micro VPN
Browser, Downloads,
Email, Facebook App,
Gallery, etc.) SMS, MMS
L4 – TRANSPORT • Ransomware • Spear phishing SMS
• Malicious MMS RECON SCANS
Segment, Datagram • Stagefright (24 CVEs)
• IPv4, IPv6 Scans
• TCP, UDP Scans
• ARP Scans
Network
L3 – NETWORK WIFI
OS / KERNEL
Packet • Rogue AP
• OS Exploits • ARP MITM
• Kernel Exploits • ICMP Redirect
• Malicious Profiles (iOS) • ICMP Double Direct
• Network Configuration • SSL Striping
Attacks (DNS, Proxy, • Session Hijacking
Gateway) • Fake SSL Certificates
L2 – MAC / DATA LINK • Over The Air (OTA)
updates (like Swift Key) NFC, BLUETOOTH RADIO
Frame
• Remote Device • NFC Proxy • Rogue Cell tower /
Management • Malicious Bluetooth Femtocell
• Shared Lib Injection • MITM
• Persistent File System • Location Tracking
Modifications
USB
Device
L1 – PHSYICAL
• Malicious Chargers
Bit • Juice Jacking
• Key Loggers
• Shared Lib Injection
• Unsecured Memory Cards
RISK THREAT
REMEDIATION REPORTING
IDENTIFICATION DETECTION
System Logs
Extraction Threat Intelligence
Responsible vulnerability
iPhone disclosure and full disinfection
Target discovery Intercept Traffic Social Engineering Connect to Device Privileges Elevation Compromised
Scan (IPv4/IPv6), Phishing MITM, Phishing Malware, Phishing Exploit Device OS / Kernel Exploit Data Theft
Locally and
1 2 URL Redirect 3 Deliver Hacking Tool 4 Deliver Exploit 5 File Sys Manipulation 6 from the Cloud