Ads 468x60px

Sample text


Blogger templates


Sample Text

Tuesday, 17 March 2015

How to hack Smartphone

               Hack A Smartphone
What kind of information do you have on business card? Company name?
Check. Your name and title? Check.
Business address? Check. Mobile work
phone number? Wait a minute.

CSO recently sat down with Trust
Digital, a firm that specializes in mobile security, for a demonstration on how to hack a smartphone with no more information than a phone number.

"All I need is a business card," said Meir Machlin, director of product
architecture with Trust Digital, who
performed the demonstration.

How to Hack a Smartphone, Part 1

Machlin walked us through two hacks
using basic tools available to anyone.
Machlin's 'hacker tool kit' included a
laptop with WiFi connectivity, and two
phones. One phone acts as a GSM modem for the laptop, the other phone is Machlin's personal phone, which he used to receive information. A third phone served as our target device, the phone that was 'under attack' in the

The first attack we watched is known as a 'Midnight Raid,' because it is often pulled off during the night when the phone's user is asleep and the device is still turned on as it is charged, or simply left on the nightstand.

Machlin sent a simple SMS which invoked Internet Explorer on the attack device.First, Machlin sent a graphic to the target phone that said "You have been hacked" to show just how quick and easy it is to get into another user's phone with SMS. In the second push, Machlin ran an application on the attacked phone that could retrieve data. The SMS came back to Machlin's phone with the
attack phone's INSI number; the
phone's unique ID. However, Machlin
noted the application could have just as easily have stolen a contact list, either personal or corporate. He said it was also possible in this scenario to push viruses to the device or even initiate a denial of service attack.

How to Hack a Smartphone, Part 2

In the second demonstration, Machlin
ran through a control message attack.
In this kind of hack, a criminal can
change the control settings of a device
without the user having any knowledge.
He showed us how he could easily uncheck SSL, leaving the device vulnerable with no encryption. As a finale, he pushed a wipe command, which removed all stored information from the device. The wipe, said Machlin, could also be pushed to all
devices contained in a hacked phone's
contact list.

The attacks, according to Machlin, prove that texts can no longer be considered safe. And these kinds of hacks are unique to smartphones because PCs don't have SMS capabilities, he said.
Which smartphones are vulnerable to
these kinds of attacks? That varies
widely depending on the security
settings and practices in place for use
of the device. Some contend that mobile devices still pose little security threat to an organization. In fact, in a recent hacking "contest" that took place in March, none of the smartphones slated for attack were compromised. However, a report from Gartner analyst John Girard predicts as wireless devices become more pervasive in the enterprise, the potential for security problems will

Machlin advised all smartphones that
are under an organization's control be
tightly monitored, patched and updated regularly to avoid users taking matters in there own hand.

"The IT guys need to control the phones
and secure them. They need to always be a head (of the threats) and push the right patches to the population."

------Thank You For Visiting-----

You can also join us on Facebook for more update.

1 comment:

  1. If you ever want to change or up your university grades contact cybergolden hacker he'll get it done and show a proof of work done before payment. He's efficient, reliable and affordable. He can also perform all sorts of hacks including text, whatsapp, password decrypt,hack any mobile phone, Escape Bancruptcy, Delete Criminal Records and the rest

    Email: cybergoldenhacker at gmail dot com


Blogger Templates