. Mobile Hacking and Cracking
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
sandip manwar
Active In SP
**

Posts: 1
Joined: Jan 2011
#1
20-01-2011, 04:21 PM


i am student of it iwant some info about given topic for the purpose of seminar and presentation so please send info.
Reply
summer project pal
Active In SP
**

Posts: 308
Joined: Jan 2011
#2
01-02-2011, 04:51 PM

Hacking mobile devices
CONTENTS:
-Motivation / Introduction
-Current methods of attack
-¼-platform overview
-Other attacks
-Windows Mobile
-BlackBerry
-iPhone
-Symbian

Mobile security:
The mobile devices are complex and portable
- Many interfaces: WLAN, Bluetooth, infrared, UMTS are incorporated in the devices. The mobile devices such as the PDA, MDA and smartphone are all vulnerable to hacking.

Threats
The threats to the security of the conventional mobile phones can be classified as :
-Conventional threats
-Loss of Confidentiality and Integrity
- Availability
-ADDITIONAL mobile threats
- GPS Tracking
-Exploiting by camera


The attack vectors to the mobile devices:
The can be direct attacks, indirect attacks and the malware.
The direct attacks include the Classic Remote Exploits in which the Attacker sends special data that can crash the system , or Code. Tha communication medium to implment this can be done using the Bluetooth, WLAN, USB, UMTS / GPRS / EDGE / HSDPA, SMS / MMS etc. The effects of such attacks include fail of the system to the complete compromise of the data.

for more details, see:
ebookchoicean-ethical-guide-to-hacking-mobile-phones-by-ankit-fadia.html#
ebookchoicepdf/gsm-mobile-hacking.html
rapidsharefiles/43001155/hacking_bluetooth_enabled_mobile_phones_and_beyond.pdf
trifiniteDownloads/trifinite.presentation_blackhat.pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  advantages and disadvantages of mobile phone cloning ppt Guest 1 89 31-10-2016, 03:28 PM
Last Post: Dhanabhagya
  padal operated mobile charger report Guest 2 65 31-10-2016, 12:10 PM
Last Post: amrutha735
  mobile computing architecture ppt by rajkamal Guest 1 73 31-10-2016, 09:13 AM
Last Post: ijasti
  mobile bridge inspection platform ppt Guest 1 143 29-10-2016, 03:52 PM
Last Post: jaseela123
  disadvantages of mobile phones wikipedia in hindi language Guest 1 139 29-10-2016, 03:08 PM
Last Post: Dhanabhagya
  advantages disadvantages of gsm mobile jammer Guest 1 69 29-10-2016, 01:08 PM
Last Post: ijasti
  ppt on uniqueness of mobile radio environment ppt Guest 1 65 29-10-2016, 12:32 PM
Last Post: ijasti
  ppt of development of mobile eeg based biometric authentication system Guest 1 67 29-10-2016, 11:46 AM
Last Post: jaseela123
  mobile voting system using iris ppt slideshare Guest 1 123 29-10-2016, 11:18 AM
Last Post: ijasti
  mpt myanmar mobile phone bill hacking Guest 1 180 12-10-2016, 09:13 AM
Last Post: amrutha735