+ All Categories
Home > Technology > Hacking Backtrak Mobile

Hacking Backtrak Mobile

Date post: 22-Jan-2015
Category:
Upload: novizul-evendi
View: 1,211 times
Download: 1 times
Share this document with a friend
Description:
at UII
Popular Tags:
16
Hacking Hacking Mobile Mobile Novizul Evendi FO Techno-OS & T'Lab
Transcript
Page 1: Hacking Backtrak Mobile

Hacking Hacking

Mobile Mobile

Novizul EvendiFO Techno-OS & T'Lab

Page 2: Hacking Backtrak Mobile

Outline

● Introduce

● Bluetooth Hacking

● Internet Conection Hacking

● Remote Hacking

● Backtrak On Phone Hacking

Page 3: Hacking Backtrak Mobile

Introduce

Page 4: Hacking Backtrak Mobile

Bluetooth Hacking

Hacking Bluetooh enabled mobile phones and beyond

– Wire replacement technology

– Low power

– Short range 10m - 100m

– 2.4 GHz

– 1 Mb/s data rate

Page 5: Hacking Backtrak Mobile

Bluetooth Hacking

Architecture

– Hardware layer● Radio, Baseband and Link Manager

● Access through Host Controller Interface

– Hardware abstraction

– Standards for USB and UART

– Host protocol stack● L2CAP, RFCOMM, BNEP, AVDTP etc.

– Profile implementations ● Serial Port, Dialup, PAN, HID

etc.

Page 6: Hacking Backtrak Mobile

Bluetooth Hacking

Bluetooth Protocol Stack

Page 7: Hacking Backtrak Mobile

Bluetooth Hacking

– Trivial OBEX PUSH channel attack

● obexapp (FreeBSD)

● PULL known objects instead of PUSH

● No authentication

– IrMC (Specifications for Ir Mobile Communications)

● Infrared Data Association

– e.g. telecom/pb.vcf

– Ericsson R520m, T39m, T68

– Sony Ericsson T68i, T610, Z1010

– Nokia 6310, 6310i, 8910, 8910i

Page 8: Hacking Backtrak Mobile

Bluetooth Hacking

– Early adopters abuse 'Name' field to send message

– Now more commonly send 'Business Card' with message via OBEX

– 'Toothing' - Casual sexual liasons

Page 9: Hacking Backtrak Mobile

Bluetooth Hacking

HelloMoto

– Requires entry in 'Device History'

– OBEX PUSH to create entry

– Connect RFCOMM to Handsfree or Headset

● No Authentication required

● Full AT command set access

– Motorola V80, V5xx, V6xx and E398

Page 10: Hacking Backtrak Mobile

Bluetooth Hacking

Blooover is performing the BlueBug attack

● Reading phonebooks

● Writing phonebook entries

● Reading/decoding SMS stored on the device (buggy..)

● Setting Call forward (predef. Number) +49 1337 7001

● Initiating phone call (predef. Number) 0800 2848283

– Not working well on Nokia phones :( but on some T610

Page 11: Hacking Backtrak Mobile

Bluetooth Hacking

– How come!?

● Various Manufacturers poorly implemented the Bluetooth security mechanisms

● Unpublished services on RFCOMM channels

– Not announced via SDP

– Connecting to unpublished HS service without pairing!

● Nokia has quite a lot of models (6310, 6310i, 8910,8910i,...)

● Sony Ericsson T86i, T610, ...

● Motorola has similar problems (see HeloMoto)

Page 12: Hacking Backtrak Mobile

Internet Conection Hacking

● Bluetooth Dialup (wvdial etc.)

● PAN Sharing internet

● Bluetooth/cable to Wifi ad hoc

● Tethering

● Etc

Page 13: Hacking Backtrak Mobile

Remote Hacking● Remote PC (anyremote, etc)

– Get Desktop

– Control PC

– Etc

● Remote Server

(java, sisx, etc)

– Putty

– FloydSSH

– MidpSSH

– etc

Page 14: Hacking Backtrak Mobile

On Phone Hacking

● Gitbrew has been able to install Backtrack 5 on a rooted Android phone

● By using Debdroid, users run Linux distros built for ARM devices.

Page 15: Hacking Backtrak Mobile

:VisitMeat

. . .www tlab co id

. - .www techno os net

End

:ContactMeat

@ . .karuwak tlab co id

= .Ym Novizul karuwak

Powerd by T'LabTechnology Open Source Laboratory

Page 16: Hacking Backtrak Mobile

Live Demo!!


Recommended