Mobile Security
Mobile Security
Mobile Security
This tutorial will take you through the simple and practical approaches to implement mobile
security techniques.
Audience
This tutorial has been prepared for beginners to IT administrators to help them understand
the basic-to-advanced concepts related to mobile security that they can use in daily life
and in their organizations.
Prerequisites
This is a very basic tutorial that should be useful for most users. Before you start practicing
the various types of security options given in this tutorial, we assume that you are well-
aware of the various features available in a standard smartphone.
All the content and graphics published in this e-book are the property of Tutorials Point (I)
Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish
any contents or a part of contents of this e-book in any manner without written consent
of the publisher.
We strive to update the contents of our website and tutorials as timely and as precisely as
possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt.
Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our
website or its contents including this tutorial. If you discover any errors on our website or
in this tutorial, please notify us at [email protected].
i
Mobile Security
Table of Contents
About the Tutorial .................................................................................................................................. i
Audience ................................................................................................................................................ i
Prerequisites .......................................................................................................................................... i
ii
Mobile Security
Sofo ..................................................................................................................................................... 33
Find My iPhone.................................................................................................................................... 47
iHound................................................................................................................................................. 48
iii
Mobile Security
Lookout ............................................................................................................................................... 65
WISeID ................................................................................................................................................ 65
zIPS ...................................................................................................................................................... 66
iv
1. Mobile Security − Introduction Mobile Security
In this tutorial, we will deal with mobile security concepts mostly from the practical point
of view. Take a look at the following graph, it illustrates the ever-growing number of mobile
phone users across the world, which brings out the importance of mobile security.
The estimated number of mobile devices is around 5.8 billion, which is thought to have
grown exponentially within five years and is supposed to reach nearly 12 billion within four
years. Hence, it will be an average of two mobile devices per person on the planet. This
makes us fully dependent on mobile devices with our sensitive data being transported all
over. As a result, mobile security is one of the most important concepts to take in
consideration.
Mobile Security as a concept deals with the protection of our mobile devices from possible
attacks by other mobile devices, or the wireless environment that the device is connected
to.
1
Mobile Security
Loss of mobile device. This is a common issue that can put at risk not only you but
even your contacts by possible phishing.
Application hacking or breaching. This is the second most important issue. Many of
us have downloaded and installed phone applications. Some of them request extra
access or privileges such as access to your location, contact, browsing history for
marketing purposes, but on the other hand, the site provides access to other
contacts too. Other factors of concern are Trojans, viruses, etc.
2
2. Mobile Security − Attack Vectors Mobile Security
By definition, an Attack Vector is a method or technique that a hacker uses to gain access
to another computing device or network in order to inject a “bad code” often called
payload. This vector helps hackers to exploit system vulnerabilities. Many of these attack
vectors take advantage of the human element as it is the weakest point of this system.
Following is the schematic representation of the attack vectors process which can be many
at the same time used by a hacker.
Malware
o Virus and Rootkit
o Application modification
o OS modification
Data Exfiltration
o Data leaves the organization
o Print screen
o Copy to USB and backup loss
Data Tampering
o Modification by another application
o Undetected tamper attempts
o Jail-broken devices
Data Loss
o Device loss
o Unauthorized device access
o Application vulnerabilities
3
Mobile Security
Losing your data: If your mobile device has been hacked, or a virus introduced,
then all your stored data is lost and taken by the attacker.
Bad use of your mobile resources: Which means that your network or mobile
device can go in overload so you are unable to access your genuine services. In
worse scenarios, to be used by the hacker to attach another machine or network.
Identity theft: There can be a case of identity theft such as photo, name, address,
credit card, etc. and the same can be used for a crime.
Android: Users are tricked to download an app from the market or from a third-party
application generally by using social engineering attack. Remote infection can also be
performed through a Man-in-the-Middle (MitM) attack, where an active adversary
intercepts the user’s mobile communications to inject the malware.
iOS: iOS infection requires physical access to the mobile. Infecting the device can also be
through exploiting a zero-day such as the JailbreakME exploit.
Installing a backdoor
To install a backdoor requires administrator privileges by rooting Android devices and
jailbreaking Apple devices. Despite device manufacturers placing rooting/jailbreaking
detection mechanisms, mobile spyware easily bypasses them:
4
Mobile Security
5
Mobile Security
6
Mobile Security
Keychain, or some other security control that is part of the mobile operating system. There
are several ways that mobile apps can experience this risk.
M2-Insecure Data
This new category is a combination of M2 and M4 from Mobile Top Ten 2014. This covers
insecure data storage and unintended data leakage.
M3-Insecure Communication
This covers poor handshaking, incorrect SSL versions, weak negotiation, clear text
communication of sensitive assets, etc.
M4-Insecure Authentication
This category captures the notions of authenticating the end user or bad session
management. This includes:
M5-Insuficient Cryptography
The code applies cryptography to a sensitive information asset. However, the cryptography
is insufficient in some way. Note that anything and everything related to TLS or SSL goes
in M3. Also, if the app fails to use cryptography at all when it should, that probably belongs
in M2. This category is for issues where cryptography was attempted, but it wasn't done
correctly.
M6-Insecure Authorization
This is a category to capture any failures in authorization (e.g., authorization decisions in
the client side, forced browsing, etc.) It is distinct from authentication issues (e.g., device
enrolment, user identification, etc.)
If the app does not authenticate the users at all in a situation where it should (e.g.,
granting anonymous access to some resource or service when authenticated and
authorized access is required), then that is an authentication failure not an authorization
failure.
M8-Code Tampering
This category covers binary patching, local resource modification, method hooking,
method swizzling, and dynamic memory modification.
7
Mobile Security
Once the application is delivered to the mobile device, the code and data resources are
resident there. An attacker can either directly modify the code, change the contents of
memory dynamically, change or replace the system APIs that the application uses, or
modify the application's data and resources. This can provide the attacker a direct method
of subverting the intended use of the software for personal or monetary gain.
M9-Reverse Engineering
This category includes analysis of the final core binary to determine its source code,
libraries, algorithms, and other assets. Software such as IDA Pro, Hopper, otool, and other
binary inspection tools give the attacker insight into the inner workings of the application.
This may be used to exploit other nascent vulnerabilities in the application, as well as
revealing information about back-end servers, cryptographic constants and ciphers, and
intellectual property.
M10-Extraneous Functionality
Often, developers include hidden backdoor functionality or other internal development
security controls that are not intended to be released into a production environment. For
example, a developer may accidentally include a password as a comment in a hybrid app.
Another example includes disabling of 2-factor authentication during testing.
8
3. Mobile Security − App Stores & Security Issues Mobile Security
Usually mobile applications developed by developers are submitted to these market places
without screening or vetting, making them available to thousands of mobile users. If you
are downloading the application from an official app store, then you can trust the
application as the hosting store has vetted it. However, if you are downloading the
application from a third-party app store, then there is a possibility of downloading malware
along with the application because third-party app stores do not vet the apps.
The attacker downloads a legitimate game and repackages it with malware and uploads
the mobile apps to a third-party application store from where the end users download this
malicious gaming application, believing it to be genuine. As a result, the malware gathers
and sends user credentials such as call logs/photo/videos/sensitive docs to the attacker
without the user's knowledge.
Using the information gathered, the attacker can exploit the device and launch any other
attack. Attackers can also socially engineer users to download and run apps outside the
official apps stores. Malicious apps can damage other applications and data, sending your
sensitive data to attackers.
Secure Sandbox
It is an environment where each application runs its allocated resources and data so the
applications are secure and cannot access other application resources and data.
Vulnerable Sandbox
It is an environment where a malicious application is installed and it exploits the sandbox
by allowing itself to access all data and resources.
9
4. Mobile Security − Mobile Spam Mobile Security
Take a look at the following screenshot. You might have received a similar SMS which
seemed to be genuine. In fact, after a bit of analysis, we realize it is not genuine. It is an
example of SMS phishing.
The links in the SMS may install malware on the user’s device or direct them to a malicious
website, or direct them to call a number set up to trick them into divulging personal and
financial information, such as passwords, account IDs or credit card details. This technique
is used a lot in cybercrimes, as it is far easier to trick someone into clicking a malicious
link in the e-mail than trying to break through a mobile’s defenses. However, some
phishing SMS are poorly written and clearly appear to be fake.
Other instances include, the fear when an SMS accuses you of doing something illegal that
you haven’t done. Or an SMS regarding the possibility of harming your family members.
of your family, etc.
10
Mobile Security
Example 1
Generally, scammers use email to SMS to spoof their real identity. If you google it, you
may find many legitimate resources. You just google search: email to SMS providers
11
Mobile Security
Example 2
The other classical scam is financial fraud which will ask you for PIN, username, password,
credit card details, etc.
Example 3
Spelling and bad grammar. Cyber criminals generally make grammar and spelling
mistakes because often they use a dictionary to translate in a specific language. If you
notice mistakes in an SMS, it might be a scam.
12
Mobile Security
Example 4
SMS phishing attempt to create a false sense of urgency.
Example 5
Cybercriminals often use threats that your security has been compromised. The above
example proves it well. In the following case, the subject says you have won a gift.
13
Mobile Security
Example 6
In this case, an SMS asks you to reply so that they can verify that your number is valid.
This can increase the number of SMS spams in your number.
Example 7
Spoofing popular websites or companies. Scam artists use the name of big organizations
that appear to be connected to legitimate websites but actually it takes you to phony scam
sites or legitimate-looking pop-up windows.
14
Mobile Security
Financial companies never ask for personal or financial information, like username,
password, PIN, or credit or debit card numbers via text message.
Don’t call a telephone number listed in an unsolicited text message. You should
contact any bank, government, agency, or company identified in the text message
using the information listed in your records or in official webpages.
Don’t respond to smishing messages, even to ask the sender to stop contacting
you.
Use caution when providing your mobile number or other information in response
to pop-up advertisements and “free trial” offers.
Verify the identity of the sender and take the time to ask yourself why the sender
is asking for your information.
To obtain this connection, devices exchange each other’s PIN, but in general as a
technology it is not secure. It is a good practice to repair the devices after a period of
time.
15
Mobile Security
16
5. Mobile Security − Android OS Mobile Security
As many of us know, software is developed by Google for mobile devices with processing
capabilities for smartphones and tablets. Its kernel is based on Linux. Its installed
applications run in a sandbox. However, many producers have released its antiviruses for
such OS, like Kasperky, MCAfee, and AVG Technologies. Even though antivirus application
runs under sandbox, it has a limit to scan the environment.
Android OS Architecture
The following image shows the overall architecture of Android OS:
17
Mobile Security
The first layer is Application, includes applications such as SMS, calendars, and
other third party applications.
o View system, which is for developers to create boxes, lines, grids, etc.
o Content providers permit applications to access and use data from third party
applications.
The third layer is libraries, which is the most important part. It utilizes the
function of the application, for example, to store date in a database. It is SQLite
that utilizes this function.
The fourth layer is the Linux Kernel. It holds all the drivers of the hardware
components, such as camera, wireless, storage, etc.
The device admin applications are written using the Device Administration API. These
device admin applications enforce the desired policies when the user installs these
applications on his or her device. The built-in applications can leverage the new APIs to
improve the exchange support.
Here are some examples of the types of applications that might use the Device
Administration API:
Email clients
Security applications that do remote wipe
Device management services and application
The examples used in this tutorial are based on the Device Administration API sample,
which is included in the SDK samples (available through the Android SDK Manager) and
located on your system as
<sdk_root>/ApiDemos/app/src/main/java/com/example/android/apis/app/
DeviceAdminSample.java.
18
Mobile Security
Sample Application
This sample application offers a demo of device admin features. It presents the users with
a user interface that lets them enable the device admin application.
Once the users have enabled the application, they can use the buttons in the user interface
to do the following:
Specify requirements for the user's password, such as minimum length, the
minimum number of numeric characters it must contain, and so on.
Set the password. If the password does not conform to the specified policies, the
system returns an error.
Set how many failed password attempts can occur before the device is wiped (that
is, restored to factory settings).
Set the password history length (length refers to the number of old passwords
stored in the history). This prevents the users from reusing one of the
last passwords they previously used.
19
Mobile Security
Specify that the storage area should be encrypted, if the device supports it.
Set the maximum amount of inactive time that can elapse before the device locks.
20
6. Mobile Security − Android Rooting Mobile Security
Rooting is a word that comes from Linux syntax. It means the process which gives the
users super privilege over the mobile phone. After passing and completing this process,
the users can have control over SETTINGS, FEATURES, and PERFORMANCE of their phone
and can even install software that is not supported by the device. In simple words, it
means the users can easily alter or modify the software code on the device.
Rooting enables all the user-installed applications to run privileged commands such as:
Low-level access to the hardware that are typically unavailable to the devices in
their default configuration
Improved performance
Wi-Fi and Bluetooth tethering
Install applications on SD card
Better user interface and keyboard
Rooting also comes with many security and other risks to your device such as:
Universal Androot
You can download from https://www.roidbay.com/app/apk/com.corner23.android.universalandroot/
21
Mobile Security
Unrevoked
Unrevoked available at http://unrevoked.com
22
Mobile Security
Step 1: Plug in and connect your Android device to your computer with a USB cable.
Step 3: Unplug and re-connect, but this time select Charge only to ensure that your
phone's SD card is not mounted to your PC.
Step 4: Go to Settings -> Applications -> Development and enable USB Debugging to
put your android into USB Debugging mode.
23
Mobile Security
Step 7: Wait for some time until you see a "Running a Su test Success!"
http://loadbalancing.modaco.com/download.php?file=r3-ville-superboot.zip
24
Mobile Security
Step 3: Turn off the phone, remove the battery, and plug in the USB cable.
Step 4: When the battery icon appears on the screen, pop the battery back in.
Step 5: Now tap the Power button while holding down the Camera key. For Android
phones with a trackball: Turn off the phone, press and hold the trackball,
Mac: Open a terminal window to the directory containing the files, and type chmod
+x. Install-superboot-mac.sh" followed by ./install-superboot-mac.sh.
Linux: Open a terminal window to the directory containing the files, and type
chmod +x. Install-superboot-linux.sh" followed by ./install-superboot-linux.sh.
Android Trojan
ZitMo (ZeuS-in-the-Mobile)
Zitmo refers to a version of the Zeus malware that specifically targets mobile devices. It
is a malware Trojan horse designed mainly to steal online banking details from users. It
circumvents mobile banking app security by simply forwarding the infected mobile's SMS
messages to a command and control mobile owned by cybercriminals. The new versions
of Android and BlackBerry have now added botnet-like features, such as enabling
cybercriminals to control the Trojan via SMS commands.
25
Mobile Security
26
Mobile Security
27
Mobile Security
28
7. Mobile Security − Securing Android Devices Mobile Security
Nowadays, mobile phone devices are substituting computers in some special cases and
from this comes the concern of the users and system administrators to restrict rights to
the application or the user. Hence, we protect computers from being infected by installing
antiviruses in order to prevent any possible unpleasant situation, where some data is lost
or goes public.
Keep the operating system updated and patch the apps all the time.
Download apps that are officially marked by Google or from genuine sites that
offers this app.
Use android protectors that allows you to set password to email, SMS, etc.
29
Mobile Security
Step 2: Click Device management -> Mobile -> Device management settings
You can apply this setting to your whole organization or by organizational unit to enable
remote wipe for only a specific group of users.
30
Mobile Security
Once enabled, a user can remotely wipe their device by following these steps:
Step 1: Go to their My Devices page. The user will need to enter their password to access
this page, even if they're already signed in to their account.
A window appears with this warning text: This will wipe all application and personal data
from your device. Anything that hasn't been synced will be lost. Are you sure you want to
proceed?
31
8. Mobile Security − Android Security Tools Mobile Security
In this chapter, we will discuss android security tools mainly those that are meant for
protection from malware installation and downloads.
DroidSheep Guard
DroidSheep Guard monitors your phone's ARP-Table and it warns you through pop-up
alerts, in case it detects malicious entries. It can instantly disable a Wi-Fi connection to
protect your accounts. This can guard against all ARP-based attacks, such as DroidSheep
and Faceniff, man-in-middle attacks, handmade attacks, etc. You can use Facebook, eBay,
Twitter, and Linkedln accounts on public Wi-Fi securely. To download DroidSheep Guard,
go to http://droidsheep.de
32
Mobile Security
Sofo
Using up-to-the-minute intelligence from SophosLabs, it automatically scans apps as you
install them. This anti-virus functionality helps you avoid undesirable software, which can
lead to data loss and unexpected costs. It also protects your device from attacks via USSD
or other special codes.
If your device is lost or stolen, a remote lock or wipe will shield your personal information.
This can be downloaded from the following Google Play link:
https://play.google.com/store/apps/details?id=com.sophos.smsec&hl=en
33
Mobile Security
34
Mobile Security
Avira Antivirus Security for Android is another antivirus that can be downloaded from
https://play.google.com/store/apps/details?id=com.avira.android
It has the following features:
Shields your devices (smartphones, tablets, phablets) from malware.
Locates your lost or stolen phone.
Protects your private data (photos, SMS, etc.) from theft.
Monitors how each app collects sensitive data.
Blocks unauthorized access to other applications installed on your device.
Lights on system resources, to help save battery power.
35
Mobile Security
application to gain root privileges on a device and perform actions that would normally be
restricted by the Android operating system. X-Ray is installed directly (via an APK) and
not through the Google Play store.
Find My Phone
Send a text message to your phone and it will text back its current location, or have it ring
loudly if its somewhere nearby. Secure your emails, text messages, photos, notes,
calendar and more by remotely wiping your phone with SMS. Keep tabs on your phone's
SIM card. It can be downloaded from the following link:
https://play.google.com/store/apps/details?id=com.mango.findmyphone3
36
Mobile Security
Prey Anti-theft
Prey lets you keep track of your laptop, phone, or tablet if it is stolen or missing. It supports
geolocation. It's lightweight, open source software gives you full and remote control, 24/7.
Its official webpage is https://preyproject.com/ and it can be downloaded from
https://play.google.com/store/apps/details?id=com.prey
37
Mobile Security
38
9. Mobile Security − Apple iOS Mobile Security
iOS is Apple mobile's operating system established for its iPhones. It maintains and
sustains other Apple devices such as iPod Touch, iPad, and Apple TV. Using the Mac OS X,
the iOS operating system is fabricated.
The user interface is based on the concept of direct manipulation, using multi-touch
gestures. This has many other options and features using which daily work becomes easy
and this can be updated on your iPhone, iPad, or iPod Touch using Wi-Fi and other wireless
networks.
Jailbreaking iOS
Jailbreaking is taking control of the iOS operating system that is used on Apple devices, in
simple words the symmetry of Rooting in Android devices. It removes the device from the
dependencies on exclusive Apple source applications and allows the user to use third-party
apps unavailable at the official app store.
It is accomplished by installing a modified set of kernel patches that allows you to run
third-party applications not signed by the OS vendor. It is used to add more functionality
39
Mobile Security
to standard Apple gadgets. It can also provide root access to the operating system and
permits download of third-party applications, themes, extensions, etc. This removes
sandbox restrictions, which enables malicious apps to access restricted mobile resources
and information.
Jailbreaking, like rooting, also has some security risks to your device:
Types of Jailbreaking
When the device starts booting, it loads Apple's own iOS, and to install apps from third
parties, the device must then be broken and have the kernel patched each time it is
turned on. There are three types of jailbreaking methods used.
iBoot Exploit
An iBoot jailbreak allows the file system and iboot level access. This type of exploit can be
semi-tethered if the device has a new boot-rom. This is mostly used to reduce low-level
iOS controls. This exploit method takes the help of the hole in the iBoot to delink the code
signing appliance and then the customer can download the required applications. Using
this method, the users configure the mobile to accept custom firmware and probably
jailbreak more.
Userland Exploit
A userland jailbreak allows user-level access but doesn't allow iboot-level access. This type
of exploit cannot be tethered as it cannot have recovery mode loops. These can be patched
by Apple. The userland exploits use a loophole in the system application to gain control of
that application. The exploit can only give control to the filesystem. This type of exploit
can access non-vital code in the application and is user friendly and platform independent.
Bootrom Exploit
A bootrom jailbreak can break all the low-level authentications such as providing
filesystem, iBoot, and NOR access (custom boot logos). This process finds a hole in the
application to discard the signature checks. It can't be corrected by Apple. A bootrom
jailbreak allows user-level access and iBoot-level access. These cannot be patched by
Apple.
Jailbreaking Techniques
There are two types of Jailbreaking techniques.
Untethered Jailbreaking
Untethered jailbreak is a technique of rebooting the mobile device without connecting
40
Mobile Security
it to the system every time it is booted. If the battery of the device is spoiled, after
changing it boots as usual. Tools for this are PwnageTool, Greenpois0n, Sn0wbreeze, and
Limera1n.
Tethered Jailbreaking
If the device starts backing up on its own, it will no longer have a patched kernel, and it
may get stuck in a partially started state. In order for it to start completely and with a
patched kernel, it essentially must be "re-jailbroken" with a computer (using the "boot
tethered" feature of a jailbreaking tool) each time it is turned on.
It is a graphical front-end to Advanced Packaging Tool (APT) with the dpkg package
management system, which means that the packages available in Cydia are provided by
a decentralized system of repositories (also called sources) that list these packages.
41
Mobile Security
Jailbreaking Tools
Some other jailbreaking tools are as follows:
Pangu
Team Pangu consists of several senior security researchers and focuses on mobile security
research. It is known for the multiple releases of jailbreak tools for iOS 7 and iOS 8 in
2014.Team Pangu proactively shares knowledge with the community and presents the
latest research at well-known security conferences including BlackHat, CanSecWest, and
Ruxcon. It can be downloaded from http://en.pangu.io
42
Mobile Security
Redsn0w
Redsn0w can be downloaded from http://blog.iphone-dev.org/ and it runs on different
firmware versions.
43
Mobile Security
GeekSn0w is a popular iOS 7.1.2 jailbreak utility that's built upon winocm's opensn0w
project and Geohot's limera1n exploit. GeekSn0w can jailbreak all iPhone 4 models on
Apple's latest public firmware, iOS 7.1.2. Its official webpage is http://geeksn0w.it/
44
Mobile Security
45
Mobile Security
46
10. Mobile Security − iOS Device Tracking Tools Mobile Security
Let’s see some of the guidelines to be followed based on the best practices on how to
secure an iOS.
In the following sections, we will discuss two popular tools that are widely used to trace
iOS iPhones.
Find My iPhone
The first one would recommend Find My iPhone. It can be downloaded from
https://itunes.apple.com but to locate your phone you will need an Apple ID to log in at
iCloud.com or use the Find My iPhone app.
47
Mobile Security
iHound
iHound is an iOS device tracking tool that allows you to track your device by simply turning
on iHound, minimize it, and let it run. It can be found at https://www.ihoundsoftware.com/
48
11. Mobile Security − Windows Phone OS Mobile Security
This is an operating system developed by Microsoft for mobile phones with processing
capabilities. You can share calendars, lists, and photos. It is also based on One Note so
you can share photos in lists as well. You can invite people who don’t have a Windows
Phone into your room, the experience will be more limited, calendar sharing was one of
the features that was highlighted.
SkyDrive syncs your office documents across all your devices, and you get 7GB of free
storage.
49
Mobile Security
Using this GPS tracker app, you can follow the whereabouts of your children or other family
members. You can also use it for business purposes. You can use it to track your
employees, company mobile devices, or your fleet.
50
12. Mobile Security − BlackBerry OS Mobile Security
The enterprise server, together with enterprise messaging and collaboration systems,
provides email access to the mobile users, enterprise instant messaging, and personal
information management tools. Poorly configured firewalls increase the risk of attacks.
The Web, Database, and Application Server contain vulnerabilities. If the attacker detects
those vulnerabilities, then he or she can easily carry out an attack and take control over
the entire server.
51
Mobile Security
52
Mobile Security
Email Exploits
In BlackBerry mobile, all emails are sent, received, and read through the
net.rim.blackberry.api.mail package and this package can be used only on signed
applications. BlackBerry attachment service supports only files with extensions such as
.doc, .pdf, .txt, .wpd,.xls, and .ppt, but it can send any kind of file via email. An attachment
with file type .cod is not supported by BlackBerry.
53
13. Mobile Security − BlackBerry Devices Mobile Security
Following are some of the practical guidelines to secure BlackBerry devices. The list is
based on the best practices and these are not universal rules.
Use BlackBerry Protect or other security apps for securing confidential data.
MobileTracker
MobileTracker is the mobile tracking device for BlackBerry. It is a commercial version and
can be downloaded from:
http://www.skylab-mobilesystems.com/en/products/mobiletracker_blackberry.html
Easily records tracklogs and views them in Google Earth or publishes them with
Google Maps.
54
Mobile Security
http://www.positionlogic.com/gps-tracking-products/mobile-gps-tracking-solutions/
55
Mobile Security
Mobile Spyware
mSpy
mSpy is spy software to keep your children from doing things without you knowing. They
will make you wish that you could track a cellphone without them knowing, just to make
sure that they don’t act up. Whether it is going out with the wrong friends or causing
trouble, you may want to turn that mobile phone of theirs into a spy phone. It can be
downloaded and bought at https://www.mspy.com/blog/mspy-for-blackberry-your-kids-
nanny/
56
Mobile Security
StealthGenie
StealthGenie is another spyware and is a feature-rich and easy-to-use cellphone spy
package for monitoring all activities on smartphones running on Android, iOS (iPhone) or
BlackBerry.
StealthGenie has all the spy features you’d ever want. You’ll be able to read incoming and
outgoing text messages, view call logs, read emails, track GPS location, spy on instant
messenger chats, remotely monitor their phone, and listen to their live calls. It can be
downloaded at http://www.stealthandroidspy.com/
57
Mobile Security
58
14. Mobile Security − MDM Solution Mobile Security
MDM provides platforms for over-the-air or wired distribution of applications, data, and
configuration settings for all types of mobile devices along with mobile phones,
smartphones, tablet computers, etc.
With the help of MDM, enterprise-wide policies can be implemented easily to reduce
support costs, time, and business and security threats. All the company-owned, consumer-
owned, as well as the employee-owned devices across the enterprise can be easily
managed with the help of it.
MDM can reduce support cost and minimize business threats just by safeguarding and
controlling all the data and configuration settings of all the mobile devices in the network.
This technique allows organizations to implement the MDM life cycle for devices such as
smartphones and tablets including iPhones, iPads, Androids, Windows Phones,
BlackBerrys, and Kindle Fires. Using the integrated cloud platform, the MaaS360
streamlines MDM with improved visibility and control that spans across mobile devices,
applications, and documents.
59
Mobile Security
BYOD Risks
Implementing BYOD in the company has its own risks and are as follows:
Increases the possibility of exploits in the company as there are more mobile
devices in the network.
60
Mobile Security
Publish an enterprise policy that specifies the acceptable usage of consumer grade
devices and bring-your-own devices in the enterprise.
Enable security measures such as antivirus to protect the data in the datacenter.
Implement policy that specifies which levels of application and data access are
allowed on consumer-grade devices, and which are prohibited.
Specify whether the domain password can be cached on the device, or whether
users must enter it every time they request access.
Determine the allowed Access Gateway authentication methods from the following:
o No authentication
o Domain only
o RSA SecurlD only
o Domain + RSA SecurlD
o SMS authentication
61
Mobile Security
Press the power button to lock the device whenever it is not in use.
Utilize a passcode lock to protect the access to the mobile device; consider the
eight-character non-simple passcode.
Report a lost or stolen device to IT so they can disable certificates and other access
methods associated with the device.
62
15. Mobile Security − SMS Phishing Mobile Security
Countermeasures
This chapter explains certain guidelines and tools related to mobile security. In order to
protect ourselves from SMS phishing, some rules have to be kept in mind.
Financial companies never ask for personal or financial information, like usernames,
passwords, PINs, or credit or debit card numbers via text message.
Don’t call a telephone number listed in an unsolicited text message. You should
contact any bank, government, agency, or company identified in the text message
using the information listed in your records or in official webpages.
Don’t respond to smishing messages, even to ask the sender to stop contacting
you.
Use caution when providing your cell phone number or other information in
response to pop-up advertisements and “free trial” offers.
Verify the identity of the sender and take time to ask yourself why the sender is
asking for your information.
63
16. Mobile Security − Mobile Protection Tools Mobile Security
Rigorous antitheft features – locks, locates and wipes device remotely if lost or
stolen.
Backs up and restores your important data with just one click.
SIM protection for data wipe or lockdown, if someone tries to change the SIM.
64
Mobile Security
Lookout
Lookout is a mobile protection tool that allows you to protect your mobile from mobile
threats. It helps you avoid risky behavior such as connecting to an unsecured Wi-Fi
network, downloading a malicious app or clicking on a fraudulent link in order to prevent
identity theft, financial fraud, and the loss of your most personal data.
It provides safe, secure, and seamless backup of your mobile data, automatically over the
air, and allows you to find your phone if it's lost or stolen. The dashboard allows you to
remotely manage your phone. It official webpage is www.lookout.com
WISeID
WISelD provides secure and easy-to-use encrypted storage for personal data, Personal
Identifiable Information (Pll), PINs, credit and loyalty cards, notes, and other information.
It allows you to store your websites, user names, and passwords and quickly log on to
your favorite websites through your mobile device. It’s official webpage is
https://www.wiseid.com/
65
Mobile Security
zIPS
This mobile protection tool uses the on-device z9 detection engine to monitor the whole
device for malicious behavior, and to dynamically detect known and unknown threats in
real time.
66
Mobile Security
67
17. Mobile Security − Mobile Pen Testing Mobile Security
In this chapter, we will discuss the basic concepts of penetration testing of mobile phones.
As you will see, it differs based on the OS.
Step 1: Root the OS with the help of tools such as SuperOneClick, Superboot, Universal
Androot, and Unrevoked in order to gain administrative access to OS and Apps.
Step 2: Perform DoS attack in order to make a stress test of Apps or OS which can be
done with AnDOSid. It can be downloaded from https://github.com/Scott-
Herbert/AnDOSid
Step 3: Check for vulnerabilities in web browsers. Mainly check whether cross-application
scripting error is present in the Android browser.
Step 4: Check SQLite for vulnerabilities mainly its purpose is to check for any sensitive
information, if it is in an encrypted form (like password, contacts, database links, etc.).
One of the best tools used for this is sqlmap which is found in Kali distribution.
68
Mobile Security
Step 6: Detect capability leaks in Android devices by using the tool Woodpecker.
69
Mobile Security
Step 2: Try to unlock the iPhone. To unlock the iPhone use tools such as iPhoneSimFree
which can be downloaded from http://www.iphonesimfree.com and anySIM.
Step 3: Use SmartCover to bypass passcode for which you need to follow these steps:
Hold the power button of an iOS operating device until the power off message appears.
Close the smart cover until the screen shuts and opens the smart cover after few seconds.
Press the cancel button to bypass the password code security.
Step 4: Hack iPhone using Metasploit, which is incorporated in Kali distribution. Use the
Metasploit tool to exploit the vulnerabilities in the iPhone, based on the vulnerabilities that
you find.
70
Mobile Security
Step 5: Check for the access point with the same name and encryption type.
Step 7: Check whether the malformed data can be sent to the device. Use social
engineering techniques such as sending emails or SMS to trick the user into opening links
that contain malicious web pages.
Step 1: Try to turn off the phone by sending an SMS. Send a SMS to the phone, which
turns off the mobile and reboots it again.
Step 2: Try to jailbreak the Windows phone. Use the WindowBreak program to
jailbreak/unlock the Windows phone. You can get more details about this tool in the link
http://windowsphonehacker.com/articles/the_windowbreak_project-12-23-11
71
Mobile Security
Step 3: Check for on-device encryption. Check whether the data on the phone can be
accessed without a password or PIN.
Step 4: Check for a vulnerability in Windows Phone Internet Explorer. Check whether the
flaw in CSS function in Internet Explorer allows the attackers to gain full access over the
phone through remote code execution.
Step 2: Check for flaws in the application code signing process. Obtain code-signing keys
using prepaid credit cards and false details, sign a malicious application, and publish it on
the BlackBerry app world.
Step 3: Perform an email exploit. Send an email or message to trick a user to download
a malicious .cod application file on the BlackBerry device.
Step 4: Perform a DoS attack. Try sending malformed Server Routing Protocol (SRP)
packets from the BlackBerry network to the router to cause a DoS attack. Some tools were
mentioned in the previous chapters.
Step 5: Check for vulnerabilities in the BlackBerry Browser. Send maliciously crafted web
links and trick the users to open links containing malicious web pages on the BlackBerry
device.
Step 6: Search for password protected files. Use tools like Elcomsoft Phone Password
Breaker that can recover password protected files and backups from BlackBerry devices.
72
Mobile Security
zANTI
zANTI is a mobile penetration testing toolkit that enables IT security managers and
Pentesters to perform complex security audits. It simulates advanced hackers’ capabilities
in an organization’s network through a user-friendly mobile app. It has two versions - free
for community and commercial for corporates. It can be downloaded from
https://www.zimperium.com/zanti-mobile-penetration-testing
It also scans the network by finding uncovered authentication, backdoor, and brute-force
attacks, DNS and protocol-specific attacks, and rogue access points using a comprehensive
range of full customizable network reconnaissance scans.
Automatically diagnose vulnerabilities within mobile devices or web sites using a host of
penetration tests including, man-in-the-Middle (MITM), password cracking and Metasploit.
73
Mobile Security
dSploit
dSploit is a penetration testing tool developed for the Android operating system. It consists
of several modules that are capable to perform network security assessments on wireless
networks.
dSploit allows you to perform tasks such as, network mapping, vulnerability scanning,
password cracking, Man-In-The-Middle attacks and many more. More information can be
found on https://github.com/evilsocket and can be downloaded from
https://sourceforge.net/projects/dsploit999/?source=directory
74
Mobile Security
75