Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010113579 | TK5103.485 F32 2006 | Open Access Book | Book | Searching... |
Searching... | 30000010099374 | TK5103.485 F32 2006 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Is your mobile phone safe from hackers? What would you do if somebody broke into your mobile phone and stole all your sensitive e-mail? What about if someone cloned your phone and made countless long-distance phone calls? What if your address book got stolen and your loved ones started receiving malicious phone calls? What if someone broke into your mobile phone and used it to transfer funds out of your bank account? Although mobile phones are valuable tools for exchanging photos with loved ones, getting the latest sports updates, buying and selling stocks, and even running entire businesses, they have also become more dangerous than you might ever imagine. Computer criminals can hack into mobile phones to intercept data; spread viruses, worms, and mobile Trojans; steal identities; and much more. How can you defend yourself against these attacks? Simple-educate yourself with Hacking Mobile Phones, which The Hindu calls the first book on the subject aimed at educating users against mobile phone-related security loopholes, vulnerabilities, and attacks. The New Indian Express declares Fadia's book an excellent guide for all mobile phone users.Deriving data from actual research experiments, code analysis, and case and consumer studies, this book will open your eyes to security threats, secrets, and loopholes that until now went unnoticed.
Author Notes
Ankit Fadia is an independent computer security consultant based in Silicon Valley
Table of Contents
Introduction | p. xii |
Part I Security Threats | p. 1 |
Chapter 1 Bluetooth Hacking | p. 3 |
Discovery | p. 4 |
Pairing | p. 5 |
Binding | p. 6 |
Bluetooth Security Modes | p. 7 |
Case Studies | p. 7 |
New York City, USA | p. 7 |
Hong Kong | p. 8 |
Singapore | p. 8 |
Tokyo, Japan | p. 9 |
Beijing, China | p. 9 |
Osaka, Japan | p. 9 |
Kuala Lumpur, Malaysia | p. 10 |
Types of Bluetooth Attacks | p. 10 |
BlueJacking | p. 11 |
BlueJacking Countermeasures | p. 20 |
BlueSnarfing | p. 21 |
BlueSnarfing Countermeasures | p. 22 |
Blue Backdoor | p. 23 |
BlueBugging | p. 23 |
Other Attacks | p. 23 |
Blueprinting | p. 25 |
Vulnerable Mobile Phone Handsets | p. 28 |
Countermeasures | p. 29 |
Live Attack Logged Data | p. 30 |
Case Study 1 p. 30 | |
Case Study 2 p. 33 | |
Fadia's Hot Picks for Popular Bluetooth Tools | p. 40 |
Chapter 2 Mobile DoS Attacks | p. 67 |
Case Studies | p. 68 |
Sydney, Australia | p. 69 |
Paris, France | p. 69 |
Taipei, Taiwan | p. 69 |
Types of MDoS Attacks | p. 69 |
BlueSmacking: The ping of Death | p. 70 |
Jamming | p. 73 |
Malformed OBEX Message | p. 73 |
Failed Authentication | p. 74 |
Remote Malformed SMS Message | p. 75 |
Local Malformed SMS Message | p. 76 |
Malformed MIDI File | p. 77 |
Malformed Format String | p. 77 |
Vulnerable Mobile Phone Handsets | p. 78 |
Countermeasures | p. 78 |
Live Attack Logged Data: Case Study | p. 79 |
Fadia's Hot Picks for Popular BlueSmacking Tools | p. 80 |
Chapter 3 Email Attacks | p. 83 |
Mobile Phone Email Threats | p. 85 |
Popularity | p. 85 |
Spying Attacks | p. 85 |
Anonymity | p. 86 |
Case Studies | p. 86 |
Tokyo, Japan | p. 86 |
Shenzhen, China | p. 86 |
Types of Email Attacks | p. 86 |
Abusive Messages | p. 87 |
Abusive Messages Countermeasures | p. 88 |
Forged Messages | p. 94 |
Forged Messages Countermeasures | p. 96 |
Spam | p. 100 |
Spam Countermeasures | p. 100 |
Fadia's Hot Picks for Popular Email Threats Tools | p. 102 |
Chapter 4 Viruses, Worms, and Trojans | p. 107 |
Malicious Files | p. 108 |
Viruses | p. 108 |
Worms | p. 108 |
Trojans | p. 108 |
Case Studies | p. 108 |
Seoul, Korea | p. 109 |
Shanghai, China | p. 109 |
Shenzhen, China | p. 109 |
Wellington, New Zealand | p. 109 |
Types of Malicious Files | p. 110 |
The Cabir Worm | p. 111 |
Removal Instructions | p. 114 |
Vulnerable Mobile Phone Handsets | p. 115 |
Countermeasures | p. 116 |
The SymbOS.Cabir.I Worm | p. 116 |
Removal Instructions | p. 118 |
Vulnerable Mobile Phone Handsets | p. 119 |
Countermeasures | p. 119 |
The Mabir Worm | p. 119 |
Removal Instructions | p. 121 |
Vulnerable Mobile Phone Handsets | p. 121 |
Countermeasures | p. 121 |
The Lasco Worm | p. 122 |
Removal Instructions | p. 123 |
Vulnerable Mobile Phone Handsets | p. 124 |
Countermeasures | p. 124 |
The Commwarrior MMS Virus | p. 124 |
Removal Instructions | p. 127 |
Vulnerable Mobile Phone Handsets | p. 128 |
Countermeasures | p. 128 |
The WinCE Duts Virus | p. 128 |
Removal Instructions | p. 129 |
Vulnerable Mobile Phone Handsets | p. 129 |
Countermeasures | p. 129 |
The Skulls Trojan | p. 129 |
Removal Instructions | p. 133 |
Vulnerable Mobile Phone Handsets | p. 135 |
Countermeasures | p. 135 |
The MOS Trojan | p. 135 |
Removal Instructions | p. 136 |
Vulnerable Mobile Phone Handsets | p. 136 |
Countermeasures | p. 137 |
The Fontal Trojan | p. 137 |
Removal Instructions | p. 138 |
Vulnerable Mobile Phone Handsets | p. 138 |
Countermeasures | p. 138 |
The Hobbes Trojan | p. 139 |
Removal Instructions | p. 140 |
Vulnerable Mobile Phone Handsets | p. 141 |
Countermeasures | p. 141 |
The Drever Trojan | p. 141 |
Removal Instructions | p. 142 |
Vulnerable Mobile Phone Handsets | p. 143 |
Countermeasures | p. 143 |
The Locknut Trojan | p. 143 |
Removal Instructions | p. 144 |
Vulnerable Mobile Phone Handsets | p. 145 |
Countermeasures | p. 146 |
The Onehop Trojan | p. 146 |
Removal Instructions | p. 147 |
Vulnerable Mobile Phone Handsets | p. 148 |
Countermeasures | p. 148 |
The MGDropper Trojan | p. 148 |
Removal Instructions | p. 150 |
Vulnerable Mobile Phone Handsets | p. 151 |
Countermeasures | p. 152 |
The Appdisabler File Dropper | p. 152 |
The Dampig File Dropper | p. 152 |
Removal Instructions | p. 153 |
Vulnerable Mobile Phone Handsets | p. 153 |
Countermeasures | p. 153 |
The Doomboot Trojan | p. 153 |
Removal Instructions | p. 154 |
Vulnerable Mobile Phone Handsets | p. 155 |
Countermeasures | p. 155 |
The Brador Trojan | p. 155 |
Removal Instructions | p. 156 |
Vulnerable Mobile Phone Handsets | p. 156 |
Countermeasures | p. 156 |
General Virus, Worm, and Trojan Countermeasures | p. 156 |
Live Attack Logged Data | p. 157 |
Case Study 1 p. 158 | |
Case Study 2 p. 158 | |
Case Study 3 p. 159 | |
Case Study 4 p. 159 | |
Case Study 5 p. 160 | |
Fadia's Hot Picks for Popular Mobile Antivirus Tools | p. 161 |
Part II Security Tips and Tricks | p. 163 |
Chapter 5 Nokia Security | p. 165 |
Display the IMEI Number | p. 165 |
Display the Month and Year of Manufacture | p. 167 |
Display and Modify the Date of Purchase | p. 168 |
Display the Serial Number | p. 169 |
Display the Mobile Software Version | p. 170 |
Restore the Default Factory Settings | p. 171 |
Enable the Secret Menu | p. 171 |
Enable the Secret Menu on Older Phones | p. 175 |
Send an SMS Text Message Quickly | p. 175 |
Save a Number During a Phone Call | p. 175 |
Use the Silent Mode Shortcut | p. 176 |
Improve the Sound Quality | p. 176 |
Enable the Display Light On Shortcut | p. 176 |
Display Larger Font in the Address Book | p. 176 |
Crash Your Friend's Mobile Phone | p. 177 |
Force Your Phone to Restart | p. 178 |
Unlock Mobile Phone Locks | p. 178 |
Bypass Mobile Phone Locks | p. 179 |
Customize the Background Display | p. 180 |
Eavesdrop on Other People | p. 182 |
Retrieve Original Ringtones | p. 182 |
Save Battery Time | p. 183 |
Live Attack Logged Data | p. 184 |
Make a Spoofed Phone Call | p. 184 |
Change the Language Code | p. 184 |
Fadia's Hot Pick for Popular Mobile Security Tips and Tricks | p. 185 |
Chapter 6 Motorola Security | p. 187 |
Display the IMEI Number | p. 187 |
Calculate Distance from the Closest Base Station | p. 189 |
Gather Signal Quality Information | p. 189 |
Increase Memory | p. 190 |
Use Secret Codes | p. 190 |
Improve Sound Quality | p. 192 |
Chapter 7 Samsung Security | p. 193 |
Secret Shortcuts, Tips, and Tricks | p. 193 |
Chapter 8 Sony Ericsson Security | p. 195 |
Secret Shortcuts, Tips, and Tricks | p. 195 |
Chapter 9 Siemens Security | p. 197 |
Secret Shortcuts, Tips, and Tricks | p. 197 |
Display the IMEI Number | p. 197 |
Enable Monitor Mode | p. 198 |
Unlock the Operator Lock | p. 198 |
Display the Sunset Easter Egg | p. 198 |
Chapter 10 BlackBerry Security | p. 199 |
Free Messaging | p. 204 |
Fadia's Hot Picks for BlackBerry Devices Security Software | p. 205 |
Part III Appendices | p. 207 |
Appendix A Security Test: Comparing Various Handsets | p. 209 |
Appendix B GSM Versus CDMA | p. 213 |
Appendix C iMode | p. 215 |
Appendix D Online Resources | p. 217 |
Ankit Fadia Online | p. 217 |
Downloadable Utilities | p. 217 |
Antivirus Software | p. 217 |
BlackBerry | p. 218 |
Bluetooth | p. 218 |
Email Threats | p. 264 |
Mitsubishi | p. 264 |
Motorola | p. 264 |
Nokia | p. 286 |
Panasonic | p. 287 |
Philips | p. 287 |
Sagem | p. 288 |
Samsung | p. 288 |
Security | p. 288 |
Siemens | p. 289 |
Sony Ericsson | p. 289 |
Appendix E Mobile Phone Platforms | p. 291 |
Appendix F Bluetooth-Enabled Mobile Phones | p. 293 |
Appendix G Infrared-Enabled Mobile Phones | p. 295 |
Appendix H GPRS-Enabled Mobile Phones | p. 297 |
Index | p. 299 |