Skip to:Content
|
Bottom
Cover image for Hacking mobile phones
Title:
Hacking mobile phones
Personal Author:
Publication Information:
Boston, MA : Thomson Course Technology, 2006
ISBN:
9781598631067

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010113579 TK5103.485 F32 2006 Open Access Book Book
Searching...
Searching...
30000010099374 TK5103.485 F32 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

Is your mobile phone safe from hackers? What would you do if somebody broke into your mobile phone and stole all your sensitive e-mail? What about if someone cloned your phone and made countless long-distance phone calls? What if your address book got stolen and your loved ones started receiving malicious phone calls? What if someone broke into your mobile phone and used it to transfer funds out of your bank account? Although mobile phones are valuable tools for exchanging photos with loved ones, getting the latest sports updates, buying and selling stocks, and even running entire businesses, they have also become more dangerous than you might ever imagine. Computer criminals can hack into mobile phones to intercept data; spread viruses, worms, and mobile Trojans; steal identities; and much more. How can you defend yourself against these attacks? Simple-educate yourself with Hacking Mobile Phones, which The Hindu calls the first book on the subject aimed at educating users against mobile phone-related security loopholes, vulnerabilities, and attacks. The New Indian Express declares Fadia's book an excellent guide for all mobile phone users.Deriving data from actual research experiments, code analysis, and case and consumer studies, this book will open your eyes to security threats, secrets, and loopholes that until now went unnoticed.


Author Notes

Ankit Fadia is an independent computer security consultant based in Silicon Valley


Table of Contents

Introductionp. xii
Part I Security Threatsp. 1
Chapter 1 Bluetooth Hackingp. 3
Discoveryp. 4
Pairingp. 5
Bindingp. 6
Bluetooth Security Modesp. 7
Case Studiesp. 7
New York City, USAp. 7
Hong Kongp. 8
Singaporep. 8
Tokyo, Japanp. 9
Beijing, Chinap. 9
Osaka, Japanp. 9
Kuala Lumpur, Malaysiap. 10
Types of Bluetooth Attacksp. 10
BlueJackingp. 11
BlueJacking Countermeasuresp. 20
BlueSnarfingp. 21
BlueSnarfing Countermeasuresp. 22
Blue Backdoorp. 23
BlueBuggingp. 23
Other Attacksp. 23
Blueprintingp. 25
Vulnerable Mobile Phone Handsetsp. 28
Countermeasuresp. 29
Live Attack Logged Datap. 30
Case Study 1

p. 30

Case Study 2

p. 33

Fadia's Hot Picks for Popular Bluetooth Toolsp. 40
Chapter 2 Mobile DoS Attacksp. 67
Case Studiesp. 68
Sydney, Australiap. 69
Paris, Francep. 69
Taipei, Taiwanp. 69
Types of MDoS Attacksp. 69
BlueSmacking: The ping of Deathp. 70
Jammingp. 73
Malformed OBEX Messagep. 73
Failed Authenticationp. 74
Remote Malformed SMS Messagep. 75
Local Malformed SMS Messagep. 76
Malformed MIDI Filep. 77
Malformed Format Stringp. 77
Vulnerable Mobile Phone Handsetsp. 78
Countermeasuresp. 78
Live Attack Logged Data: Case Studyp. 79
Fadia's Hot Picks for Popular BlueSmacking Toolsp. 80
Chapter 3 Email Attacksp. 83
Mobile Phone Email Threatsp. 85
Popularityp. 85
Spying Attacksp. 85
Anonymityp. 86
Case Studiesp. 86
Tokyo, Japanp. 86
Shenzhen, Chinap. 86
Types of Email Attacksp. 86
Abusive Messagesp. 87
Abusive Messages Countermeasuresp. 88
Forged Messagesp. 94
Forged Messages Countermeasuresp. 96
Spamp. 100
Spam Countermeasuresp. 100
Fadia's Hot Picks for Popular Email Threats Toolsp. 102
Chapter 4 Viruses, Worms, and Trojansp. 107
Malicious Filesp. 108
Virusesp. 108
Wormsp. 108
Trojansp. 108
Case Studiesp. 108
Seoul, Koreap. 109
Shanghai, Chinap. 109
Shenzhen, Chinap. 109
Wellington, New Zealandp. 109
Types of Malicious Filesp. 110
The Cabir Wormp. 111
Removal Instructionsp. 114
Vulnerable Mobile Phone Handsetsp. 115
Countermeasuresp. 116
The SymbOS.Cabir.I Wormp. 116
Removal Instructionsp. 118
Vulnerable Mobile Phone Handsetsp. 119
Countermeasuresp. 119
The Mabir Wormp. 119
Removal Instructionsp. 121
Vulnerable Mobile Phone Handsetsp. 121
Countermeasuresp. 121
The Lasco Wormp. 122
Removal Instructionsp. 123
Vulnerable Mobile Phone Handsetsp. 124
Countermeasuresp. 124
The Commwarrior MMS Virusp. 124
Removal Instructionsp. 127
Vulnerable Mobile Phone Handsetsp. 128
Countermeasuresp. 128
The WinCE Duts Virusp. 128
Removal Instructionsp. 129
Vulnerable Mobile Phone Handsetsp. 129
Countermeasuresp. 129
The Skulls Trojanp. 129
Removal Instructionsp. 133
Vulnerable Mobile Phone Handsetsp. 135
Countermeasuresp. 135
The MOS Trojanp. 135
Removal Instructionsp. 136
Vulnerable Mobile Phone Handsetsp. 136
Countermeasuresp. 137
The Fontal Trojanp. 137
Removal Instructionsp. 138
Vulnerable Mobile Phone Handsetsp. 138
Countermeasuresp. 138
The Hobbes Trojanp. 139
Removal Instructionsp. 140
Vulnerable Mobile Phone Handsetsp. 141
Countermeasuresp. 141
The Drever Trojanp. 141
Removal Instructionsp. 142
Vulnerable Mobile Phone Handsetsp. 143
Countermeasuresp. 143
The Locknut Trojanp. 143
Removal Instructionsp. 144
Vulnerable Mobile Phone Handsetsp. 145
Countermeasuresp. 146
The Onehop Trojanp. 146
Removal Instructionsp. 147
Vulnerable Mobile Phone Handsetsp. 148
Countermeasuresp. 148
The MGDropper Trojanp. 148
Removal Instructionsp. 150
Vulnerable Mobile Phone Handsetsp. 151
Countermeasuresp. 152
The Appdisabler File Dropperp. 152
The Dampig File Dropperp. 152
Removal Instructionsp. 153
Vulnerable Mobile Phone Handsetsp. 153
Countermeasuresp. 153
The Doomboot Trojanp. 153
Removal Instructionsp. 154
Vulnerable Mobile Phone Handsetsp. 155
Countermeasuresp. 155
The Brador Trojanp. 155
Removal Instructionsp. 156
Vulnerable Mobile Phone Handsetsp. 156
Countermeasuresp. 156
General Virus, Worm, and Trojan Countermeasuresp. 156
Live Attack Logged Datap. 157
Case Study 1

p. 158

Case Study 2

p. 158

Case Study 3

p. 159

Case Study 4

p. 159

Case Study 5

p. 160

Fadia's Hot Picks for Popular Mobile Antivirus Toolsp. 161
Part II Security Tips and Tricksp. 163
Chapter 5 Nokia Securityp. 165
Display the IMEI Numberp. 165
Display the Month and Year of Manufacturep. 167
Display and Modify the Date of Purchasep. 168
Display the Serial Numberp. 169
Display the Mobile Software Versionp. 170
Restore the Default Factory Settingsp. 171
Enable the Secret Menup. 171
Enable the Secret Menu on Older Phonesp. 175
Send an SMS Text Message Quicklyp. 175
Save a Number During a Phone Callp. 175
Use the Silent Mode Shortcutp. 176
Improve the Sound Qualityp. 176
Enable the Display Light On Shortcutp. 176
Display Larger Font in the Address Bookp. 176
Crash Your Friend's Mobile Phonep. 177
Force Your Phone to Restartp. 178
Unlock Mobile Phone Locksp. 178
Bypass Mobile Phone Locksp. 179
Customize the Background Displayp. 180
Eavesdrop on Other Peoplep. 182
Retrieve Original Ringtonesp. 182
Save Battery Timep. 183
Live Attack Logged Datap. 184
Make a Spoofed Phone Callp. 184
Change the Language Codep. 184
Fadia's Hot Pick for Popular Mobile Security Tips and Tricksp. 185
Chapter 6 Motorola Securityp. 187
Display the IMEI Numberp. 187
Calculate Distance from the Closest Base Stationp. 189
Gather Signal Quality Informationp. 189
Increase Memoryp. 190
Use Secret Codesp. 190
Improve Sound Qualityp. 192
Chapter 7 Samsung Securityp. 193
Secret Shortcuts, Tips, and Tricksp. 193
Chapter 8 Sony Ericsson Securityp. 195
Secret Shortcuts, Tips, and Tricksp. 195
Chapter 9 Siemens Securityp. 197
Secret Shortcuts, Tips, and Tricksp. 197
Display the IMEI Numberp. 197
Enable Monitor Modep. 198
Unlock the Operator Lockp. 198
Display the Sunset Easter Eggp. 198
Chapter 10 BlackBerry Securityp. 199
Free Messagingp. 204
Fadia's Hot Picks for BlackBerry Devices Security Softwarep. 205
Part III Appendicesp. 207
Appendix A Security Test: Comparing Various Handsetsp. 209
Appendix B GSM Versus CDMAp. 213
Appendix C iModep. 215
Appendix D Online Resourcesp. 217
Ankit Fadia Onlinep. 217
Downloadable Utilitiesp. 217
Antivirus Softwarep. 217
BlackBerryp. 218
Bluetoothp. 218
Email Threatsp. 264
Mitsubiship. 264
Motorolap. 264
Nokiap. 286
Panasonicp. 287
Philipsp. 287
Sagemp. 288
Samsungp. 288
Securityp. 288
Siemensp. 289
Sony Ericssonp. 289
Appendix E Mobile Phone Platformsp. 291
Appendix F Bluetooth-Enabled Mobile Phonesp. 293
Appendix G Infrared-Enabled Mobile Phonesp. 295
Appendix H GPRS-Enabled Mobile Phonesp. 297
Indexp. 299
Go to:Top of Page