7
Most read
8
Most read
15
Most read
Cyber Crime
(Mobile Phone Data
Hacking)
Presented by
Md Abu Syeem
Introduction
Threat types
Threat description
Conclusion
Q/A
Agenda
Mobile phone Data Hacking
smartphone
a mobile phone that performs many of the
functions of a computer, typically having a
touchscreen interface, Internet access, an
operating system capable of running
downloaded apps and storage
Mobile phone Data Hacking
All major cellular networks
support
• Voice calls
• Voice mail (VM)
• Short Message Service (SMS)
• Location-based Services (LBS)
• IP Connectivity
Email
Circuit Switching-Paging effect
Packet Switching-GGSN(Gateway GPRS
support node) SGSN(Serving GPRS support
node) (CDR-Call Detail Record)
Communication Attack
Bluetooth Attack
1.Bluesnarfing
2.Bluebugging
3. Blue jacking
4.DOS Attack
Wi-fi:
Packet sniffing
NFC:
Near field communication
• Apps get permission to do questionable things
– Access your Address Book
– Access your location
– Make calls/Send SMS
• Apple vs. Android
– Less of an issue for Apple
• Strong requirements to get into app store
Doesn't mitigate risk entirely
– Android is a bigger risk
• Play Store is more open
People don’t always read app permissions or
understand them
Mobile phone Data Hacking
Physical Attack
Sim clone
Dock connector
lockscreen
stole
Sim clone
Dock connector
lockscreen
stole
QR code
Q/A
Mobile phone Data Hacking

More Related Content

PPTX
Android Hacking + Pentesting
PDF
Mobile Hacking
PDF
Mobile Application Security
PPTX
Cyber kill chain
PPTX
Malware analysis
PPTX
What is Penetration Testing?
PDF
Security Testing Mobile Applications
PDF
Overview of the Cyber Kill Chain [TM]
Android Hacking + Pentesting
Mobile Hacking
Mobile Application Security
Cyber kill chain
Malware analysis
What is Penetration Testing?
Security Testing Mobile Applications
Overview of the Cyber Kill Chain [TM]

What's hot (20)

PPTX
Denial of service attack
PPTX
DDoS ATTACKS
PPTX
Phone Hacking: A lucrative, but largely hidden history
PDF
Privilege escalation from 1 to 0 Workshop
PPTX
Cyber Security Seminar.pptx
PPT
Security Vulnerabilities
PPTX
Mobile Application Security
PPTX
Network security
PPTX
Mobile security
PPT
Application Security
PDF
API Testing and Hacking (1).pdf
PPTX
Wireless and mobile security
PPTX
Penetration testing reporting and methodology
PPTX
Network security
PDF
Wireless Hacking
PPTX
Packet sniffing
PPTX
Application security
PPTX
Vulnerabilities in modern web applications
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PDF
12 types of DDoS attacks
Denial of service attack
DDoS ATTACKS
Phone Hacking: A lucrative, but largely hidden history
Privilege escalation from 1 to 0 Workshop
Cyber Security Seminar.pptx
Security Vulnerabilities
Mobile Application Security
Network security
Mobile security
Application Security
API Testing and Hacking (1).pdf
Wireless and mobile security
Penetration testing reporting and methodology
Network security
Wireless Hacking
Packet sniffing
Application security
Vulnerabilities in modern web applications
Application Security | Application Security Tutorial | Cyber Security Certifi...
12 types of DDoS attacks

Viewers also liked (20)

PPTX
Hacking Mobile Apps
PDF
Hacking Android OS
PDF
Android Hacking
PDF
Growth Hacking For Mobile - Hack 2 Validate & Hack 2 Grow
PDF
The art of android hacking
PPTX
Hacking ppt
PPTX
Hacking & its types
PPT
Computer&Internet Safety Digital Story
PPTX
Digital Etiquette vhardy
PPTX
Being Smart In Cyber Space
PPT
Malware
PPT
Stay safe online
PPSX
Cyber Crime: Stay Safe Online
PPTX
Big data ... for security
PDF
Discovering Google Secrets
PPTX
App Store Optimization Basics - Ola k ASO en Congreso SEOparaSEOs 2013
PPTX
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
PPTX
password cracking and Key logger
PDF
SECQME Watch Over Me Deck 2014
PDF
Big data and cyber security legal risks and challenges
Hacking Mobile Apps
Hacking Android OS
Android Hacking
Growth Hacking For Mobile - Hack 2 Validate & Hack 2 Grow
The art of android hacking
Hacking ppt
Hacking & its types
Computer&Internet Safety Digital Story
Digital Etiquette vhardy
Being Smart In Cyber Space
Malware
Stay safe online
Cyber Crime: Stay Safe Online
Big data ... for security
Discovering Google Secrets
App Store Optimization Basics - Ola k ASO en Congreso SEOparaSEOs 2013
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
password cracking and Key logger
SECQME Watch Over Me Deck 2014
Big data and cyber security legal risks and challenges

Similar to Mobile phone Data Hacking (20)

PPTX
Introduction to Mobile Forensics Part 1.pptx
PPTX
128-ch2.pptx
PDF
CNIT 128 Ch 2: Hacking the cellular network
PDF
Les 10 risques liés aux applications mobiles
PPTX
PDF
SS7 Vulnerabilities
PDF
Mobile Banking Channel Security - Cyber Security Conference 2011
PPTX
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
PDF
Info security - mobile approach
PDF
Smart Bombs: Mobile Vulnerability and Exploitation
PDF
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
PPTX
Investigation and Analysis of Digital Evidence
PDF
CNIT 128 Ch 1: The mobile risk ecosystem
PPTX
Basics of Mobile COmmunication.pptx
PPTX
Mobile Networks Overview (2G / 3G / 4G-LTE)
PPT
The Consumerisation of Corporate IT
PDF
2015.11.06. Luca Melette_Mobile threats evolution
PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
PDF
2012 12-04 --ncc_group_-_mobile_threat_war_room
PPTX
Bh 2014
Introduction to Mobile Forensics Part 1.pptx
128-ch2.pptx
CNIT 128 Ch 2: Hacking the cellular network
Les 10 risques liés aux applications mobiles
SS7 Vulnerabilities
Mobile Banking Channel Security - Cyber Security Conference 2011
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Info security - mobile approach
Smart Bombs: Mobile Vulnerability and Exploitation
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
Investigation and Analysis of Digital Evidence
CNIT 128 Ch 1: The mobile risk ecosystem
Basics of Mobile COmmunication.pptx
Mobile Networks Overview (2G / 3G / 4G-LTE)
The Consumerisation of Corporate IT
2015.11.06. Luca Melette_Mobile threats evolution
ISACA CACS 2012 - Mobile Device Security and Privacy
2012 12-04 --ncc_group_-_mobile_threat_war_room
Bh 2014

Mobile phone Data Hacking