ArticlePDF Available

Ethical Hacking on Mobile Devices: Considerations and practical uses

Authors:

Abstract and Figures

The improvement of computer security begins with the need to know the existing risks, analyze their incidence and define the mechanisms that allow their correction later. In this initial phase of analysis is where ethical hacking is a fundamental component for the process of evolution of companies from simple functionality to the security of their systems. This article reflects a preliminary analysis of the concepts and characteristics that make up a mobile device, the different risks to which they are exposed and the vulnerabilities that must be known in order to perform an ethical hacking. The present work is divided into three parts, starting with the introduction where the users and the environment are discussed, the risks arising from the use of these devices are analyzed, and a SWOT matrix is elaborated which describes the management of security in mobile environments The second session deals with aspects such as specifications, mobile security, vulnerability penetration and security model; already in the third part, the topic of ethical hacking in Smartphone and the different non-intrusive techniques, as well as the scanning tools, are deepened to finally perform attack tests in the system.
Content may be subject to copyright.
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 23 (2018) pp. 16637-16647
© Research India Publications. http://www.ripublication.com
16637
Ethical Hacking on Mobile Devices: Considerations and practical uses.
Miguel Hernández1, Luis Baquero1, Celio Gil1 and Carlos A. Salamanca1
1 Fundación Universitaria Los Libertadores, Bogotá D.C., Colombia
Abstract
The improvement of computer security begins with the need to
know the existing risks, analyze their incidence and define the
mechanisms that allow their correction later. In this initial
phase of analysis is where ethical hacking is a fundamental
component for the process of evolution of companies from
simple functionality to the security of their systems.
This article reflects a preliminary analysis of the concepts and
characteristics that make up a mobile device, the different risks
to which they are exposed and the vulnerabilities that must be
known in order to perform an ethical hacking.
The present work is divided into three parts, starting with the
introduction where the users and the environment are
discussed, the risks arising from the use of these devices are
analyzed, and a SWOT matrix is elaborated which describes the
management of security in mobile environments The second
session deals with aspects such as specifications, mobile
security, vulnerability penetration and security model; already
in the third part, the topic of ethical hacking in Smartphone and
the different non-intrusive techniques, as well as the scanning
tools, are deepened to finally perform attack tests in the system.
Keywords: Ethical hacking, Informatic security, mobile
devices, threats, vulnerabilities.
1. INTRODUCTION
An intelligent mobile device allows the development of
mobility and the development of simultaneous tasks fulfilling
the concept of "computing anywhere or at any time" [1].
With technological innovation, mobile phones have a great
evolution which creates a great demand and leads to develop
more functionalities and more similar characteristics to a
computer, making work more efficient in everyday life [1].
The traditional telephone happened to connect to a telephony
network and was called Smartphone, the constant demand of
these devices has made them are in continuous growth, making
that there is a large number of users. They are used to store
confidential information, managing the daily agenda, browsing
the internet, saving photographs, making videos, creating
personal or professional documents and executing financial
operations [2].
As a result of all these features, the Smartphone has become an
indispensable tool to perform a large number of tasks as you
can see the growth that is reflected in Figure 1.
Figure 1. Distributed Units 200-2016 [1]
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 23 (2018) pp. 16637-16647
© Research India Publications. http://www.ripublication.com
16638
From the massive use of these devices both personally and in
the workplace, has increased the potential for insecurity which
has led to conduct studies related to this situation. The security
of the information is essential due to the boom of these devices,
since consumerism brings a technological era where there is a
high dependence on this type of devices. Because the
information opens all the doors and creates a spectrum of
uncertainty, leaving the security in the hands of users, which is
totally null and there is a high index of vulnerability running
the risk that your information is extracted [2].
As can be seen in the comparative table described in Table 1,
many of the security incidents that telephones have originate
from the process of integration of hardware standards and
multiple wireless technologies [3] [4].
You can also find problems such as viruses, complex programs
or the loss or theft of the phone, therefore companies in their
eagerness to create better phones focus on the development of
features without validating the differences between the
software and the hardware. On the one hand, a large gap in
security features. Statistics show that only 20% of users use any
application or have a policy that relates to security [5].
Because the mobile security area is very extensive, Table 2
describes a SWOT analysis in mobile environments:
Table 1. Comparison of security incidents [3][4]
INCIDENT
MOBILE
DESKTOP
1. Unauthorized access
Stealing information, making calls, sending
messages, stealing passwords and stealing
contacts
Theft of information, access to applications, theft
of passwords
2. Equipment abuse
Theft of minutes, Internet theft (data).
Use the machine as an attacker (distributed
attacks).
3. Computer viruses
Information theft, denial of cellular service,
malfunction.
Information theft, denial of service, malfunction.
4. Deletion of information
Perdida de datos y contactos
Perdida de datos, contraseñas y programas
instalados.
5. Theft of equipment
Theft or loss of data, misuse of telephony and
internet.
Lost or stolen data.
6. Viruses, trojans, spyware
Theft of contacts, data, equipment malfunction,
denial of telephone service
Data theft, passwords, sessions, computer
malfunction.
7. Denial of service
You can not receive or send notifications,
messages or calls
It does not respond to requests, without the
availability of critical servers.
8. Sniffers
They can steal data, passwords, sessions,
contacts, text messages.
They can steal data or sessions.
9. Frauds
Theft of information, credit cards, cash.
Theft of information, credit cards, cash.
10. Spam
Denial of service during synchronization with
email.
Denial of service due to hard disk saturation.
Table 2. SWOT analysis in mobile environments [6]
Strengths
Weaknesses
Good security design in mobile phones.
Increased concern of manufacturers in mobile security.Aplicación de
seguridad en el Market.
Secure remote access.
Companies bet more on the use of mobile applications.
Little culture of user safety.
There are no restrictive policies for installing external applications.
There are several different mobile operating systems and there is no
standard in mobile security.
Use of many third-party applications.
Opportunities
Threats
Increase of mobile technologies with the handling of sensitive
information.
Increase in the use of internet on the cell phone.
Development of antivirus for mobile devices.
Development of policies and correct use of mobile devices.
Extension of communication technologies.
Start of the era of malware to mobile devices.
Use of mobile applications are increasing more and more.
Volatility of data in mobile environments.
The vulnerabilities that wireless technologies still have.
Bad handling of permissions in applications.
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 23 (2018) pp. 16637-16647
© Research India Publications. http://www.ripublication.com
16639
Table 3. Comparative chart of kernel in mobile operating systems [7]
Android
BlackBerry Os 4.7
iPphone OS
3.0
S60 5th Edition
Palm WebOS
Windows Mobile
6.5
Linux with virtual
machine
Dalvik
Owner
OS X
Symbian
Linux
Windows CE
3G Wifi, GSM,
GPRS
3G, GSM, CDMA,
WiFi
3G, GSM,
WifI
3G, GSM.
CDMA, WiFi
3G, GSM.
CDMA, WiFi
3G, GSM, CDMA,
WiFi
As you can see in this analysis, there are a lot of strengths
(security designs in the OS), but the threats are increasing every
day and the lack of security policies means that one of the
objectives of this article is that users become familiar with the
concept of hacking on mobile devices [6].
The kernel in the operating systems is the main core and is
responsible for facilitating secure access to mobile programs
and is responsible for managing resources through the system
call services, as described in table 3.
In a free distribution kernel such as the Linux operating system,
there is a wide range of developers, which is an advantage
because security and bug issues can be detected, improvements
made, and these vulnerabilities adapted to the new changes. In
a closed system it is much more expensive to find the errors,
since the developers have greater restrictions and the detection
process is much more delayed, increasing the times and costs
to find the vulnerabilities.
2. SPECIFICATIONS
2.1 Mobile devices
Smart mobile devices are those that have the functionalities of
mobile phones and digital assistants:
A mobile device can be defined with some processing
capabilities, with permanent or intermittent connection to a
network, with limited memory, which has been designed
specifically for a function, but which can carry out more
general ones. According to this definition there are many
mobile devices, from portable audio players to GPS navigators,
through mobile phones, PDAs or Tablet PCs [7].
For the wide variety of devices that are on the market there are
also several features that meet the needs of users especially in
hardware such as touch and LCD screens [8], the camera that
goes from the 2.0 Megapixels, memories internal as removable,
the performance of the battery.
2.2 Components that affect mobile security
In the hacking environment you must handle the concept of
being a hacker, then know the types of hackers that there are
and finally know that it is an ethical hacking.
The Royal Spanish Academy defines the term hacker as [1] [9]:
m. y f. Inform. Hacker.
m. y f. Inform. Person with great knowledge of
computer science that is dedicated to illegally
accessing foreign computer systems and manipulating
them.
It can be concluded that hackers are professionals who are
known to move in the computer world playing the role of a
scammer who tries to compromise a system to steal digital
information or can be a professional who helps defend the
system from these attacks.
There are several types of hacker, the white hat is the ethical
professional who focuses on protecting and ensuring
information and communication systems. The black hat is the
villain unethical very different from the hero who is interested
only in entering and take all the information and the gray hat
has all the skills of the white hat hacker but the knowledge he
has uses to know how he can make fun security with the
thoughts of the black hacker and do their own procedures [10].
2.3 Vulnerability penetration
Pentest: (Penetration Test Assesment), this test is used a lot to
perform ethical hacking, penetration tests are performed on the
systems, bypassing all access controls. Threat tests are
performed to have a full knowledge of the risk.
When a penetration test is carried out, the main objective is to
be able to enter the system, achieving full control of the
privileges as an administrator and thus control all the resources
of the system and the network.
This analysis is very important to review the vulnerabilities that
can be exploited by attackers and allows companies to take
measures to improve these weaknesses [10].
2.4 Mobile Security
Every day mobile devices become an indispensable tool in
daily life, every time more applications are developed, that's
why security and privacy mechanisms are constantly being
improved for the wireless world, having well-defined aspects
such as authorization, authentication and reliability [11].
2.5 Security model
A mobile device by its design and functionality are low power
optimizing power consumption, are also limited in their storage
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 23 (2018) pp. 16637-16647
© Research India Publications. http://www.ripublication.com
16640
and restricted to handle large amounts of data such as virus
databases. A mobile device has several ways of connecting via
Wifi, Bluetooth and the GSM, 3G and 4G networks, from here
the principle of confidentiality and data integrity [12].
The most important threats to enter phones start with malware
or Trojans, these malicious programs hide inside good
programs, stealing information and running automatically to
other devices [13].
2.6 Weaknesses and security
Mobile security is unique and very different from the security
of wired networks, since mobile signals are transmitted by not
so powerful wireless means and carries a special handling in
security, therefore the mobile environment must be reinforced
when they are used security solutions used in the network to
provide confidentiality, integrity, authentication and that is not
rejection of the device in mobile wireless parameters [14].
2.6.1 Wireless Transmission
Signaling traffic is referred to as the transmission of data over
a cellular network complying with the principles of
confidentiality of: traffic, signaling and user authentication,
these principles must be met within the anonymity of the user's
identity. The traffic must be encrypted in coding systems such
as CDMA2000, UMTS, GPRS, GSM and must be used in
encrypted user traffic to achieve end-to-end security [15].
2.6.2 Seguridad 802.11
More and more devices are connected to the Wi-Fi network and
security issues became an important issue when discovering a
large number of vulnerabilities in the WAP and WAP2 WEP
standards. These risks include unauthorized access, denial of
DoS service and wiretapping [16].
2.6.3 Bluetooth security
It is a wireless technology that connects devices that are at close
range and is used to transmit files between devices that have
this technology, one of the security problems is the
confidentiality of data [17].
The use of the PIN number has security problems when the
exchange of keys is presented. A PIN can be between 8 and 128
bits and can come by default on the device or the user can select
one. When an attacker obtains the PIN code it is easier for him
to obtain the initialization key and the link key, compromising
the communication of the two devices [18].
The most known attacks through this technology are:
Bluesnarfing, Bluebuggin and Bluejacking [14]. You can also
perform brute force attacks and thus obtain the MAC address
of the devices that are not in detectable mode within the
network, two of the programs that help carry out this process
are Red Fang and Blue Sniff [19].
Another way is through the so-called backdoor attack where the
attacker has a trusted key that is established in the exchange of
keys where the victim device has silent remote access
controlling the device and managing to download data such as
calendars, photos, emails and everything related to personal
data [19].
A sound recommendation is to have programs developed by
trusted suppliers that comply with ethical standards and that are
certified with digital signatures and that the user can reject
those that do not comply with the standard [20].
2.6.4 Infection modes
Through mobile devices, there are many routes of infection in
which a virus can be distributed, among the most frequent we
have:
Text messages and multimedia messages are a means of easy
propagation of malicious software. A bot installed on a mobile
phone can send infected messages to all contacts, an example
of this type is commwarrior [21].
The IM IM (Facebook Messenger, Skype, WhatsApp,
Hangouts), sends links to contacts to direct them to malicious
sites and with only access to the IP is contaminated.
2.6.5 Threats and attacks
The first threat with a high rate is the loss or theft of mobile
devices, each year hundreds of phones are within this great
indicator. This factor is probably the biggest threat. Channel
espionage can capture the messages that are transmitted over
the network without being detected, it can mask the identity of
the attacked person by impersonating the device.
In the attacks of man in the middle, the attacker intercepts the
messages between two media and modifies them. Another type
of very common attack is denial of service, where the attacker
accesses from a point or mobile station in order to generate a
lot of network traffic towards the attacked device.
In unauthorized access, the attacker can use radio equipment or
programs to access unsecured networks, which in many cases
are corporate wireless networks open to unauthorized users.
Viruses and Spam, are small programs that spread on the
network among users and that have become a big problem [17].
2.6.6 Mobile antivirus
The term antivirus no longer covers traditional malicious files
but transcends malware, keyloggers and the challenging
rasomwares. At present, mobile devices do not have an
antivirus installed by default, since they are very limited and,
in addition, they are powered by a database that must be
permanently updated; reasons why antivirus companies had to
update their methodologies to identify these threats using
artificial intelligence because they would not only be
developing an antivirus, but more robust programs based on
behavior.
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 23 (2018) pp. 16637-16647
© Research India Publications. http://www.ripublication.com
16641
Among the most used techniques in the analysis of malicious
files, are the following: heuristic classification, redundant
exploration, integrity checkers, behavior blockers, agent based
simulation and data mining [17].
3. ETHICAL HACKING IN SMARTPHONES
It is important to emphasize that the pentester or hacker must
have a good knowledge about technology to be able to carry
out an ethical hacking, for which they must define a
methodology that allows to take an order in the execution of the
test and optimize the time in the execution phase [22].
Figure 2 shows the cycles of ethical hacking, in this
methodology the different phases and tests are observed in an
environment mounted with mobile devices.
Figure 2. Phases of an Ethical Hacking [22]
3.1 Footprint Review
Footprint review is the process where the hacker develops a
map that can be networks, systems or company. From here it
will begin to collect all the information of the victim
determining the objective as a system and the application that
wants to attack.
The hacker arrives at the assembly of the map from non-
intrusive methods, making use of social engineering from the
website and telephone directories of the company, through this
technique allows to discover initial information and build a map
of the range of the network.
3.1.1 Information retrieval
This stage begins with a search through the Google search
engine in order to investigate the name and if it is a company
through the DNS, know the IP address of the server and collect
the information.
Some examples of the filter of this search are:
Search ads or press job offers in the systems
department, because here you can find clues about the
infrastructure they have or databases they use. For
example, if you are looking for a webmaster who
manages Apache, you would already know which web
server they use.
With the Who is command you can obtain information
on the name of the company that owns the domain,
address and telephones of the administrator, as well as
knowing the assigned IP ranges since many
companies do not pay for the information privacy
service.
In social networks such as Facebook, LinkedIn and
Twitter, it handles important information for hackers
and best of all that is free and can be used in a social
engineering attack.
Information retrieval (dumpuster diving), is a very
useful method that allows to find keys in the pos-it that
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 23 (2018) pp. 16637-16647
© Research India Publications. http://www.ripublication.com
16642
users throw away, where the recycling paper contains
information relevant to the company.
You can find many tools to perform a deep
recognition, but the most important is to make a
footprinting with a command line and a browser.
In the following example, the search is performed on a Nmap
Scanner page, a site managed by Fyodor where recognition and
scanning tests can only be performed.
Figure 3. Simple Footprinting
Figure 4. DNS resolution with NSLOOKUP in Windows.
As Seen in figure 3, the search yields almost eleven thousand
results but the one that is needed is located first, to optimize the
search you can use the google bookmarks (+, -, "", and many
more). Knowing the main site of the victim, a DNS query is
performed to identify the IP address. Pinging the victim's site
verifies that he is active and knows his IP address.
Ping scanme.nmap.org
Haciendo ping a scanme.nmap.org [45.33.32.156] con 32
bytes de datos:
Estadísticas de ping para 45.33.32.156
Then the NSLOOKUP command is used, which allows to know
if the DNS server is resolving the names in a correct way.
In the query made in Figure 4, it can be analyzed that the site
has two IPV 6 and IPV 4 addresses, where the IPV 4 address is
of class A since the first octet is 74 bits, so the range of the Host
to analyze would be very large and would take a long time.
Set type = [NS | MX | ALL]
Permite establecer el tipo de consulta, NS servicio de
Nombres, MX servicio de correo (mail exchanger) y ALL para
mostrar todo [22].
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 23 (2018) pp. 16637-16647
© Research India Publications. http://www.ripublication.com
16643
Figure 5. Nslookup: Set type=NS and Set type=MX
Figure 6. Nslookup set type=All
In Figure 5, the information in the NS query can be analyzed
with respect to the name servers for the domain in which the target is hosted and in the MX query information is observed
about who the mail servers are for that domain.
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 23 (2018) pp. 16637-16647
© Research India Publications. http://www.ripublication.com
16644
The option ALL obtains combined information from the two
previous consultations where you can see important
information such as: nmap.org is hosted in an external hosting
provided by Linode and the mail service is with the server
mail.titan.net which is in a network segment other than the
scanme.nmap.org server. Also, the Who is tool can help
corroborate and expand contact information.
Information related to 'xx.xxx.xxx.x - xx.xxx.xxx.xxx'
netname: H0STING
descr: Main Hosting Servers
remarks: Abuse contact: *****Qmain-hosting.com
country: US
person: MAIN HOSTING HOSTMASTER
address: 100 Technology Drive
address: Asheville, NC
Phone: +38068545152
With this query you can see the names of contacts, phones and
emails, a positive point for the hacker giving him the possibility
of social engineering, so it is worrisome that this information is
disclosed in a public database.
Figure 7. Scanner Inalámbrico Network Analyzer
3.2 Scanning
To start this stage it is important that the attacker enters the
network, to enter the network freely, you will need the help of
a tool such as a wireless network analyzer, scan the networks
nearby, you can measure the power, the encryption of each
network and the MAC of the router.
In Figure 7, the different networks are shown with the Network
Analyzer; the main objective is to break the key and for this
there are many ways, such as using programs such as HHG5XX
WEP, Wifislax, where from these applications a search is made
and the network to be entered is chosen, these programs begin
to Run your algorithm to get the entry key, on the other hand,
Wifislax is very good at finding these keys. Other programs
could be Aircrack, Airmon and AirPlay, in case the network is
configured in a very secure way.
The scanning procedure consists of the following stages:
System status: After making the fingerprint review,
several devices are found, now we must determine
which host are alive in the network. A ping is made to
all the machines that are in the network. You can
perform an ICMP ping or a TCP ping. A carelessness
in this phase can cause the hacker to be discovered by
the technology staff and result in an ACL list blocking
the IP causing delays and ruining the surprise factor
[23].
With the fping tool a scan is performed and a mobile
device is found with the IP 192.168.1.101, this is
active and is the only connected host for the moment.
$ Fping -g 192.168.1.0/24
192.168.1.101 is alive
You can also use other simple tools such as ping-
sweepers. The ping sweepers define a range of IP's
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 23 (2018) pp. 16637-16647
© Research India Publications. http://www.ripublication.com
16645
using the ICMP protocol sending echo requests and
the host that responds to the request are marked as
active.
If the ping lock is definitely found, a port scanner or a
TCP-Ping tool can be used [24].
Port review:
The Nmap tool is executed to scan active ports where
you can see that of the 1000 ports that were tested only
port 2222 is running.
nmap -T4 -A -v -Pn 192.168.1.101
Scanning 192.168.1.101 [1000 ports]
Discovered open port 2222/tcp on 192.168.1.101
Identification of services:
In the annexed table of Zenmap, the device is searched
and it is seen that port 2222 discovered is assigned to
the SSH service [24].
PORT STATE SERVICE VERSIÓN
2222/tcp open ssh Dropbear sshd 0.52 (protocol 2.0)
TCP Sequence Prediction: Difficulty=198 (Good
luck!)
The identification of Bluetooth services is done
through the Blue Diving program that works on the
Linux platform and at the moment of executing it it
shows the active bluetooth services in the device [25].
From the menu of the tool, option 3 Scan and Info is
selected, where it displays the list with the devices it
finds, this option is selected and it begins to do the
recognition.
Start scanning for Bluetooth devices...
Found host LG-P500h
addr 74:A7:22:B4:EC:A3 class 0x5a020c unkown
Service Ñame: Headset Gateway Ch: 1
Service Ñame: Handsfree Gateway Ch: 2
Service Ñame: Object Push Ch: 3
Service Ñame: BRCM Advanced Audio
Service Ñame: OBEX File Transíer Ch: 4
Information ...
BD Address: 74:A7:22:B4:EC:A3
Device Ñame: LG-P500h
LMP Versión: 2.1 (0x4) LMP Subversión: 0x8107
Manufacturer: Broadcom Corporation (15)
Features pagé0:0xbf Oxfe 0x8f Oxfe 0x9b Oxff 0x79
0x83
Traces of the operating system:
The Nmap tool is run again to find out which operating
system the device has and throws the following
information.
nmap -0 192.168.1.101
Running: Linux 2.6.X
OS details: Linux 2.6.13 - 2.6.31
OS detection performed.
Vulnerability scan:
Vulnerability scanning can be performed with the
Nessus tool pointing to the IP address of the
Smartphone, the report shows a list with a high
vulnerability and eight casualties.
Table 4. Report vulnerabilities found in the mobile.
No.
Importance
Vulnerability
1
High
Nessus Scan Information
2
Low
Multiple Ethernet Driver Frame appending Information Discloksure (Etherleask)
3
Low
ICMP Timestamp Request Remote Date Disclosure.
4
Low
TCP/IP Timestamps Supported
5
Low
OS Identification
6
Low
Common Platform Enumeration (CPE)
7
Low
Traceroute Information
8
Low
Port SSH (222/TCP) Service Detection
9
Low
SSH Server Type and Version Information
.
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 23 (2018) pp. 16637-16647
© Research India Publications. http://www.ripublication.com
16646
3.3 Enumeration
3.3.1 Null Sessions
The enumeration is a scanning subphase and is based on
collecting the greatest amount of information from the victim,
taking advantage of a weakness in one or more of the protocols
or services that are active [26].
Sessions are reviewed running Net Use, but it generates an error
where the domain controller does not respond with the
following message.
C:\>net use \\192.168.1.10l\IPC$ ">""> /u:">"">
System error 67 has occurred.
The network name cannot be found.
3.3.2 List resources
In this test you can also find errors such as:
C:\>neí view \\192.168.1.101
System error 53 has occurred. The network path was not found.
Como el mensaje no se difundio por que Windows no proceso
correctamente la instrucción que se envía y no la difunde en los
equipos de trabajo.
Se realiza un Nbstat y no responde por que el sistema operativo
Android no enumera la tabla del NetBIOS:
C:\>nbtstat -A 192.168.1.101
Wireless Network Connection: Node IPaddress:
[192.168.1.102] Scope Id:
[] Host not found.
3.3.3 Enumeration SNMP
To perform the enumeration SNMP is executed from
SNMPCheck, which makes a tour and shows the resources of
the system, the connection does it correctly and generates an
error because it does not find a response from the remote host
[26].
root@bt:# ./snmpcheck-1.8.pl -t 192.168.1.101
O ) Try to connect to 192.168.1.101
(*) Connected to 192.168.1.101
(*) Starting enumeration at 2011-11-27 01:58:00
(*) Error: No response from remote host '192.168.1.101'.
3.4 Access
3.4.1 Rupture of passwords
A scan is made on the network with the Wireshark sniffer from
where the login password to the social network Facebook is
obtained when analyzing the contents of the package.
Using the medusa tool on the victim device pointing to the SSH
and a key dictionary it was possible to obtain a valid user to
perform the session with the phone.
root@bt: medusa -h 192.168.1.101 -u root -P passwords.txt -M
ssh -n 2222
ACCOUNT CHECK: [ssh] Host: 192.168.1.101 (1 of 1, 0
complete)
User: administrator (1 of 1, 0 complete) Password: admin (1 of
5 complete
ACCOUNT F0UND: [ssh] Host: 192.168.1.101
User: root Password: admin [SUCCESS]
3.4.2 Session hijacking
Once the connection information to the device is known, the
putty tool is executed, which allows remote connection through
the port that is open.
Putty is opened and the IP address of the telephone
192.168.1.101 is placed, it is configured to open SSH session
on port 2222, user XXXXX and password XXXX previously
obtained in jellyfish are placed and with this information the
hacker is already inside The phone shell ready to steal
information.
3.4.3 Clear evidence
The evidence can be deleted from the phone's log in a very easy
way with the command of Linux RM and thus not leave any
trace.
4 CONCLUSIONS
Ethical hacking is a tool for data protection and prevention. Due
to the proliferation of mobile devices, tablets and smartphones
and the large number of applications, the phenomenon of
computer insecurity has increased considerably and therefore
these are highly vulnerable, because of the above, what is
intended with this article is to be constantly ahead of those who
try to attack us by doing their own tests and attacks with the
help of computer experts.
A new device is not that it is so remotely vulnerable, if the user
makes an adequate handling of the phone without connecting
to insecure networks, much less entering passwords on sites
that do not handle encryption security that make the device an
attack target for the attacker can steal information, however the
beginning of the attacks is due to the bad manipulation of the
user, nor does it serve to have port blocking by default or the
deletion of permissions to install unknown applications if the
user gives permissions without reading or having knowledge of
what is which is installing making the phone's security
vulnerable.
For this reason an ethical hacker makes 'pentests' or penetration
tests, these tests are composed of a set of methodologies and
techniques. These methodologies and techniques reproduce
access attempts from different points of entry of a computer
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 23 (2018) pp. 16637-16647
© Research India Publications. http://www.ripublication.com
16647
environment, the primary objective is to find vulnerabilities in
order to circumvent the security of the system by escalating
privileges, finding errors and bad configurations, for which it
uses both his knowledge in computer science as a wide range
of tools, and in this way, pass a report so that measures are
taken and thus reduce the risk in an organization.
REFERENCES
[1] Alvarez del Vayo Fernando, “Cómo ha cambiado la
venta de smartphones en los últimos años,” 2017.
[2] W. Steven and T. Jaramillo, “Identificación De Los
Ataques Más Realizados En Un Sitio Concurrido Por
Personas Que Utilizan Sus Dispositivos Móviles Y
Determinación De Las Vulnerabilidades Más Comunes
En El Sistema Operativo Android.,” 2016.
[3] F. Edition, Security in Computing, FIFTH EDIT. .
[4] D. Y. Londoño Arenas and J. F. Hurtado Rivera,
“Esquema de seguridad para protección de dispositivos
móviles con el sistema operativo android,” 2014.
[5] “Security of Smart Phones,” no. June, 2006.
[6] “Seguridad de Dispositivos Móviles Ataque, Defensa y
Prevención.”
[7] A. B. Alonso, I. F. Artime, M. Á. Rodríguez, R. G.
Baniello, and E. P. S. I. G. I. De Telecomunicación,
“Dispositivos móviles.”
[8] Riza Luiza, “Smartphones: Hardware,” Smartphones:
Hardware, 2011. [Online]. Available:
http://ezinearticles.com/?Smartphones:-
Hardware&id=5843735. [Accessed: 27-Apr-2018].
[9] Real Academia Española, “DLE: hacker - Diccionario
de la lengua española - Edición del Tricentenario,” 23
edición, 2014. [Online]. Available:
http://dle.rae.es/?id=JxlUKkm. [Accessed: 29-Apr-
2018].
[10] J. D. Demott, A. Sotirov, and J. Long, Gray Hat
Hacking , Third Edition Reviews. 2011.
[11] S. E. Pacheco Veliz and C. D. Piazza Orlando, “Estudio
y análisis de seguridad en dispositivos móviles. BYOD
y su impacto en las organizaciones,” p. 139, 2016.
[12] “High-Speed Mobile Networks.pdf.” .
[13] Craig Heath, Symbian OS Platform Security: Software
Development Using the Symbian OS Security
Architecture. 2006.
[14] L. Rondeau and D. Hopkins, “Mobile Device
Vulnerabilities & Securities,” Mob. Device
Vulnerabilities Secur., pp. 3035, 2014.
[15] GSMA, “GSM - About Us.” [Online]. Available:
https://www.gsma.com/aboutus/gsm-technology/gsm.
[Accessed: 27-Apr-2018].
[16] 802.11p, IEEE Standard for information technology --
Amendment 6: wireless access in vehicular
environments. 2010.
[17] D. Shih, B. Lin, H. Chiang, and M. Shih, “Security
aspects of mobile phone virus: a critical survey,”
Industrial Management & Data Systems, vol. 108, no.
4. pp. 478494, 2008.
[18] H. Rifa, J. Ruiz, and J. Rivas, Análisis forense de
sistemas informáticos. 2013.
[19] “White paper on Mobile OS and efforts towards open
standards By Dotcom Infoway White paper on Mobile
OS and efforts towards open standards,” Main.
[20] S. Standing and C. Standing, “Mobile technology and
healthcare: the adoption issues and systemic
problems.,” Int. J. Electron. Healthc., vol. 4, no. 34,
pp. 221235, 2008.
[21] J. A. Morales, P. J. Clarke, Y. Deng, and B. M. Golam
Kibria, “Testing and evaluating virus detectors for
handheld devices,” J. Comput. Virol., vol. 2, no. 2, pp.
135147, 2006.
[22] K. Astudillo B., “Hacking Ético 101,” CCNA Secur.,
vol. 1, pp. 1292, 2008.
[23] C. Tori, “Hacking Etico,” vol. 1, p. 334, 2008.
[24] V. R. G. Ávila, “Diseño e implementación de un
sistema de monitoreo basado en SNMP para la Red
Nacional Académica de Tecnología Avanzada.,” p. 86,
2014.
[25] P. Arnedo, Blanco, “Herramientas de análisis forense y
su aplicabilidad en la investigación de delitos
informáticos,” Univ. Int. la Rioja, pp. 191, 2014.
[26] “Ataques MITM,” 2012.
[27] Comisión de Regulación de Comunicaciones CRC,
“Identificación de las posibles acciones regulatorias a
implementar en materia de Ciberseguridad Documento
de análisis y consulta,” pp. 1–65, 2015.
... The administration, the private sector, and the daily computer customer are worried about their knowledge or private data being contained by a malicious hacker because of the Internet's propelling innovation [2].A smart mobile interface enables mobility to be developed and simultaneous activities to be developed to satisfy the idea of "computing anywhere or at any time" The relentless demand for these devices from smartphones has made them grow constantly, making a vast number of users available. They are used to store sensitive records, maintain the daily schedule, search the internet, save photos, create photographs, create personal or technical documents, and carry out financial operations [3].Cybersecurity is an increasingly advancing science that has been constantly in the headlines for the last decade, as the danger grows and cyber offenders continuously attempt to keep a step ahead of the authorization of the law [4]. ...
... It is important to stress that to be able to conduct ethical hacking the pen tester or hacker must have a strong understanding of technology [3]. A hacker is exceptionally effective in taking data from the system to which he is illegal, such as financial details, human information, money-dependent data, credit card data, username & password. ...
Article
Full-text available
Cyber threats will arrive from many angles as new technologies are being ingrained in many facets of life. Business associations relocate a larger amount of their fundamental skills to the Internet, offenders have a greater ability and driving power across the online application to access sensitive data. The Public Network is the world's most popular and fastest alternative for spreading attacks all over the world. Malicious hacking has earned hacking a poor reputation over the years, but hacking was not meant to be an illegal operation from the outset. It could also be ethical, lawful and appropriate, while hacking could be malicious. Hacking is a method that is pursued to identify the system's flaws or holes for self-profit or pleasure. Most hackers steal data to ruin the credibility and development of companies in the industry. We have an ethical hacking process to protect our networks against attack. It is the act of using hacking methods, expertise and tools to uncover bugs and locate knowledge loopholes. Ethical hackers are those certified persons who work legitimately. This article discusses ethical hacking, various forms of hackers, and the hacking stages that ethical hackers pursue to protect a network or system.
... The time and date may help attackers to defeat time-based authentication schemes. Again, this vulnerability is given a low risk designation because it is used for data gathering as opposed to harming a system [15]. ...
... Therefore, it is required to block ICMP on the affected host using iptables, and/or block it at the firewall. To block ICMP packets, add two iptable (Linux firewall) rules to the input and output chains of the firewall as follows:  Rule-01: iptables -A INPUT -p icmp --icmp-type timestamp-request -j DROP  Rule-02: iptables -A OUTPUT -p icmp --icmp-type timestamp-reply -j DROP The easiest and most effective solution is to configure the firewall to block incoming and outgoing ICMP packets with ICMP types 13 (timestamp request) and 14 (timestamp response) [15] [28] [29]. ...
Conference Paper
Full-text available
A Vulnerability Management system is a disciplined, programmatic approach to discover and mitigate vulnerabilities in a system. While securing systems from data exploitation and theft, Vulnerability Management works as a cyclical practice of identifying, assessing, prioritizing, remediating, and mitigating security weaknesses. In this approach, root cause analysis is conducted to find solutions for the problematic areas in policy, process, and standards including configuration standards. Three major reasons make Vulnerability Assessment and Management a vital part in IT risk management. The reasons are, namely, 1. Persistent Threats - Attacks exploiting security vulnerabilities for financial gain and criminal agendas continue to dominate headlines, 2. Regulations - Many government and industry regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) and Sarbanes-Oxley (SOX), mandate rigorous vulnerability management practices, and 3. Risk Management - Mature organizations treat vulnerability assessment and management as a key risk management component [1]. Thus, as opposed to a reactive and technology-oriented approach, a well-organized and executed Vulnerability Management system is proactive and business-oriented. This research initially collects all the vulnerabilities associated with the Data Analytic Framework Implemented with MongoDB on Linux Containers (LXCs) by using the vulnerability analysis testbed with seven deferent analyzing tools. Thereafter, this research work first prioritizes all the vulnerabilities using “Low”, “Medium”, and “High” according to their severity level. Then, it discovers and analyzes the root cause of fifteen various vulnerabilities with different severities. Finally, according to each of the vulnerability root causes, this research proposes security techniques, to avoid or mitigate those vulnerabilities from the current system.
Article
Full-text available
the objective of the study is to highlight the importance of ethical hacking-As per Jay Bavisi CEO of EC Council Government agencies and business organizations, "In the present globalised-digital era all are in constant touch with ethical hackers to combat the growing threat to IT security". All the concerned stake holders now understand that if you want to protect a system, you cannot do it by just locking your doors. The study adopted exploratory research model based on past literature using information from research journals, reports, news papers and magazine covering wide collections of academic literature on Good and bad about Ethical hacking in Indian Perspective. The study reiterates that in the dawn of international geo political conflicts, terrorist organizational funding, and cyber criminals to breach security systems which compromises nation's security, there is an immediate need to educate the people of the country on this global issue.
Article
Full-text available
The widespread use of personal digital assistants and smartphones gives securing these devices a high priority. Yet little attention has been placed on protecting handheld devices against viruses. Currently available antivirus software for handhelds is few in number. At this stage, the opportunity exists for the evaluation and improvement of current solutions. By pinpointing weaknesses in the current antivirus software, improvements can be made to properly protect these devices from a future tidal wave of viruses. This research evaluates four currently available antivirus solutions for handheld devices. A formal model of virus transformation that provides transformation traceability is presented. Two sets of ten tests each were administered; nine tests from each set involved the modification of source code of two known viruses for handheld devices. The testing techniques used are well established in PC testing; thus the focus of this research is solely on handheld devices. Statistical analysis of the test results show high false negative production rates for the antivirus software and an overall false negative production rate of 47.5% with a 95% confidence interval between 36.6% and 58.4%. This high rate shows that current solutions poorly identify modified versions of a virus. The virus is left undetected and capable of spreading, infecting and causing damage.
Article
Full-text available
Although the benefits that are associated with mobile technology have been recognised as offering great potential in the healthcare sector, its widespread adoption has been lagging. We propose that fundamental systemic issues are likely to be the main barriers to adoption. We explain that the fragmented nature of the conservative healthcare system, the contradictory incentives and improper outcome measures conspire to make the innovative adoption of mobile technology problematic. Researchers can only gain a limited understanding of a technology's potential success by using technology adoption frameworks and need to supplement this with a 'systems' perspective that takes a more strategic view.
Article
Purpose The paper's aim is to provide information about mobile viruses for end‐users or organizations and recommend useful tips of how individuals can protect their mobile phones from the intrusion of mobile phone viruses. Design/methodology/approach This paper surveys chronicle, securities, risks and countermeasure of mobile phone viruses. Findings This paper investigates infection routes, threats, damage, and spreading ways of mobile phone viruses and provides available countermeasures. It also provides useful tips about mobile viruses, indicating what to do and how to do it. Research limitations/implications This research may not be exhaustive about mobile viruses. Practical implications A very useful source of information and impartial advice for end‐users or organizations who are planning to protect their mobile phones and their own privacy. Originality/value This paper is the first to survey the risk of mobile phones and it discusses how organizations or individuals can protect mobile phones from the intrusion of viruses and how to develop their own mobile virus security plan.
Cómo ha cambiado la venta de smartphones en los últimos años
  • Alvarez Del
  • Vayo Fernando
Alvarez del Vayo Fernando, "Cómo ha cambiado la venta de smartphones en los últimos años," 2017.
Identificación De Los Ataques Más Realizados En Un Sitio Concurrido Por Personas Que Utilizan Sus Dispositivos Móviles Y Determinación De Las Vulnerabilidades Más Comunes En El Sistema Operativo Android
  • W Steven
  • T Jaramillo
W. Steven and T. Jaramillo, "Identificación De Los Ataques Más Realizados En Un Sitio Concurrido Por Personas Que Utilizan Sus Dispositivos Móviles Y Determinación De Las Vulnerabilidades Más Comunes En El Sistema Operativo Android.," 2016.
Esquema de seguridad para protección de dispositivos móviles con el sistema operativo android
  • D Y Londoño Arenas
  • J F Hurtado Rivera
D. Y. Londoño Arenas and J. F. Hurtado Rivera, "Esquema de seguridad para protección de dispositivos móviles con el sistema operativo android," 2014.
Dispositivos móviles
  • A B Alonso
  • I F Artime
  • M Á Rodríguez
  • R G Baniello
  • E P S I G I De Telecomunicación
A. B. Alonso, I. F. Artime, M. Á. Rodríguez, R. G. Baniello, and E. P. S. I. G. I. De Telecomunicación, "Dispositivos móviles."
Smartphones: Hardware
  • Riza Luiza
Riza Luiza, "Smartphones: Hardware," Smartphones: Hardware, 2011. [Online]. Available: http://ezinearticles.com/?Smartphones:-Hardware&id=5843735. [Accessed: 27-Apr-2018].
DLE: hacker -Diccionario de la lengua española -Edición del Tricentenario
  • Real Academia Española
Real Academia Española, "DLE: hacker -Diccionario de la lengua española -Edición del Tricentenario," 23 edición, 2014. [Online]. Available: http://dle.rae.es/?id=JxlUKkm. [Accessed: 29-Apr-2018].
Estudio y análisis de seguridad en dispositivos móviles. BYOD y su impacto en las organizaciones
  • S E Pacheco Veliz
  • C D Piazza Orlando
S. E. Pacheco Veliz and C. D. Piazza Orlando, "Estudio y análisis de seguridad en dispositivos móviles. BYOD y su impacto en las organizaciones," p. 139, 2016.