Mobile Security - Quick Guide
Mobile Security - Quick Guide
In this tutorial, we will deal with mobile security concepts mostly from the practical point of view.
Take a look at the following graph, it illustrates the ever-growing number of mobile phone users
across the world, which brings out the importance of mobile security.
The estimated number of mobile devices is around 5.8 billion, which is thought to have grown
exponentially within five years and is supposed to reach nearly 12 billion within four years.
Hence, it will be an average of two mobile devices per person on the planet. This makes us fully
dependent on mobile devices with our sensitive data being transported all over. As a result,
mobile security is one of the most important concepts to take in consideration.
Mobile Security as a concept deals with the protection of our mobile devices from possible
attacks by other mobile devices, or the wireless environment that the device is connected to.
Following are the major threats regarding mobile security −
Loss of mobile device. This is a common issue that can put at risk not only you but even
your contacts by possible phishing.
Application hacking or breaching. This is the second most important issue. Many of us
have downloaded and installed phone applications. Some of them request extra access
or privileges such as access to your location, contact, browsing history for marketing
purposes, but on the other hand, the site provides access to other contacts too. Other
factors of concern are Trojans, viruses, etc.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 1/63
8/12/2021 Mobile Security - Quick Guide
Smartphone theft is a common problem for owners of highly coveted smartphones such
as iPhone or Android devices. The danger of corporate data, such as account
credentials and access to email falling into the hands of a tech thief is a threat.
By definition, an Attack Vector is a method or technique that a hacker uses to gain access to
another computing device or network in order to inject a “bad code” often called payload. This
vector helps hackers to exploit system vulnerabilities. Many of these attack vectors take
advantage of the human element as it is the weakest point of this system. Following is the
schematic representation of the attack vectors process which can be many at the same time
used by a hacker.
Malware
Virus and Rootkit
Application modification
OS modification
Data Exfiltration
Data Loss
Device loss
Unauthorized device access
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 2/63
8/12/2021 Mobile Security - Quick Guide
Application vulnerabilities
Losing your data − If your mobile device has been hacked, or a virus introduced, then
all your stored data is lost and taken by the attacker.
Bad use of your mobile resources − Which means that your network or mobile device
can go in overload so you are unable to access your genuine services. In worse
scenarios, to be used by the hacker to attach another machine or network.
Infecting the device with mobile spyware is performed differently for Android and iOS devices.
Android − Users are tricked to download an app from the market or from a third-party
application generally by using social engineering attack. Remote infection can also be performed
through a Man-in-the-Middle (MitM) attack, where an active adversary intercepts the user’s
mobile communications to inject the malware.
iOS − iOS infection requires physical access to the mobile. Infecting the device can also be
through exploiting a zero-day such as the JailbreakME exploit.
Installing a backdoor
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 3/63
8/12/2021 Mobile Security - Quick Guide
Spyware sends mobile content such as encrypted emails and messages to the attacker servers
in plain text. The spyware does not directly attack the secure container. It grabs the data at the
point where the user pulls up data from the secure container in order to read it. At that stage,
when the content is decrypted for the user’s usage, the spyware takes controls of the content
and sends it on.
In most cases most of us think what can we possibly lose in case our mobile is hacked. The
answer is simple - we will lose our privacy. Our device will become a surveillance system for the
hacker to observer us. Other activities of profit for the hacker is to take our sensitive data, make
payments, carry out illegal activities like DDoS attacks. Following is a schematic representation.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 4/63
8/12/2021 Mobile Security - Quick Guide
This category covers the misuse of a platform feature or the failure to use platform security
controls. It might include Android intents, platform permissions, misuse of TouchID, the
Keychain, or some other security control that is part of the mobile operating system. There are
several ways that mobile apps can experience this risk.
M2-Insecure Data
This new category is a combination of M2 and M4 from Mobile Top Ten 2014. This covers
insecure data storage and unintended data leakage.
M3-Insecure Communication
This covers poor handshaking, incorrect SSL versions, weak negotiation, clear text
communication of sensitive assets, etc.
M4-Insecure Authentication
This category captures the notions of authenticating the end user or bad session management.
This includes −
Failing to identify the user at all when that should be required
Failure to maintain the user's identity when it is required
Weaknesses in session management
M5-Insuficient Cryptography
The code applies cryptography to a sensitive information asset. However, the cryptography is
insufficient in some way. Note that anything and everything related to TLS or SSL goes in M3.
Also, if the app fails to use cryptography at all when it should, that probably belongs in M2. This
category is for issues where cryptography was attempted, but it wasn't done correctly.
M6-Insecure Authorization
This is a category to capture any failures in authorization (e.g., authorization decisions in the
client side, forced browsing, etc.) It is distinct from authentication issues (e.g., device enrolment,
user identification, etc.)
If the app does not authenticate the users at all in a situation where it should (e.g., granting
anonymous access to some resource or service when authenticated and authorized access is
required), then that is an authentication failure not an authorization failure.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 5/63
8/12/2021 Mobile Security - Quick Guide
This was the "Security Decisions Via Untrusted Inputs", one of our lesser-used categories. This
would be the catch-all for code-level implementation problems in the mobile client. That's distinct
from the server-side coding mistakes. This would capture things like buffer overflows, format
string vulnerabilities, and various other code-level mistakes where the solution is to rewrite some
code that's running on the mobile device.
M8-Code Tampering
This category covers binary patching, local resource modification, method hooking, method
swizzling, and dynamic memory modification.
Once the application is delivered to the mobile device, the code and data resources are resident
there. An attacker can either directly modify the code, change the contents of memory
dynamically, change or replace the system APIs that the application uses, or modify the
application's data and resources. This can provide the attacker a direct method of subverting the
intended use of the software for personal or monetary gain.
M9-Reverse Engineering
This category includes analysis of the final core binary to determine its source code, libraries,
algorithms, and other assets. Software such as IDA Pro, Hopper, otool, and other binary
inspection tools give the attacker insight into the inner workings of the application. This may be
used to exploit other nascent vulnerabilities in the application, as well as revealing information
about back-end servers, cryptographic constants and ciphers, and intellectual property.
M10-Extraneous Functionality
Often, developers include hidden backdoor functionality or other internal development security
controls that are not intended to be released into a production environment. For example, a
developer may accidentally include a password as a comment in a hybrid app. Another example
includes disabling of 2-factor authentication during testing.
An authenticated developer of a company creates mobile applications for mobile users. In order
to allow the mobile users to conveniently browse and install these mobile apps, platform vendors
like Google and Apple have created centralized market places, for example, PlayStore (Google)
and AppStore (Apple). Yet there are security concerns.
Usually mobile applications developed by developers are submitted to these market places
without screening or vetting, making them available to thousands of mobile users. If you are
downloading the application from an official app store, then you can trust the application as the
hosting store has vetted it. However, if you are downloading the application from a third-party
app store, then there is a possibility of downloading malware along with the application because
third-party app stores do not vet the apps.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 6/63
8/12/2021 Mobile Security - Quick Guide
The attacker downloads a legitimate game and repackages it with malware and uploads the
mobile apps to a third-party application store from where the end users download this malicious
gaming application, believing it to be genuine. As a result, the malware gathers and sends user
credentials such as call logs/photo/videos/sensitive docs to the attacker without the user's
knowledge.
Using the information gathered, the attacker can exploit the device and launch any other attack.
Attackers can also socially engineer users to download and run apps outside the official apps
stores. Malicious apps can damage other applications and data, sending your sensitive data to
attackers.
Sandbox helps the mobile users by limiting the resources that an application uses in the mobile
device. However, many malicious applications can overpass this allowing the malware to use all
the device processing capabilities and user data.
Secure Sandbox
It is an environment where each application runs its allocated resources and data so the
applications are secure and cannot access other application resources and data.
Vulnerable Sandbox
Take a look at the following screenshot. You might have received a similar SMS which seemed
to be genuine. In fact, after a bit of analysis, we realize it is not genuine. It is an example of SMS
phishing.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 7/63
8/12/2021 Mobile Security - Quick Guide
The links in the SMS may install malware on the user’s device or direct them to a malicious
website, or direct them to call a number set up to trick them into divulging personal and financial
information, such as passwords, account IDs or credit card details. This technique is used a lot
in cybercrimes, as it is far easier to trick someone into clicking a malicious link in the e-mail than
trying to break through a mobile’s defenses. However, some phishing SMS are poorly written
and clearly appear to be fake.
Example 1
Generally, scammers use email to SMS to spoof their real identity. If you google it, you may find
many legitimate resources. You just google search: email to SMS providers.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 8/63
8/12/2021 Mobile Security - Quick Guide
Example 2
The other classical scam is financial fraud which will ask you for PIN, username, password,
credit card details, etc.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 9/63
8/12/2021 Mobile Security - Quick Guide
Example 3
Spelling and bad grammar. Cyber criminals generally make grammar and spelling mistakes
because often they use a dictionary to translate in a specific language. If you notice mistakes in
an SMS, it might be a scam.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 10/63
8/12/2021 Mobile Security - Quick Guide
Example 4
Example 5
Cybercriminals often use threats that your security has been compromised. The above example
proves it well. In the following case, the subject says you have won a gift.
Example 6
In this case, an SMS asks you to reply so that they can verify that your number is valid. This can
increase the number of SMS spams in your number.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 11/63
8/12/2021 Mobile Security - Quick Guide
Example 7
Spoofing popular websites or companies. Scam artists use the name of big organizations that
appear to be connected to legitimate websites but actually it takes you to phony scam sites or
legitimate-looking pop-up windows.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 12/63
8/12/2021 Mobile Security - Quick Guide
Financial companies never ask for personal or financial information, like username,
password, PIN, or credit or debit card numbers via text message.
Smishing scams attempt to create a false sense of urgency by requesting an immediate
response. Keep calm and analyze the SMS.
Don’t open links in unsolicited text messages.
Don’t call a telephone number listed in an unsolicited text message. You should contact
any bank, government, agency, or company identified in the text message using the
information listed in your records or in official webpages.
Don’t respond to smishing messages, even to ask the sender to stop contacting you.
Use caution when providing your mobile number or other information in response to
pop-up advertisements and “free trial” offers.
Verify the identity of the sender and take the time to ask yourself why the sender is
asking for your information.
Be cautious of text messages from unknown senders, as well as unusual text messages
from senders you do know, and keep your security software and applications up to date.
Bluetooth is a similar radio-wave technology, but it is mainly designed to communicate over short
distances, less than about 10m or 30ft. Typically, you might use it to download photos from a
digital camera to a PC, to hook up a wireless mouse to a laptop, to link a hands-free headset to
your cellphone so you can talk and drive safely at the same time, and so on.
To obtain this connection, devices exchange each other’s PIN, but in general as a technology it
is not secure. It is a good practice to repair the devices after a period of time.
As many of us know, software is developed by Google for mobile devices with processing
capabilities for smartphones and tablets. Its kernel is based on Linux. Its installed applications
run in a sandbox. However, many producers have released its antiviruses for such OS, like
Kasperky, MCAfee, and AVG Technologies. Even though antivirus application runs under
sandbox, it has a limit to scan the environment.
Android OS Architecture
The following image shows the overall architecture of Android OS −
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 14/63
8/12/2021 Mobile Security - Quick Guide
The first layer is Application, includes applications such as SMS, calendars, and other
third party applications.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 15/63
8/12/2021 Mobile Security - Quick Guide
or her device. The built-in applications can leverage the new APIs to improve the exchange
support.
Here are some examples of the types of applications that might use the Device Administration
API −
Email clients
Security applications that do remote wipe
Device management services and application
The examples used in this tutorial are based on the Device Administration API sample, which is
included in the SDK samples (available through the Android SDK Manager) and located on your
system as
<sdk_root>/ApiDemos/app/src/main/java/com/example/android/apis/app/
DeviceAdminSample.java.
Sample Application
This sample application offers a demo of device admin features. It presents the users with a user
interface that lets them enable the device admin application.
Once the users have enabled the application, they can use the buttons in the user interface to
do the following −
Set how many failed password attempts can occur before the device is wiped (that is,
restored to factory settings).
Rooting is a word that comes from Linux syntax. It means the process which gives the users
super privilege over the mobile phone. After passing and completing this process, the users can
have control over SETTINGS, FEATURES, and PERFORMANCE of their phone and can even
install software that is not supported by the device. In simple words, it means the users can
easily alter or modify the software code on the device.
Rooting enables all the user-installed applications to run privileged commands such as −
Modifying or deleting system files, module, firmware and kernels
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 17/63
8/12/2021 Mobile Security - Quick Guide
As Android OS is an open source, the rooting tools that can be found over the internet are many.
However, we will be listing just some of them −
Universal Androot
Unrevoked
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 18/63
8/12/2021 Mobile Security - Quick Guide
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 19/63
8/12/2021 Mobile Security - Quick Guide
Step 4 − Go to Settings → Applications → Development and enable USB Debugging to put your
android into USB Debugging mode.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 20/63
8/12/2021 Mobile Security - Quick Guide
Step 7 − Wait for some time until you see a "Running a Su test Success!"
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 21/63
8/12/2021 Mobile Security - Quick Guide
Step 3 − Turn off the phone, remove the battery, and plug in the USB cable.
Step 4 − When the battery icon appears on the screen, pop the battery back in.
Step 5 − Now tap the Power button while holding down the Camera key. For Android phones
with a trackball: Turn off the phone, press and hold the trackball, then turn the phone back on.
Step 6 − Depending on your computer's OS, do one of the following.
Windows − Double-click install-superboot-windows.bat.
Mac − Open a terminal window to the directory containing the files, and type chmod +x.
Install-superboot-mac.sh" followed by ./install-superboot-mac.sh.
Linux − Open a terminal window to the directory containing the files, and type chmod
+x. Install-superboot-linux.sh" followed by ./install-superboot-linux.sh.
Step 7 − Your Android device has been rooted.
Android Trojan
ZitMo (ZeuS-in-the-Mobile)
Zitmo refers to a version of the Zeus malware that specifically targets mobile devices. It is a
malware Trojan horse designed mainly to steal online banking details from users. It circumvents
mobile banking app security by simply forwarding the infected mobile's SMS messages to a
command and control mobile owned by cybercriminals. The new versions of Android and
BlackBerry have now added botnet-like features, such as enabling cybercriminals to control the
Trojan via SMS commands.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 22/63
8/12/2021 Mobile Security - Quick Guide
FakeToken steals both authentication factors (Internet password and mTAN) directly from the
mobile device.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 23/63
8/12/2021 Mobile Security - Quick Guide
Android/Fakeinst.HB is a repackaged clone of a popular, free racing game. Unlike the original,
the repackaged clone requires the user to pay a charge, supposedly to "access higher game
levels".
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 24/63
8/12/2021 Mobile Security - Quick Guide
It is a free Android remote administration tool (RAT) known as AndroRAT (Android.Dandro) and
what was believed to be the first ever malware APK binder. Since then, we have seen imitations
and evolutions of such threats in the threat landscape. One such threat that is making waves in
underground forums is called Dendroid (Android.Dendoroid), which is also a word meaning -
something is tree-like or has a branching structure.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 25/63
8/12/2021 Mobile Security - Quick Guide
Nowadays, mobile phone devices are substituting computers in some special cases and from
this comes the concern of the users and system administrators to restrict rights to the application
or the user. Hence, we protect computers from being infected by installing antiviruses in order to
prevent any possible unpleasant situation, where some data is lost or goes public.
Following are a few recommendations to protect our mobile devices −
Enable lock screen so as not to be directly accessible by third parties.
Keep the operating system updated and patch the apps all the time.
Download apps that are officially marked by Google or from genuine sites that offers this
app.
Don’t root android devices.
Install and update antivirus app on android device.
Don’t download android package files directly.
Use android protectors that allows you to set password to email, SMS, etc.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 26/63
8/12/2021 Mobile Security - Quick Guide
You can apply this setting to your whole organization or by organizational unit to enable remote
wipe for only a specific group of users.
Once enabled, a user can remotely wipe their device by following these steps −
Step 1 − Go to their My Devices page. The user will need to enter their password to access this
page, even if they're already signed in to their account.
Step 2 − Click Wipe Device.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 27/63
8/12/2021 Mobile Security - Quick Guide
A window appears with this warning text: This will wipe all application and personal data from
your device. Anything that hasn't been synced will be lost. Are you sure you want to proceed?
Step 3 − Click Confirm to wipe the device.
Following is the Administrator Console −
In this chapter, we will discuss android security tools mainly those that are meant for protection
from malware installation and downloads.
DroidSheep Guard
DroidSheep Guard monitors your phone's ARP-Table and it warns you through pop-up alerts, in
case it detects malicious entries. It can instantly disable a Wi-Fi connection to protect your
accounts. This can guard against all ARP-based attacks, such as DroidSheep and Faceniff,
man-in-middle attacks, handmade attacks, etc. You can use Facebook, eBay, Twitter, and
Linkedln accounts on public Wi-Fi securely. To download DroidSheep Guard, go to
http://droidsheep.de/
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 28/63
8/12/2021 Mobile Security - Quick Guide
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 29/63
8/12/2021 Mobile Security - Quick Guide
Sofo
Using up-to-the-minute intelligence from SophosLabs, it automatically scans apps as you install
them. This anti-virus functionality helps you avoid undesirable software, which can lead to data
loss and unexpected costs. It also protects your device from attacks via USSD or other special
codes.
If your device is lost or stolen, a remote lock or wipe will shield your personal information. This
can be downloaded from the following Google Play link −
https://play.google.com/store/apps/details?id=com.sophos.smsec&hl=en
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 30/63
8/12/2021 Mobile Security - Quick Guide
Avira Antivirus Security for Android is another antivirus that can be downloaded from
https://play.google.com/store/apps/details?id=com.avira.android
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 31/63
8/12/2021 Mobile Security - Quick Guide
Find My Phone
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 32/63
8/12/2021 Mobile Security - Quick Guide
Send a text message to your phone and it will text back its current location, or have it ring loudly
if its somewhere nearby. Secure your emails, text messages, photos, notes, calendar and more
by remotely wiping your phone with SMS. Keep tabs on your phone's SIM card. It can be
downloaded from the following link −
https://play.google.com/store/apps/details?id=com.mango.findmyphone3
Prey Anti-theft
Prey lets you keep track of your laptop, phone, or tablet if it is stolen or missing. It supports
geolocation. It's lightweight, open source software gives you full and remote control, 24/7. Its
official webpage is https://preyproject.com/ and it can be downloaded from
https://play.google.com/store/apps/details?id=com.prey
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 33/63
8/12/2021 Mobile Security - Quick Guide
iOS is Apple mobile's operating system established for its iPhones. It maintains and sustains
other Apple devices such as iPod Touch, iPad, and Apple TV. Using the Mac OS X, the iOS
operating system is fabricated.
The user interface is based on the concept of direct manipulation, using multi-touch gestures.
This has many other options and features using which daily work becomes easy and this can be
updated on your iPhone, iPad, or iPod Touch using Wi-Fi and other wireless networks.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 34/63
8/12/2021 Mobile Security - Quick Guide
Jailbreaking iOS
Jailbreaking is taking control of the iOS operating system that is used on Apple devices, in
simple words the symmetry of Rooting in Android devices. It removes the device from the
dependencies on exclusive Apple source applications and allows the user to use third-party
apps unavailable at the official app store.
It is accomplished by installing a modified set of kernel patches that allows you to run third-party
applications not signed by the OS vendor. It is used to add more functionality to standard Apple
gadgets. It can also provide root access to the operating system and permits download of third-
party applications, themes, extensions, etc. This removes sandbox restrictions, which enables
malicious apps to access restricted mobile resources and information.
Jailbreaking, like rooting, also has some security risks to your device −
Voids your phone's warranty
Poor performance
Bricking the device
Malware infection
Types of Jailbreaking
When the device starts booting, it loads Apple's own iOS, and to install apps from third parties,
the device must then be broken and have the kernel patched each time it is turned on. There are
three types of jailbreaking methods used.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 35/63
8/12/2021 Mobile Security - Quick Guide
iBoot Exploit
An iBoot jailbreak allows the file system and iboot level access. This type of exploit can be semi-
tethered if the device has a new boot-rom. This is mostly used to reduce low-level iOS controls.
This exploit method takes the help of the hole in the iBoot to delink the code signing appliance
and then the customer can download the required applications. Using this method, the users
configure the mobile to accept custom firmware and probably jailbreak more.
Userland Exploit
A userland jailbreak allows user-level access but doesn't allow iboot-level access. This type of
exploit cannot be tethered as it cannot have recovery mode loops. These can be patched by
Apple. The userland exploits use a loophole in the system application to gain control of that
application. The exploit can only give control to the filesystem. This type of exploit can access
non-vital code in the application and is user friendly and platform independent.
Bootrom Exploit
A bootrom jailbreak can break all the low-level authentications such as providing filesystem,
iBoot, and NOR access (custom boot logos). This process finds a hole in the application to
discard the signature checks. It can't be corrected by Apple. A bootrom jailbreak allows user-
level access and iBoot-level access. These cannot be patched by Apple.
Jailbreaking Techniques
There are two types of Jailbreaking techniques.
Untethered Jailbreaking
Untethered jailbreak is a technique of rebooting the mobile device without connecting it to the
system every time it is booted. If the battery of the device is spoiled, after changing it boots as
usual. Tools for this are PwnageTool, Greenpois0n, Sn0wbreeze, and Limera1n.
Tethered Jailbreaking
If the device starts backing up on its own, it will no longer have a patched kernel, and it may get
stuck in a partially started state. In order for it to start completely and with a patched kernel, it
essentially must be "re-jailbroken" with a computer (using the "boot tethered" feature of a
jailbreaking tool) each time it is turned on.
It is a graphical front-end to Advanced Packaging Tool (APT) with the dpkg package
management system, which means that the packages available in Cydia are provided by a
decentralized system of repositories (also called sources) that list these packages.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 36/63
8/12/2021 Mobile Security - Quick Guide
Jailbreaking Tools
Some other jailbreaking tools are as follows −
Pangu
Team Pangu consists of several senior security researchers and focuses on mobile security
research. It is known for the multiple releases of jailbreak tools for iOS 7 and iOS 8 in
2014.Team Pangu proactively shares knowledge with the community and presents the latest
research at well-known security conferences including BlackHat, CanSecWest, and Ruxcon. It
can be downloaded from http://en.pangu.io/
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 37/63
8/12/2021 Mobile Security - Quick Guide
Redsn0w
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 38/63
8/12/2021 Mobile Security - Quick Guide
evasi0n7 as a jailbreaking tool is compatible with all iPhone, iPod touch, iPad and iPad mini
models running iOS 7.0 through 7.0.6 (Devices that have been updated Over The Air [OTA]
should be restored with iTunes first). Its official webpage is http://evasi0n.com/
GeekSn0w is a popular iOS 7.1.2 jailbreak utility that's built upon winocm's opensn0w project
and Geohot's limera1n exploit. GeekSn0w can jailbreak all iPhone 4 models on Apple's latest
public firmware, iOS 7.1.2. Its official webpage is http://geeksn0w.it/
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 39/63
8/12/2021 Mobile Security - Quick Guide
Sn0wBreeze is a jailbreaking tool that has existed since the iOS 3 firmware generation and has
continued to be maintained by its developer iH8Sn0w. Its official webpage is
http://www.ih8sn0w.com/
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 40/63
8/12/2021 Mobile Security - Quick Guide
Let’s see some of the guidelines to be followed based on the best practices on how to secure an
iOS.
Do not access web services on a compromised network.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 41/63
8/12/2021 Mobile Security - Quick Guide
Find My iPhone
The first one would recommend Find My iPhone. It can be downloaded from
https://itunes.apple.com but to locate your phone you will need an Apple ID to log in at
iCloud.com or use the Find My iPhone app.
iHound
iHound is an iOS device tracking tool that allows you to track your device by simply turning on
iHound, minimize it, and let it run. It can be found at https://www.ihoundsoftware.com/
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 42/63
8/12/2021 Mobile Security - Quick Guide
This is an operating system developed by Microsoft for mobile phones with processing
capabilities. You can share calendars, lists, and photos. It is also based on One Note so you can
share photos in lists as well. You can invite people who don’t have a Windows Phone into your
room, the experience will be more limited, calendar sharing was one of the features that was
highlighted.
SkyDrive syncs your office documents across all your devices, and you get 7GB of free storage
Following are some of the practical guidelines to secure mobile phones. The list is based on the
best practices. Neither are they always mandatory nor are these universal rules.
Lock the screen
Download apps only from trusted sources.
Keep your phone updated with WP8 security updates
Use Zune desktop software to back up your device data
Try to connect to secured Wi-Fi networks
Set up passwords for WP8 lock screen
Protect your WP8 SIM (Subscriber Identity Module) with a PIN.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 43/63
8/12/2021 Mobile Security - Quick Guide
FollowMee is a GPS tracker for Windows phone 8. The device is traceable every time and
everywhere. When you install this app to a device that you want to track, it quietly records its
location (GPS, WiFi, or cellular triangulation) periodically, and uploads to the secured server. To
monitor the location of your tracked device, you simply browse to this website in any browser
(either desktop or mobile).
Using this GPS tracker app, you can follow the whereabouts of your children or other family
members. You can also use it for business purposes. You can use it to track your employees,
company mobile devices, or your fleet.
BlackBerry OS is a proprietary mobile operating system developed by Research in Motion for its
BlackBerry line of smartphones and handheld devices. It includes a Java based thirdparty
application framework that implements J2ME Mobile Information Device Profile v2 (MIDP2) and
Connected Limited Device Configuration (CLDC), as well as a number of RIM specific APIs.
Some of the features of BlackBerry include −
Native support for corporate email
BlackBerry enterprise server
BlackBerry messenger
BlackBerry internet service
BlackBerry email client
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 44/63
8/12/2021 Mobile Security - Quick Guide
Blackberry Enterprise Solution allows the mobile users to wirelessly access their organization
emails and other business-critical applications, safely and securely. BlackBerry Enterprise
Solution Architecture is comprised of six vital elements. They are −
BlackBerry Enterprise Server
Blackberry Mobile Data System
BlackBerry Smartphones
BlackBerry Connect Software
Blackberry Alliance Program
BlackBerry Solution Services
The enterprise server, together with enterprise messaging and collaboration systems, provides
email access to the mobile users, enterprise instant messaging, and personal information
management tools. Poorly configured firewalls increase the risk of attacks. The Web, Database,
and Application Server contain vulnerabilities. If the attacker detects those vulnerabilities, then
he or she can easily carry out an attack and take control over the entire server.
BlackBerry faces many attacks since there are many new tools and methods available for
finding potential vulnerabilities present on BlackBerry devices. Attack vectors attract users to
download malicious software on their mobiles. Finding website vulnerabilities using tools, etc.
are the few techniques used by an attacker for carrying out attacks on BlackBerry devices. Apart
from these techniques, there are many more attack vectors that allow attackers to launch
attacks on BlackBerrys that include −
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 45/63
8/12/2021 Mobile Security - Quick Guide
A BlackBerry application must be signed by RIM to get full access to the operating system APIs.
If a required signature is missing or the application is altered after signing, the JVM will either
refuse/restrict the API access to the application or will fail at run-time with an error message.
Attackers can obtain code-signing keys anonymously using prepaid credit cards and false
details, sign a malicious application, and publish it on the BlackBerry app world. Attackers can
also compromise a developer's system to steal code-signing keys and passwords to decrypt the
encrypted keys.
JAD files include the attributes of a Java application, such as app description and vendor details
and size, and provides the URL where the application can be downloaded. It is used as a
standard way to provide Over The Air (OTA) installation of Java applications on J2ME mobile
devices. Attackers can use specially crafted .jad files with spoofed information and trick users
into installing malicious apps.
Regular PC users are more likely to be targeted by premium rate dialers applications that
connect a user's modem to a premium rate telephone number, which results in more service
provider bills than expected. The same mechanism is enforced in BlackBerry but doesn't use
premium rate SMSes.
Email Exploits
In BlackBerry mobile, all emails are sent, received, and read through the
net.rim.blackberry.api.mail package and this package can be used only on signed
applications. BlackBerry attachment service supports only files with extensions such as .doc,
.pdf, .txt, .wpd,.xls, and .ppt, but it can send any kind of file via email. An attachment with file
type .cod is not supported by BlackBerry.
Personal Information Management (PIM) data in the PIM database of a BlackBerry device
includes address books, calendars, tasks, and memo pads information. Attackers can create
malicious signed applications that read all the PIM data and send it to an attacker using different
transport mechanisms. The malicious applications can also delete or modify the PIM data.
If the device firewall is off, signed apps can open TCP connections without the user being
prompted. Malicious apps installed on the device can create a reverse connection with the
attacker enabling him or her to utilize infected device as a TCP proxy and gaining access to
organization's internal resources. Attackers can also exploit the reverse TCP connection for
backdoors and perform various malicious information gathering attacks.
Following are some of the practical guidelines to secure BlackBerry devices. The list is based on
the best practices and these are not universal rules.
Maintain a monitoring mechanism for network infrastructure on BlackBerry Enterprise
Network.
Use BlackBerry Protect or other security apps for securing confidential data.
Use content protection feature for protecting data on BlackBerry Enterprise Network.
Use password encryption for protecting files on BlackBerry devices.
Enable SD-card/media card encryption for protecting data.
Enterprises should follow a security policy for managing BlackBerry devices.
Disable unnecessary applications from BlackBerry Enterprise Network.
Provide training on security awareness and attacks on handheld devices on BlackBerry
Enterprise Network.
MobileTracker
MobileTracker is the mobile tracking device for BlackBerry. It is a commercial version and can be
downloaded from − http://www.skylab-
mobilesystems.com/en/products/mobiletracker_blackberry.html
Some of the features are −
Easily records tracklogs and views them in Google Earth or publishes them with Google
Maps.
Records a GPS tracklog.
Elevation and time can be tracked.
Easy one-click tracklog recording.
Extensive statistical information and background tracking.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 47/63
8/12/2021 Mobile Security - Quick Guide
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 48/63
8/12/2021 Mobile Security - Quick Guide
Mobile Spyware
mSpy
mSpy is spy software to keep your children from doing things without you knowing. They will
make you wish that you could track a cellphone without them knowing, just to make sure that
they don’t act up. Whether it is going out with the wrong friends or causing trouble, you may
want to turn that mobile phone of theirs into a spy phone. It can be downloaded and bought at
https://www.mspy.com/blog/mspy-for-blackberry-your-kids-nanny/
StealthGenie
StealthGenie is another spyware and is a feature-rich and easy-to-use cellphone spy package
for monitoring all activities on smartphones running on Android, iOS (iPhone) or BlackBerry.
StealthGenie has all the spy features you’d ever want. You’ll be able to read incoming and
outgoing text messages, view call logs, read emails, track GPS location, spy on instant
messenger chats, remotely monitor their phone, and listen to their live calls. It can be
downloaded at http://www.stealthandroidspy.com/
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 49/63
8/12/2021 Mobile Security - Quick Guide
Mobile Device Management (MDM) software is a vital component that monitors, safeguards,
manages, and supports different types of mobile devices and tablets including iPhone, iPad,
Android, and BlackBerry, along with the applications that run on them. It monitors all mobile
devices with different operating system such as Android, Windows, and Symbian mobile.
MDM provides platforms for over-the-air or wired distribution of applications, data, and
configuration settings for all types of mobile devices along with mobile phones, smartphones,
tablet computers, etc.
With the help of MDM, enterprise-wide policies can be implemented easily to reduce support
costs, time, and business and security threats. All the company-owned, consumerowned, as well
as the employee-owned devices across the enterprise can be easily managed with the help of it.
MDM can reduce support cost and minimize business threats just by safeguarding and
controlling all the data and configuration settings of all the mobile devices in the network.
MaaS360 Mobile Device Management solution is an IBM solution and is a software that allows
you to monitor and govern mobile devices arriving into the organization, whether they are
provided by the company or part of a Bring Your Own Device (BYOD) program. It can be
downloaded at https://www-03.ibm.com/security/mobile/maas360.html
This technique allows organizations to implement the MDM life cycle for devices such as
smartphones and tablets including iPhones, iPads, Androids, Windows Phones, BlackBerrys,
and Kindle Fires. Using the integrated cloud platform, the MaaS360 streamlines MDM with
improved visibility and control that spans across mobile devices, applications, and documents.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 50/63
8/12/2021 Mobile Security - Quick Guide
BYOD Risks
Implementing BYOD in the company has its own risks and are as follows −
The administrator should follow the guidelines listed here to implement mobile device security −
Publish an enterprise policy that specifies the acceptable usage of consumer grade
devices and bring-your-own devices in the enterprise.
Publish an enterprise policy for cloud.
Enable security measures such as antivirus to protect the data in the datacenter.
Implement policy that specifies which levels of application and data access are allowed
on consumer-grade devices, and which are prohibited.
Press the power button to lock the device whenever it is not in use.
Verify the location of printers before printing sensitive documents.
Utilize a passcode lock to protect the access to the mobile device; consider the eight-
character non-simple passcode.
Report a lost or stolen device to IT so they can disable certificates and other access
methods associated with the device.
This chapter explains certain guidelines and tools related to mobile security. In order to protect
ourselves from SMS phishing, some rules have to be kept in mind.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 52/63
8/12/2021 Mobile Security - Quick Guide
Financial companies never ask for personal or financial information, like usernames,
passwords, PINs, or credit or debit card numbers via text message.
Smishing scams attempt to create a false sense of urgency by requesting an
immediate response required. Keep calm and analyze the SMS.
Don’t open links in unsolicited text messages.
Don’t call a telephone number listed in an unsolicited text message. You should contact
any bank, government, agency, or company identified in the text message using the
information listed in your records or in official webpages.
Don’t respond to smishing messages, even to ask the sender to stop contacting you.
Use caution when providing your cell phone number or other information in response to
pop-up advertisements and “free trial” offers.
Verify the identity of the sender and take time to ask yourself why the sender is asking
for your information.
Be cautious of text messages from unknown senders, as well as unusual text messages
from senders you do know, and keep your security software and applications up to date.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 53/63
8/12/2021 Mobile Security - Quick Guide
Lookout
Lookout is a mobile protection tool that allows you to protect your mobile from mobile threats. It
helps you avoid risky behavior such as connecting to an unsecured Wi-Fi network, downloading
a malicious app or clicking on a fraudulent link in order to prevent identity theft, financial fraud,
and the loss of your most personal data.
It provides safe, secure, and seamless backup of your mobile data, automatically over the air,
and allows you to find your phone if it's lost or stolen. The dashboard allows you to remotely
manage your phone. It official webpage is https://www.lookout.com/
WISeID
WISelD provides secure and easy-to-use encrypted storage for personal data, Personal
Identifiable Information (Pll), PINs, credit and loyalty cards, notes, and other information. It
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 54/63
8/12/2021 Mobile Security - Quick Guide
allows you to store your websites, user names, and passwords and quickly log on to your
favorite websites through your mobile device. It’s official webpage is https://www.wiseid.com/
zIPS
This mobile protection tool uses the on-device z9 detection engine to monitor the whole device
for malicious behavior, and to dynamically detect known and unknown threats in real time.
It leverages machine learning to analyze deviations to device behavior and make determinations
about indicators of compromise to accurately identify specific types of attacks and classify zero-
day attacks.
zIPS implements quick incident-response recommendations and decisions when malicious
activity is discovered. It helps to securely implement BYOD. Its official webpage is
https://www.zimperium.com/zips-mobile-ips
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 55/63
8/12/2021 Mobile Security - Quick Guide
In this chapter, we will discuss the basic concepts of penetration testing of mobile phones. As
you will see, it differs based on the OS.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 56/63
8/12/2021 Mobile Security - Quick Guide
Step 1 − Root the OS with the help of tools such as SuperOneClick, Superboot, Universal
Androot, and Unrevoked in order to gain administrative access to OS and Apps.
Step 2 − Perform DoS attack in order to make a stress test of Apps or OS which can be done
with AnDOSid. It can be downloaded from https://github.com/Scott-Herbert/AnDOSid
Step 3 − Check for vulnerabilities in web browsers. Mainly check whether cross-application
scripting error is present in the Android browser.
Step 4 − Check SQLite for vulnerabilities mainly its purpose is to check for any sensitive
information, if it is in an encrypted form (like password, contacts, database links, etc.). One of
the best tools used for this is sqlmap which is found in Kali distribution.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 57/63
8/12/2021 Mobile Security - Quick Guide
Step 6 − Detect capability leaks in Android devices by using the tool Woodpecker.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 58/63
8/12/2021 Mobile Security - Quick Guide
Step 2 − Try to unlock the iPhone. To unlock the iPhone use tools such as iPhoneSimFree
which can be downloaded from http://www.iphonesimfree.com and anySIM.
Step 3 − Use SmartCover to bypass passcode for which you need to follow these steps: Hold
the power button of an iOS operating device until the power off message appears. Close the
smart cover until the screen shuts and opens the smart cover after few seconds. Press the
cancel button to bypass the password code security.
Step 4 − Hack iPhone using Metasploit, which is incorporated in Kali distribution. Use the
Metasploit tool to exploit the vulnerabilities in the iPhone, based on the vulnerabilities that you
find.
Step 5 − Check for the access point with the same name and encryption type.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 59/63
8/12/2021 Mobile Security - Quick Guide
Step 2 − Try to jailbreak the Windows phone. Use the WindowBreak program to jailbreak/unlock
the Windows phone. You can get more details about this tool in the link
http://windowsphonehacker.com/articles/the_windowbreak_project-12-23-11
Step 3 − Check for on-device encryption. Check whether the data on the phone can be
accessed without a password or PIN.
Step 4 − Check for a vulnerability in Windows Phone Internet Explorer. Check whether the flaw
in CSS function in Internet Explorer allows the attackers to gain full access over the phone
through remote code execution.
Step 1 − Firstly, you do a blackjacking on the BlackBerry. Use BBProxy tool to hijack the
BlackBerry connection which can be found on the internet.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 60/63
8/12/2021 Mobile Security - Quick Guide
Step 2 − Check for flaws in the application code signing process. Obtain code-signing keys
using prepaid credit cards and false details, sign a malicious application, and publish it on the
BlackBerry app world.
Step 3 − Perform an email exploit. Send an email or message to trick a user to download a
malicious .cod application file on the BlackBerry device.
Step 4 − Perform a DoS attack. Try sending malformed Server Routing Protocol (SRP) packets
from the BlackBerry network to the router to cause a DoS attack. Some tools were mentioned in
the previous chapters.
Step 5 − Check for vulnerabilities in the BlackBerry Browser. Send maliciously crafted web links
and trick the users to open links containing malicious web pages on the BlackBerry device.
Step 6 − Search for password protected files. Use tools like Elcomsoft Phone Password Breaker
that can recover password protected files and backups from BlackBerry devices.
zANTI
zANTI is a mobile penetration testing toolkit that enables IT security managers and Pentesters to
perform complex security audits. It simulates advanced hackers’ capabilities in an organization’s
network through a user-friendly mobile app. It has two versions - free for community and
commercial for corporates. It can be downloaded from https://www.zimperium.com/zanti-mobile-
penetration-testing
It also scans the network by finding uncovered authentication, backdoor, and brute-force attacks,
DNS and protocol-specific attacks, and rogue access points using a comprehensive range of full
customizable network reconnaissance scans.
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 61/63
8/12/2021 Mobile Security - Quick Guide
Automatically diagnose vulnerabilities within mobile devices or web sites using a host of
penetration tests including, man-in-the-Middle (MITM), password cracking and Metasploit.
dSploit
dSploit is a penetration testing tool developed for the Android operating system. It consists of
several modules that are capable to perform network security assessments on wireless
networks.
dSploit allows you to perform tasks such as, network mapping, vulnerability scanning, password
cracking, Man-In-The-Middle attacks and many more. More information can be found on
https://github.com/evilsocket and can be downloaded from
https://sourceforge.net/projects/dsploit999/?source=directory
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 62/63
8/12/2021 Mobile Security - Quick Guide
Hackode is another Android penetration test application, which offers different features such as:
Reconnaissance, Google Hacking, Google Dorks, Whois, Scanning, Ping. Traceroute, DNS
lookup, IP, MX Records, DNS Dig Exploits, Security RSS Feed. It can be downloaded from
https://play.google.com/store/apps/details?id=com.techfond.hackode
https://www.tutorialspoint.com/mobile_security/mobile_security_quick_guide.htm 63/63