Talk:Cyber Threats to Mobile Phones

=HACKoDROID: An Increasing Tendency Toward Smartphone-Based Attacks= Posted on SenseCy Blog  on  November 20, 2014   by  Tal Bekker New Smartphone technologies have made our lives easier. At the touch of a button, you can call a cab, pay bills, connect with your friends and even reach your personal trainer. On the other hand, the world of hacking and cracking now also has a lot of useful tools to hack your system and steal your data, using a smartphone.

We have recently seen the development and publishing of hack applications for smartphones on underground forums. The wide range of such tools means that anybody can find a suitable tool for dubious purposes. The items available include a variety of DDoS tools, wireless crackers, sniffers, network spoofers and more. 

HackForum Post Most tools are only available for Android smartphones, and many require root permissions. The most popular tool for cookie theft is DroidSheep. With the help of this tool, an attacker can collect all browsing data, including logins, passwords and more, merely by using the same Wi-Fi network as the victim.

Moreover, the attacker can connect to the victim’s password-protected Wi-Fi network. There are several Wi-Fi cracking tools, for example, WIBR+ uses uploaded password databases to identify passwords common to the victim’s network. The users can also upload and update these databases. Another tool – Wi-Fi Kill – is capable of shutting down any other device connected to the same network and can intercept pictures and webpages recently visited by users of this network.

More and more tools now include more than one hacking capability. The DSploit tool features such functions as password sniffers, cookie sniffers, browsing history sniffers, and webpage redirecting. Another program, Bugtroid, contains cracking and protection applications. The owner can choose the most suitable program from a list and install it in one click. The tool offers a variety of tools to suit almost every cracking purpose. 

Sniffers and DDoS Tools For iOS systems, there is a limited number of hacking tools, mostly in the realm of game cracking. Examples of such tools are GameGem and iGameGuardian. These tools break games for the purpose of stealing monetary units. The most common tool for iOS is Metasploit, which contains a number of useful applications for different fields.

The tools presented above are not new, but they represent the main capabilities in the field. We are seeing a growing tendency to use portable devices, such as smartphones and tablets, to conduct attacks in public places. Mobile devices and public Wi-Fi networks tend to be less protected and more vulnerable. With the help of collected data by mobile device, the attackers can perform more complex attacks via PC. As long as there is no protection awareness regarding mobile devices, we expected a continued increase in the number of smartphone-based attacks.



 List of Hacking Tools Visit our website at <span style="font-size:10.0pt;line-height:115%;mso-ascii-font-family: Calibri;mso-fareast-font-family:"TimesNewRoman";mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri;color:black;mso-no-proof:yes"> <span style="font-size: 10.0pt;line-height:115%;mso-ascii-font-family:Calibri;mso-hansi-font-family: Calibri;color:#5B9BD5">www.sensecy.com <span style="font-size:10.0pt;line-height:115%;mso-ascii-font-family:Calibri; mso-fareast-font-family:"TimesNewRoman";mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri;color:black;mso-no-proof:yes"> Visit our blog at <span style="font-size:10.0pt;line-height: 115%;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri;color:#5B9BD5">blog.sensecy.com  <p class="MsoNormal" style="margin-top:6.0pt;margin-right:0cm;margin-bottom:12.0pt; margin-left:0cm;line-height:115%"><span style="font-size:10.0pt;font-family:"Candara","sans-serif";mso-fareast-font-family: "TimesNewRoman";mso-fareast-theme-font:minor-fareast;mso-bidi-font-family: Arial;mso-bidi-theme-font:minor-bidi;color:black;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:HE;mso-no-proof:yes">Follow us on <span style="font-size:10.0pt;font-family:"Candara","sans-serif";mso-fareast-font-family: "TimesNewRoman";mso-fareast-theme-font:minor-fareast;mso-bidi-font-family: Arial;mso-bidi-theme-font:minor-bidi;color:#4F81BD;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:HE;mso-no-proof:yes">Twitter <span style="font-size:10.0pt;font-family:"Candara","sans-serif";mso-fareast-font-family: "TimesNewRoman";mso-fareast-theme-font:minor-fareast;mso-bidi-font-family: Arial;mso-bidi-theme-font:minor-bidi;color:black;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:HE;mso-no-proof:yes"> <span style="font-size:11.0pt;font-family:"Candara","sans-serif";mso-fareast-font-family: "TimesNewRoman";mso-fareast-theme-font:minor-fareast;mso-bidi-font-family: Arial;mso-bidi-theme-font:minor-bidi;color:black;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:HE;mso-no-proof:yes">@SenseCyBlog