[ Certified Ethical Hacker v10 ] :: [ Chapter 8 ] :: Hacking Mobile Devices

This entry is part 15 of 30 in the series [ Certified Ethical Hacker Training ]

Chapter 8: Hacking Mobile Devices: iOS and Android

Rooting Android

Tools to root Android




NTK Droid

Jailbreaking iOS

Tools to jailbreak iOS



GeekSn0w, Redsn0w


Techniques for Jailbreaking

  1. Untethered – the kernel will stay jailbroken after reboot
  2. Semi-tethered – a reboot reverts to a non-jailbroken kernel, but a jailbreak took is installed on the device for immediate re-jailbreaking
  3. Tethered – jailbreaking is done while tethered to a computer, but a reboot removes removes the jailbreak, and the mobile device may be hard to recover

Types of Jailbreaking

  1. Userland exploit – breaks out of many user controls, but doesn’t get you root/Admin
  2. iBoot exploit – cracks the high-level iBoot boot loader and allows installation of unsigned apps, but will be removed if iBoot is updated/reinstalled
  3. BootROM exploit – cracks the low-level SecureRom bootloader, and can’t be removed by an update/patch


Mobile devices as security testing platforms



Kali Nethunter

MDM (Mobile Device Management) to Reduce Risk


Series Navigation<< [ Certified Ethical Hacker v10 ] :: [ Chapter 7 ] :: WiFi Hacking[ Certified Ethical Hacker v10 ] :: [ Chapter 8 cont’d ] :: Hacking the Internet of Things >>