[ Certified Ethical Hacker v10 ] :: [ Chapter 8 ] :: Hacking Mobile Devices

Chapter 8: Hacking Mobile Devices: iOS and Android

Rooting Android

Tools to root Android

KingoRoot

OneClickRoot

TunesGo

NTK Droid

Jailbreaking iOS

Tools to jailbreak iOS

Cydia

Pangu

GeekSn0w, Redsn0w

Absinthe

Techniques for Jailbreaking

  1. Untethered – the kernel will stay jailbroken after reboot
  2. Semi-tethered – a reboot reverts to a non-jailbroken kernel, but a jailbreak took is installed on the device for immediate re-jailbreaking
  3. Tethered – jailbreaking is done while tethered to a computer, but a reboot removes removes the jailbreak, and the mobile device may be hard to recover

Types of Jailbreaking

  1. Userland exploit – breaks out of many user controls, but doesn’t get you root/Admin
  2. iBoot exploit – cracks the high-level iBoot boot loader and allows installation of unsigned apps, but will be removed if iBoot is updated/reinstalled
  3. BootROM exploit – cracks the low-level SecureRom bootloader, and can’t be removed by an update/patch

MDM

Mobile devices as security testing platforms

DroidSheep

Fing

Kali Nethunter

MDM (Mobile Device Management) to Reduce Risk

https://flir.custhelp.com/app/answers/detail/a_id/1053/~/vlc-media-player—display-and-record-a-video-stream-(automation-cameras)