22
Kemal KOCABIYIK 20060290

Kkocabiyik presentation

Embed Size (px)

DESCRIPTION

Amnesia Presentation for Effective Presentation Class by Kemal KOCABIYIK

Citation preview

Page 1: Kkocabiyik presentation

Kemal KOCABIYIK

20060290

Page 2: Kkocabiyik presentation

WHAT IS SMART PHONE?

Based on an operating system

Have complex software

More complex computing ability

More complex connection ability

High speed web access

ETC Iphone,Blackberry

Page 3: Kkocabiyik presentation

Smartphone

Communications

Page 4: Kkocabiyik presentation

Use Area (Wireless)

Communicating with other devices

Internet

AD-Hoc communication

Hotspot

File Transfer

Page 5: Kkocabiyik presentation

Use Area(Bluetooth)

File Transfer

Data Exchange

Third Party Tools

Page 6: Kkocabiyik presentation

Use Area(USB)

Charging

Connecting to Computer

Connecting to 3rd party tools

Data Exchange

File Transfer

Communicating

Page 7: Kkocabiyik presentation

Wireless Communication

Secure

User needs to authenticate

Able to make peer to peer

communication

Packets are instpected by stateful

firewall or instrusion detection systems

Page 8: Kkocabiyik presentation

Bluetooth Connection

Secure

User needs to give its pair to paired-key

Have its own defense mechanism

Traffic is filtered

Page 9: Kkocabiyik presentation

USB Connection

Insecure

User does not need to authenticate

People think of that USB connection is

more secure than the other connection

types

Page 10: Kkocabiyik presentation

Attacks to Smart Phones

3 different types of attacks

Phone-to-Computer attacks

Computer-to-Phone attacks

Phone-to-Phone Attacks

Page 11: Kkocabiyik presentation

Common Things

An adversary that is already in control of

one end of the USB connection

The attacker can manipulate any

component of the device, ranging from

applications to programmable hardware

components

Page 12: Kkocabiyik presentation

Phone-to-Computer Attacks

Page 13: Kkocabiyik presentation

Phone-to-Computer Attacks

USB becomes a bidirectional

communication channel between the

host and the peripheral device.

Can launch attacks and transfer

malicious programs

Page 14: Kkocabiyik presentation

Phone-to-Computer Attacks

2 types of Phone-to-Computer attacks

Posing as HID peripherals and connect

to computer

The capability of the phone to be

automatically mounted as a USB device

Page 15: Kkocabiyik presentation

Examples

Showing mobile device as a HID device

than send inputs from mobile device

Put storage and autorun.inf

Page 16: Kkocabiyik presentation

Computer-to-Phone Attacks

Page 17: Kkocabiyik presentation

Computer-to-Phone Attacks

Phone is unlocked and in manufacture

out-of-box state.

Using program called fastboot,

unlocking process started

After unlocking the phone, it is now

under control which means you can

change all system files.

Page 18: Kkocabiyik presentation

Phone-to-Phone Attacks

Page 19: Kkocabiyik presentation

Phone-to-Phone Attacks

The power of operating system gives us

the capability of doing this kind of

attacks.

Similar to Computer-to-Phone Attacks

Capability is to enable the USB host

mode on one device taking over the

control of the other

Page 20: Kkocabiyik presentation

Phone-to-Phone Attacks

Page 21: Kkocabiyik presentation

Phone-to-Phone Attacks

Page 22: Kkocabiyik presentation

In conclusion

USB is not that much secure

Different types of attacks:

Phone-to-Computer

Computer-to-Phone

Phone-to-Phone

It works not only for google android but

also for all smart phones