0% found this document useful (0 votes)
182 views72 pages

Jan 2006

The document discusses how to become a computer security expert and protect one's privacy online. It recommends learning programming, networking, and the UNIX shell. It distinguishes between hackers, who have strong ethics and catch criminals, and crackers, who indulge in crime. It describes common attacks like privacy attacks, email forging, sniffers, and DOS attacks. It also provides examples of cyber crimes targeting individuals, government agencies like NASA, and corporations. Throughout, it offers advice on using proxy servers and avoiding revealing one's IP address to enhance online privacy and security.

Uploaded by

Shruti Arora
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
182 views72 pages

Jan 2006

The document discusses how to become a computer security expert and protect one's privacy online. It recommends learning programming, networking, and the UNIX shell. It distinguishes between hackers, who have strong ethics and catch criminals, and crackers, who indulge in crime. It describes common attacks like privacy attacks, email forging, sniffers, and DOS attacks. It also provides examples of cyber crimes targeting individuals, government agencies like NASA, and corporations. Throughout, it offers advice on using proxy servers and avoiding revealing one's IP address to enhance online privacy and security.

Uploaded by

Shruti Arora
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 72

HACKED!!!

– Rourkela
Network Security

COMPUTER HACKING

Ritu Hooda
How to become a Computer Security Expert?

 THINGS TO DO:

Learn at least one Programming Language.

Become a Networking Guru.

Learn to work in the UNIX Shell.

Get the ‘Hacking’ attitude.

Read, Read and Read as much as you can!!!!


Hacker VS Cracker

 Qualities of a Hacker :

Lots of Knowledge & Experience.


Good Guy.
Strong Ethics.
Never Indulges in Crime.
Catches Computer Criminals.

 Qualities of a Cracker :

Lots of Knowledge & Experience.


Bad Guy.
Low Ethics.
Mostly Indulges in Crime.
Is a Computer Criminal himself.
TOP 5 CORPORATE ESPIONAGE ATTACKS

• TOP 5 Corporate Espionage Attacks:

 Privacy Attacks

 Email Forging Attacks

 Sniffer Attacks

 Input Validation Attacks

 DOS Attacks
Individual Internet User

Mumbai Lady Case

• A lady based in Mumbai, India lived in a 1


room apartment.

• Was a techno-freak and loved chatting on


the Internet.

• Attacker broke into her computer &


switched her web camera on!

• Biggest cyber crime involving privacy


invasion in the world!
Government Sector

NASA

• The premier space research agency in the


world.

• Had just finished a successful spaceship


launch, when the unexpected happened.

• The path of the spaceship was changed


remotely by a 11 year old Russian teenager.

• Loss of money. Unnecessary Worry.


http://www.hackingmobilephones.com

PRIVACY ON THE INTERNET: IP Addresses

 Every system connected to a network has a unique Internet Protocol (IP)


Address which acts as its identity on that network.

 An IP Address is a 32-bit address which is divided into four fields of 8-


bits each. For Example, 203.94.35.12

 All data sent or received by a system will be addressed from or to the


system.

 An IP Address it to your computer, what your telephone number is to


you!

 An attacker’s first step is to find out the IP Address of the target system.
http://www.hackingmobilephones.com

IP Addresses: Finding an IP Address

 A remote IP Address can easily be found out by any of the following


methods:

Through Instant Messaging Software

Through Internet Relay Chat

Through Your website

Through Email Headers

Through Message Board Postings


http://www.hackingmobilephones.com

Finding an IP Address via Instant Messengers

INSTANT MESSENGERS

1. Ask your friend to come online and chat with you.

2. Case I: If you are chatting on ICQ, then the following connection


exists between your system and your friend’s system:

Your System------DIRECT CONNECTION---- Friend’s System

Friend’s System---------DIRECT CONNECTION------- Your System

Now, goto MSDOS or the command line and type:

C:\>netstat -n

This command will give you the IP Address of your friend’s computer.
http://www.hackingmobilephones.com

Finding an IP Address via Instant Messengers

3. Case 2: If you are chatting on other messengers like MSN, YAHOO


etc. then the following indirect connection exists between your system
and your friend’s system:

Your System------Chat Server---- Friend’s System

Friend’s System---------Chat Server------- Your System

Thus in this case, you first have to establish a direct connection with
your friend’s computer by either sending him a file or by using the call
feature.
Then, goto MSDOS or the command line and type:

C:\>netstat -n

This command will give you the IP Address of your friend’s computer.
http://www.hackingmobilephones.com

Finding an IP Address via Instant Messengers

Countermeasures

Do not accept File transfers or calls from unknown people

Chat online ONLY after logging on through a Proxy Server.


http://www.hackingmobilephones.com

Protecting Your IP Address: Proxy Servers

PROXY SERVERS

Definition:

A Proxy Server acts as a buffer between you and the Internet, hence it
protects your identity.

Working:

Case 1: Your System------Proxy Server---- Friend’s System

Case 2: Your System-----Proxy------Chat Server----Friend’s System

Good Proxy Servers:

Wingate & WinProxy (For Windows Platform)


Squid (For Unix Platforms)
http://www.hackingmobilephones.com

Protecting Your IP Address: Proxy Servers

PROXY BOUNCING

Definition:

Proxy Bouncing is the phenomenon wherein you connect to several proxy


servers and then connect to the actual destination.

Working:

YOUR SYSTEM--------PROXY 1--------- PROXY 2---------- PROXY 3


----------------PROXY 4----------PROXY 5----------Destination

Tools:

MultiProxy
http://www.hackingmobilephones.com

Finding an IP Address via Internet Relay Chat

INTERNET RELAY CHAT

 It is very easy to get the IP Address of your friend through IRC:

1. Ask your friend to chat with you on IRC.

2. Type the following command to get his IP Address:

/whois nicknameofvictim

 If this does not work, then one can send a file to the friend and use
the ‘netstat’ command to get his IP Address.
http://www.hackingmobilephones.com

Finding an IP Address via Internet Relay Chat

Countermeasures

 One should connect to the IRC server through a proxy.

 One should not accept any files or direct chat requests from
unknown people.

 One can also use the below command to hide one’s IP Address:

/mode your_nickname +x
OR
/mode your_nickname +z
http://www.hackingmobilephones.com

Finding an IP Address via your website

WEBSITES

 One can easily log the IP Addresses of all visitors to their website by
using simply JAVA applets or JavaScript code.

Countermeasures

 One should surf the Internet through a Proxy Server.

 One can also make use of the numerous Free Anonymous Surfing
Proxy Services.

For Example, www.anonymizer.com


http://www.hackingmobilephones.com

Finding an IP Address via Email Headers

EMAIL HEADERS

 Hotmail.com along with numerous other Email Service Providers, add


the IP Address of the sender to each outgoing email.

 A Typical excerpt of such a Header of an email sent from a Hotmail


account is:

Return-Path: <[email protected]>
Received: from hotmail.com by delhi1.mtnl.net.in
(8.9.1/1.1.20.3/26Oct99-0620AM)
id TAA0000032714; Sun, 23 Jan 2000 19:02:21 +0530 (IST)
Message-ID: <[email protected]>
Received: from 202.54.109.174 by www.hotmail.com with HTTP;
Sun, 23 Jan 2000 05:30:14 PST
X-Originating-IP: [202.xx.109.174]
http://www.hackingmobilephones.com

IP Addresses: Dangers & Concerns

Dangers & Concerns

 DOS Attacks
 Disconnect from the Internet
 Trojans Exploitation
 Geographical Information: Click Here
 File Sharing Exploits
 Invades your Privacy
 Spy on You
 Steal your Passwords
 Slow Your Internet Access Speed.

PRIVACY INVASION IS INDEED A REALITY!


http://www.hackingmobilephones.com

TROJANS

TROJANS

Definition:

Trojans act as RATs or Remote Administration Tools that allow remote


control and remote access to the attacker.

Working: See Demo.

Threats:

Corporate Espionage, Password Stealing, IP Violation, Spying etc.

Tools:

Netbus, Girlfriend, Back Orrifice and many others.


http://www.hackingmobilephones.com

TROJANS

COUNTERMEASURES

• Port Scan your own system regularly.

• If you find a irregular port open, on which you usually do not


have a service running, then your system might have a Trojan
installed.

• One can remove a Trojan using any normal Anti-Virus Software.

• A typical Key Logger automatically loads itself into the memory,


each time the computer boots.

• Hence, one should search all the start up files of the system and
remove any references to suspicious programs.
http://www.hackingmobilephones.com

TOP 5 CORPORATE ESPIONAGE ATTACKS

• TOP 5 Corporate Espionage Attacks:

 Privacy Attacks

 Email Forging Attacks

 Sniffer Attacks

 Input Validation Attacks

 DOS Attacks
http://www.hackingmobilephones.com

Consumer Electronic Goods Sector

TV Group

• One of the largest manufacturers of


televisions and other electronic goods in the
world.

• Attacker sent an abusive forged email to all


investors, employees and partners
worldwide from the Chairman’s account.

• Tainted relations.
http://www.hackingmobilephones.com

Email Forging

Email Forging

Definition:

Email Forging is the art of sending an email from the victim’s email account
without knowing the password.

Working:

ATTACKER-----Sends Forged email----- FROM VICTIM

Tools:

None required! DEMO


http://www.hackingmobilephones.com

Email Forging

COUNTERMEASURES

 NOTHING can stop the attacker.

 Use Secure email systems like PGP.

 Digitally sign your emails.


http://www.hackingmobilephones.com

TOP 5 CORPORATE ESPIONAGE ATTACKS

• TOP 5 Corporate Espionage Attacks:

 Privacy Attacks

 Email Forging Attacks

 Sniffer Attacks

 Input Validation Attacks

 DOS Attacks
http://www.hackingmobilephones.com

Healthcare Sector

Healthcare Group

• One of the largest shaving solutions


companies in the world.

• Attacker broke into network and cancelled


approximately 35 different orders of raw
materials from supplier.

• Loss of revenue. Delay in Product launch.


http://www.hackingmobilephones.com

Government Sector

BARC Group

• One of the most sensitive atomic and


missile research facilities in India.

• Pakistani criminal organizations broke into


network and stole sensitive missile info.

• Loss of sensitive data. Threat to national


security.
http://www.hackingmobilephones.com

SNIFFERS

SNIFFERS

Definition:

Sniffers are tools that can capture all data packets being sent across the
entire network in the raw form.

Working: ATTACKER-----Uses sniffer for spying----- VICTIM

Threats:

Corporate Espionage, Password Stealing, IP Violation, Spying etc.

Tools:

Tcpdump, Ethereal, Dsniff and many more.


http://www.hackingmobilephones.com

SNIFFERS

COUNTERMEASURES

 Switch to Switching Networks. (Only the packets meant for that


particular host reach the NIC)

 Use Encryption Standards like SSL, SSH, IPSec.


http://www.hackingmobilephones.com

TOP 5 CORPORATE ESPIONAGE ATTACKS

• TOP 5 Corporate Espionage Attacks:

 Privacy Attacks

 Email Forging Attacks

 Sniffer Attacks

 Input Validation Attacks

 DOS Attacks
http://www.hackingmobilephones.com

Fashion Entertainment Sector

Fashion House Group

• One of the most successful fashion


designers in Europe.

• Stole all designs and marketing plans.

• Came out with the same range of


clothes a week before.

• Loss of Revenue. R&D & Creative


work down the drain.
http://www.hackingmobilephones.com

Input Validation Attacks

 Users input data into different software on an ongoing basis.

 There is usually always some sort of program (software) that accepts the
user’s input in order to either process it or store it.

 However, a problem arises when a program accepts input from the user
without validating/verifying it.

 Such instances of lazy programming (i.e. programs where the input is


NOT validated), can be exploited by attackers for malicious purposes and
are called Input Validation Attacks.

 Input Validation attacks are more reflective of poor programming


practices than smart criminal techniques.
http://www.hackingmobilephones.com

Input Validation Attacks

DANGERS

 Most common dangers of such Input Validation attacks are:

 Remote Execution of malicious commands.


 Gaining Access to Sensitive Files.
 Stealing Passwords.

 Some of the most atrocious examples of Input Validation attacks are:

• Enter 1000 random characters as the password and gain root access.
• Enter the path of the password file in the search box of a website
and actually get access to it!
http://www.hackingmobilephones.com

Input Validation Attacks

EXAMPLES: Apache Webserver

 Apache Webserver (PHF Scripting Language)

http://www.abc.com/cgi-bin/phf?Qalias=x&0a/bin/cat&20/etc/passwd

This can be re-written as:

1. Enter the normal input: /cgi-bin/phf?Qalias=x

2. Goto the next line: &0a

3. Exploit the Input validation vulnerability and execute a malicious


command:

/bin/cat /etc/passwd
http://www.hackingmobilephones.com

Input Validation Attacks

EXAMPLES: Hotmail

 Hotmail Input Validation Attack

https://register.passport.net/emailpwdreset.srf?lc=1033&em=victim@
hotmail.com&id=&cb=&[email protected]&rst=1
http://www.hackingmobilephones.com

Input Validation Attacks

EXAMPLES: MailMachine.cgi

 MailMachine is a commonly used CGI script that handles online mailing


lists.

 Unfortunately, due to poor programming it contains numerous Input


Validation attacks:

 Subscribe/Unsubscribe Anyone YOU want.

http://www.abc.com/cgi-bin/mailmachine.cgi?EMAIL
http://www.hackingmobilephones.com

Input Validation Attacks

SQL Injection Attacks

 SQL injection attacks are a form of input validation attacks wherein the
attacker uses specially crafted SQL queries or commands to carry out
malicious activities on the target system.

 This vulnerability exists due to a lack of validation of input when a


database query is made on the Internet.

 The best part about SQL injection attacks – like most other input
validation attacks— is that they can easily be executed with the help of
only a browser.
http://www.hackingmobilephones.com

Input Validation Attacks

SQL Injection Attacks: Illegal Access

 If a user wants to retrieve all records whose name field is SPORTS:

http://www.domain.com/index.asp?querystring=sports

SELECT * FROM database WHERE querystring='sports'

 However, consider the following input:

http://www.domain.com/index.asp?querystring=sports’ or 1=1–

SELECT * FROM database WHERE querystring='sports' or 1=1--'

SELECT * FROM database WHERE querystring='sports' or 1=1


http://www.hackingmobilephones.com

Input Validation Attacks

SQL Injection Attacks: Bypassing Security

 A number of systems use authentication systems in conjunction with


SQL database queries. For example, if the user enters TOM as the
username and TOM123 as the password, then the following query is
processed:

SELECT PEOPLE from database


WHERE Username=‘TOM’
AND Password=‘TOM123'
 
IF <Above SELECT command evaluates to true> {Authorize User}
ELSE {User not authorized}
http://www.hackingmobilephones.com

Input Validation Attacks

SQL Injection Attacks: Bypassing Security

 However, when an attacker enters TOM’ OR 1=1 -- as the username


and BLANK as the password, then the following query gets processed:

SELECT PEOPLE from database


WHERE Username=‘TOM’ OR 1=1--
AND Password=‘ '
 
IF <Above SELECT command evaluates to true> {Authorize User}
ELSE {User not authorized}

 Since -- is used to denote the start of comments, hence the above


query becomes:

SELECT PEOPLE from database


WHERE Username=‘TOM’ OR 1=1 //ALWAYS TRUE
http://www.hackingmobilephones.com

Input Validation Attacks

COUNTERMEASURES

 There are a variety of countermeasures that one must keep in mind to


protect against Input Validation attacks:

 Restrict User Access and File Access.


 Untrusted applications should NOT be allowed to access trusted
applications.
 Programmers should:

• Should keep security in mind.


• Make sure that your software validates input.
• Anticipate & test unexpected input situations.

 Adopt a pro-active approach rather than a re-active one.


http://www.hackingmobilephones.com

TOP 5 CORPORATE ESPIONAGE ATTACKS

• TOP 5 Corporate Espionage Attacks:

 Privacy Attacks

 Email Forging Attacks

 Sniffer Attacks

 Input Validation Attacks

 DOS Attacks
http://www.hackingmobilephones.com

Denial of Services (DOS) Attacks

DOS ATTACKS

Definition:

Such an attack clogs up so much bandwidth on the target system that it


cannot serve even legitimate users.

Working:

ATTACKER-----Infinite/ Malicious Data----- VICTIM

Tools:

Ping of Death, SYN Flooding, Teardrop, Smurf, Land [TYPES]


Trin00, Tribal Flood Network etc [TOOLS]
http://www.hackingmobilephones.com

Denial of Services (DOS) Attacks: Steps Involved.

Steps involved in DOS Attacks

1. Attacker---------Infinite/ Malicious Data-- Target Network

2. Target Network gets choked or cannot handle the malicious data and
hence crashes.

3. As a result, even legitimate clients/ people cannot connect to the


target network.

4. This results in loss of revenue, disrupt in services, inconvenience,


customer dissatisfaction and many other problems.
http://www.hackingmobilephones.com

DOS Attacks: Ping of Death Attack

PING OF DEATH

The maximum packet size allowed to be transmitted by TCP\IP on a


network is 65 536 bytes.

In the Ping of Death Attack, a packet having a size greater than this
maximum size allowed by TCP\IP, is sent to the target system.

As soon as the target system receives a packet exceeding the allowable
size, then it crashes, reboots or hangs.

This attack can easily be executed by the ‘ping’ command as follows:

ping -l 65540 hostname


http://www.hackingmobilephones.com

DOS Attacks: Tear Drop Attack

TEAR DROP ATTACKS

 Data sent from the source to the destination system, is broken down
into smaller fragments at the source system and then reassembled
into larger chunks at the destination system.

For Example,

Say data of 4000 bytes is to be sent across a network, then it is


broken down into three chunks:

1. CHUNK A contains Bytes 1 to 1500.


2. CHUNK B contains Bytes 1501 to 3000
3. CHUNK C contains Bytes 3001 to 4000

 In this example the range of CHUNK A is 1 to 1500, range of CHUNK B


is 1501 to 3000 while the range of CHUNK C is 3001 to 4000.
http://www.hackingmobilephones.com

DOS Attacks: Tear Drop Attack Contd.

TEAR DROP ATTACKS

 However, in case of a Teardrop attack, these ranges of data chunks


are overlapping. For Example, in case of a Teardrop attack, the same
4000 bytes would be broken down into the below three chunks:

1. CHUNK A contains Bytes 1 to 1500.


2. CHUNK B contains Bytes 1499 to 3000
3. CHUNK C contains Bytes 2999 to 4000

 In this example the range of CHUNK A is 1 to 1500, range of CHUNK B


is 1499 to 3000 while the range of CHUNK C is 2999 to 4000. Thus,
the ranges are overlapping.

 Since here the ranges are overlapping, the target system gets
DOS’ed!!!
http://www.hackingmobilephones.com

DOS Attacks: SMURF Attacks

SMURF ATTACKS

 In SMURF Attacks, a huge number of Ping Requests are sent to the


broadcast address of the target network, using Spoofed IP Addresses
from within the target network.

 Due to infinite loops thus generated and due to the large number of
Ping Requests, the target network will crash, restart or hang up.

 Countermeasure

Filter out all incoming packets which either:

 Has its source address same as any internal system.


 Has its target address as the broadcast address. There is NO reason
why external systems need to send data to the broadcast address.
http://www.hackingmobilephones.com

DOS Attacks: Land Attacks

LAND ATTACKS

 Some implementations of TCP/IP are vulnerable to packets which


originate and terminate from the same IP Address.

 Hence, in a LAND attack, the attacker sends infinite packets to the


victim system from the victim system itself (Spoofing!).

 The same source and target address and port number crashes the
victim system.

 Countermeasure:

• Simple filtering should solve the problem.


http://www.hackingmobilephones.com

DOS Attacks: SYN Flooding

SYN Flooding

 Normally, each TCP/IP connection is established in the classic 3-way


handshake or process:

1. Client---- SYN Packet----- Host


2. Host-----SYN\ACK Packet-- Client
3. Client---- ACK Packet--- Host

 SYN Flooding exploits this classic 3-way TCP/IP handshake. Here, the
attacker sends infinite SYN Packets to the victim computer from
spoofed IP Addresses. This creates infinite threads in the following
half-open state:

Spoofed Address--- SYN Packet---- Host


Host------- SYN/ACK Packet------ Spoofed Address
http://www.hackingmobilephones.com

DOS Attacks: SYN Flooding

SYN Flooding

 The Spoofed Address used by the attacker, can lead to 3 different


scenarios:

 The Spoofed IP Address does NOT exist.


 The Spoofed IP Address exists.
 The Spoofed IP Address is a system within the victim network.
http://www.hackingmobilephones.com

Distributed Denial of Service Attacks (dDOS Attacks)

1. DOS Attacks VS Distributed DOS Attacks

DOS Attacks Distributed-DOS Attacks

Only ONE Attacker. Several attackers.


Not that effective. More Effective.
http://www.hackingmobilephones.com

Distributed Denial of Service Attacks (dDOS Attacks)

STEPS INVOLVED IN dDOS ATTACKS

 Attacker takes control of a less secure network say X.

 Let us assume that there are 100 systems in X’s network.

 Attacker uses all these 100 systems to attack the actual target T.

 Hence, instead of one attacker, there are 100 attackers.


http://www.hackingmobilephones.com

Distributed Denial of Service Attacks (dDOS Attacks)

Tools: Tribal Flood Network (TFN)

 Attacker----------------- Clients---------------Daemons

 Allows TCP Floods, SYN Floods or UDP floods on the target system.

 No authorization required to use TFN clients.

 Communicates using ICMP, TCP and UDP protocols. Hence difficult to


block without affecting regular traffic.

 TFN2K uses random ports for communication purposes making


detection all the more difficult.
http://www.hackingmobilephones.com

Distributed Denial of Service Attacks (dDOS Attacks)

Tools: Trin00

 Attacker----------------- Masters---------------Daemons

 Allows UDP floods on the target system.

 Trin00 clients are password protected and do not allow illicit usage.
However, the password is stored in plaintext in the source code itself.

 All communication takes place on specific UDP and TCP ports.

 Allows multiple layered Masters.


http://www.hackingmobilephones.com

Distributed Denial of Service Attacks (dDOS Attacks)

Tools: Stacheldraht (Barbed Wire)

 Attacker--------- Masters(Handlers)-------Daemons (Agents)

 Combines the best features of both TFN and Trin00.

 All communication is encrypted using single key encryption.

 Communicates using the ICMP protocol. Hence, difficult to block


without affecting regular traffic.

 Uses default TCP ports (16660, 65000) for communication. Can be


changed.
http://www.hackingmobilephones.com

Denial of Services (DOS) Attacks

BUSINESS THREATS

•All services unusable.

•All users Disconnected.

•Loss of revenue.

•Deadlines can be missed.

•Unnecessary Inefficiency and Downtime.

•Share Values go down. Customer Dissatisfaction.


http://www.hackingmobilephones.com

DOS Attacks

COUNTERMEASURES

 Separate or compartmentalize critical services.


 Buy more bandwidth than normally required to count for sudden
attacks.
 Filter out USELESS/MALICIOUS traffic as early as possible.
 Disable publicly accessible services.
 Balance traffic load on a set of servers.
 Regular monitoring and working closely with ISP will always help!
 Patch systems regularly.
 IPSec provides proper verification and authentication in the IP
protocol.
 Use scanning tools to detect and remove DOS tools.
http://www.hackingmobilephones.com

Recommendations and Countermeasures

• National CERTS and Cyber Cops.

• Security EDUCATION and


TRAINING.

• Increase Security budgets.

• Invest on a dedicated security team.

• Security by obscurity?
http://www.hackingmobilephones.com

THE FINAL WORD

THE FINAL WORD

•The biggest threat that an organization faces continues to be from….

THEIR OWN EMPLOYEES!


http://www.hackingmobilephones.com

Is Internet Banking Safer than ATM Machines?

ATM MACHINES VS INTERNET BANKING

ATM Machines Internet Banking

Easier to crack. Difficult to crack, if latest SSL used.

Soft Powdery Substance. Earlier SSL standards quite weak.

Unencrypted PIN Number.

Software/ Hardware Sniffer.

Fake ATM Machine


http://www.hackingmobilephones.com

ATM Hacking
http://www.hackingmobilephones.com

ATM Hacking
http://www.hackingmobilephones.com

ATM Hacking
http://www.hackingmobilephones.com

ATM Hacking
http://www.hackingmobilephones.com

Mobile Phone Hacking

Mobile Phone Attacks

 Different Types:

 BlueJacking
 BlueSnarfing
 BlueBug Attacks
 Failed Authentication Attacks
 Malformed OBEX Attack
 Malformed SMS Text Message Attack
 Malformed MIDI File DOS Attack
 Jamming
 Viruses and Worms
 Secret Codes: *#92702689# or
#3370*
http://www.hackingmobilephones.com

AN ETHCAL GUIDE TO HACKING MOBILE PHONES


Ankit Fadia

Title: An Ethical Hacking Guide to


Hacking Mobile Phones

Author: Ankit Fadia

Publisher: Macmillan India Ltd.


http://www.hackingmobilephones.com

THE UNOFFICIAL GUIDE TO ETHICAL HACKING


Ankit Fadia

Title: The Unofficial Guide To Ethical


Hacking

Author: Ankit Fadia

Publisher: Macmillan India Ltd.


http://www.hackingmobilephones.com

NETWORK SECURITY: A HACKER’S PERSPECTIVE


Ankit Fadia

Title: Network Security: A Hacker’s


Perspective

Author: Ankit Fadia

Publisher: Macmillan India Ltd.


http://www.hackingmobilephones.com

THE ETHICAL HACKING GUIDE TO CORPORATE SECURITY


Ankit Fadia

Title: The Ethical Hacking Guide to


Corporate Security

Author: Ankit Fadia

Publisher: Macmillan India Ltd.


http://www.hackingmobilephones.com

THE ETHICAL HACKING SERIES


Ankit Fadia

Title: Email Hacking

Author: Ankit Fadia

Publisher: Vikas Publications

Title: Windows Hacking

Author: Ankit Fadia

Publisher: Vikas Publications


http://www.hackingmobilephones.com

HACKED!!! – Rourkela
Network Security

Questions?

Ankit Fadia
Intelligence Consultant cum Author
[email protected]

You might also like