A mobile attack can involve the device
layer, the network layer, the data centre, or a combination of these. Inherent
platform vulnerabilities and social engineering continue to pose major
opportunities for cyber thieves and thus significant challenges for those
looking protect user data.
If you’ve been the victim of a mobile
attack, don’t hesitate – contact the digital forensic experts at DLA and we can
help you recover your precious cellular data quickly and effectively.
ATTACK SURFACE: DEVICE
Browser
- Phishing
- Framing
- Clickjacking
- Man-in-the-middle
- Buffer Overflow
- Data Caching
- Framing
- Clickjacking
- Man-in-the-middle
- Buffer Overflow
- Data Caching
System
- No Passcode / Weak Passcode
- iOS Jailbreaking
- Android Rooting
- OS Data Caching
- Passwords & Data Accessible
- Carrier-Loaded Software
- No Encryption / Weak Encryption
- User-Initiated Code
- iOS Jailbreaking
- Android Rooting
- OS Data Caching
- Passwords & Data Accessible
- Carrier-Loaded Software
- No Encryption / Weak Encryption
- User-Initiated Code
Phone / SMS
- Baseband Attacks
- SMishing
- SMishing
Apps
- Sensitive Data Storage
- No Encryption / Weak Encryption
- Improper SSL Validation
- Config Manipulation
- Dynamic Runtime Injection
- Unintended Permissions
- Escalated Privileges
- No Encryption / Weak Encryption
- Improper SSL Validation
- Config Manipulation
- Dynamic Runtime Injection
- Unintended Permissions
- Escalated Privileges
Malware
ATTACK SURFACE: NETWORK
- Wi-Fi (No Encryption / Weak Encryption)
- Rogue Access Point
- Packet Sniffing
- Man-In-The-Middle (MITM)
- Session Hijacking
- DNS Poisoning
- SSL Strip
- Fake SSL Certificate
- Rogue Access Point
- Packet Sniffing
- Man-In-The-Middle (MITM)
- Session Hijacking
- DNS Poisoning
- SSL Strip
- Fake SSL Certificate
ATTACK SURFACE: DATA CENTRE
Web Server
- Platform Vulnerabilities
- Server Misconfiguration
- Cross-site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- Weak Input Validation
- Brute Force Attacks
- Server Misconfiguration
- Cross-site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- Weak Input Validation
- Brute Force Attacks
Database
- SQL Injection
- Privilege Escalation
- Data Dumping
- OS Command Execution
- Privilege Escalation
- Data Dumping
- OS Command Execution
No comments:
Post a Comment