16. Mobile Top 10 2016-M3-Insecure
Communication
This risk covers all aspects of getting data from
point A to point B, but doing it insecurely. It
encompasses mobile-to-mobile
communications, app-to-server
communications, or mobile-to-something-else
communications. This risk includes all
communications technologies that a mobile
device might use: TCP/IP, WiFi,
Bluetooth/Bluetooth-LE, NFC, audio, infrared,
GSM, 3G, SMS, etc.
https://www.owasp.org/index.php/Mobile_Top_
10_2016-M3-Insecure_Communication
17. Mobile Top 10 2016-M3-Insecure
Communication
This risk covers all aspects of getting data from
point A to point B, but doing it insecurely. It
encompasses mobile-to-mobile
communications, app-to-server
communications, or mobile-to-something-else
communications. This risk includes all
communications technologies that a mobile
device might use: TCP/IP, WiFi,
Bluetooth/Bluetooth-LE, NFC, audio, infrared,
GSM, 3G, SMS, etc.
https://www.owasp.org/index.php/Mobile_Top_
10_2016-M3-Insecure_Communication
C叩c r畛i ro trong truy畛n t畉i kh担ng d但y
T畉n c担ng th畛 畛ng
sniff/ eavesdropping
T畉n c担ng ch畛 畛ng
Replay
Jamming
Man in the middle
36. We have found vulnerabilities in
3G&4G cellular networks, we can
reset your bank passwords by
hijacking/intercepting SMS and
voice call
Ghost Telephonist Attack
Demo
https://youtu.be/PQF5QPCsNS0
37. Gi畉 m畉o tr畉m BTS
(kh担ng th畛c hi畛n demo)
Th畛 nghi畛m gi畉 m畉o tr畉m BTS th畛c
hi畛n cu畛c g畛i.
https://evilsocket.net/2016/03/31/how-to-build-
your-own-rogue- mgs - sbt - rfo -fun-and- /profit
Ch炭 箪:
C叩c th畛 nghi畛m trong bi tr狸nh by
動畛c gi畛i h畉n 畛i t動畛ng th畛
nghi畛m, 動畛c gi叩m s叩t trong khu
v畛c kh担ng g但y can nhi畛u. Ng動畛i
d湛ng kh担ng t畛 th畛c hi畛n n畉u kh担ng
畉m b畉o c叩c y棚u c畉u an ton k畛
thu畉t ho畉c vi ph畉m ph叩p lu畉t.