SlideShare uma empresa Scribd logo
1 de 29
Baixar para ler offline
DIGITAL FORENSICS UNIT 5
SIM Cards
•Many mobile phones use a special smart card called a
subscriber identity module card (SIM card).
•A SIM card is issued by a network provider. It maintains
personal and contact information for a user and allows
the user to authenticate to the cellular network of the
provider.
2
SIM Card
•SIM cards contain several pieces of information that are
used to identify the owner and authenticate to the
appropriate cell network.
•Each SIM card corresponds to a record in the database of
subscribers maintained by the network provider.
•A SIM card features an integrated circuit card ID (ICCID),
•which is a unique 18-digit number used for hardware
identification.
3
SIM Card
•Next, a SIM card contains a unique international mobile
subscriber identity (IMSI), which identifies the owner’s
country, network, and personal identity.
•SIM cards also contain a 128-bit secret key. This key is
used for authenticating a phone to a mobile network.
•As an additional security mechanism, many SIM cards
require a PIN before allowing any access to information
on the card.
4
INTERNATIONAL MOBILE EQUIPMENT IDENTITY
 15-digit number unique to each device
 Phone carriers and manufacturers share IMEI numbers to enable tracking of smartphoes that may be
stolen or compromised.
 IMEI number of your mobil does not have any other phone in the world, and when your device
connects to a network it automatically sends this identifier.
INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
 unique number, usually fifteen digits, associated with Global
System for Mobile Communications (GSM) and Universal Mobile
Telecommunications System (UMTS) , identifying a GSM subscriber
 This number has two parts.
 The initial part is comprised of six digits in the North American standard and five digits
in the European standard. It identifies the GSM network operator in a specific country
with whom the subscriber holds an account.
 The second part is allocated by the network operator to uniquely identify the subscriber.
 The IMSI is stored in the Subscriber Identity Module (SIM) inside
the phone and is sent by the phone to the appropriate network.
INTEGRATED CIRCUIT CARD IDENTIFICATION NUMBER (ICCID)
 unique identifier of a Subscriber Identity Module (SIM card) on a mobile device
 stored in the SIM cards and printed on the SIM card body
 19 or 20 characters containing the Industry Identifier (ISO), country code, issuer identity, account ID,
and other data which allows the network operator to identify the card
MSISDN (MOBILE STATION INTERNATIONAL SUBSCRIBER DIRECTORY
NUMBER)
 uniquely identifies a subscription in a GSM network
 phone number associated with a single SIM card
 he number to which you call or send an SMS message
 used to identify a mobile user when they make a call or send an SMS.
 International Telecommunication Union Telecommunication Standardization Sector (ITU-T) - limits the
maximum length of an MSISDN to 15 digits.
 1-3 digits are reserved for country code
SIM CLONING`
 creating a copy of a SIM (Subscriber Identity Module) card
 Unique Identification Number (ICCID), International Mobile Subscriber
Identification Number (IMSI)
 Including encryption keys – (used to secure data on a SIM card)
WHAT TOOLS DOES THE HACKER USE FOR SIM CLONING?
 Blank SIM card
 SIM card reader
 SIM cloning software
 SIM card hacking hardware
 Mobile device
SIM CLONING TECHNIQUES
 Physical SIM cloning
 Software-based SIM cloning
 Hardware-based SIM cloning
BLUETOOTH VULNERABILITIES
 BlueSmacking
 DoS -send a really oversized data packet
 BlueJacking
 one Bluetooth device hijacks another with spam advertising
 BlueSnarfing
 can take data- s as your text messages, emails, photos, and the unique identifying
information that your phone or laptop uses with your cellular provider or ISP
 BlueBugging
 to establish a backdoor on a victim’s phone or laptop.
POINT OF SALE (POS) DEVICES
IOT DEVICE VULNERABILITIES
 Weak/Hardcoded Passwords
 Insecure Networks
 Insecure Ecosystem Interfaces - such as application programming interfaces
(APIs) and mobile and web applications
 Insecure Update Mechanisms
 Insecure or Outdated Components
 Insecure Default Settings
JUICE JACKING
 Data theft
 Malware Installation
VOICE OVER INTERNET PROTOCOL (VOIP)
 Five types of VoIP hacking
 Unauthorized use
 Toll fraud
 Caller ID spoofing
 Eavesdropping
VISHING (VOIP PHISHING)
 Voice Phishing - Voice phishing is the criminal practice of using social
engineering over the telephone system to gain access to personal and
financial information from the public for the purpose of financial reward.
Sometimes referred to as 'vishing’, Voice phishing is typically used to steal
credit card numbers or other information used in identity theft schemes from
individuals.
TOLL FRAUDS
 International Revenue Sharing Fraud (IRSF)
 fraudsters use your phone lines, equipment, or services to generate high
volumes of fake long-distance, international, or premium-rate calls while the
company owning the targeted system gets charged for them
 Fraudsters can target mobile phones, calling cards, pay phones, and phone
systems
TOLL FRAUDS - TECHNIQUES
• Port Scanning: The Session Initiation Protocol (SIP) for VoIP
uses TCP ports 5060 and 5061 so an unsecured, internet-facing
SIP server is easy to locate.
• Passwords: SIP (Session Initiation Protocol) trunks and SIP
extensions use passwords, so weak or leaked passwords create a
vulnerability.
• Servers: VoIP uses SIP servers that attackers can gain
unauthorized access to and reconfigure.
• Voice Verification Code Spamming: Scripted attacks targeting
SMS.
PHONE PHREAKING
 manipulating or hacking into a telephone system to make free or
unauthorized calls
 to make long-distance calls for free or to access other services such as
voicemail or conference calling
OPERATING SYSTEM ON MOBILES PHONES
 Mobile Operating System Structure
 Mobile Operating System Platforms
 Java ME Platform
 Palm OS
 Symbian OS
 Linux OS
 Window Phone OS
 Google Android Platform
 Apple iOS
MOBILE OS FEATURES
 Features
 Multitasking
 Scheduling
 Memory Allocation
 File System Interface
 Keypad Interface
 I/O Interface
 Protection and Security
 Multimedia features
INTRO TO MOBILE OS
 Design and capabilities of a Mobile OS (Operating System) is
very different than a general purpose OS running on desktop
machines:
 constraints and restrictions on their physical characteristic
such as screen size, memory, processing power and etc.
 Scarce availability of battery power
 Limited amount of computing and communication
capabilities
 Operating System is a piece of software responsible for
management of operations, control, coordinate the use of the
hardware among the various application programs, and
sharing the resources of a device.
OPERATING SYSTEM STRUCTURE
 A mobile OS is a software platform on top of which other programs called
application programs, can run on mobile devices such as PDA, cellular
phones, smartphone and etc.
Low-Level Hardware, Manufacturer Device Drivers
Device Operating System Base, Kernel
OS Libraries
Applications
MARKET SHARE
GOOGLE ANDROID OS
 It is a platform and an operating system for mobile devices based on the
Linux operating system.
 It allows developers design applications in a java-like language using
Google-developed java libraries.
 It supports a wide variety of connectivity such as GSM, WiFi, 3G, LTE
 As of Q3 of 2012, 500 million devices and 1.3 million new activation per day.
 Now version 14
GOOGLE ANDROID OS
Android architecture: http://code.google.com/android/what-is-android.html
APPLE IOS
 iOS is an operating system run on iPhone, iPad and iPod touch.
 It is based on Mach Kernel and Drawin core as Mac OS X.
 The Mac OS X kernel includes the following component:
 Mach Kernel
 BSD
 I/O component
 File Systems
 Networking components
APPLE IOS
 Mac OS X has a preemptive multitasking environment.
 Preempting is the act of taking the control of operating system from one
task and giving it to another task.
 It supports real-time behavior.
 As of half of 2012, it had 23% share of smart phone OS units sold. 410
million devices activated.
 65% of mobile web data consumption.
 Most recent version iOS 17.3

Mais conteúdo relacionado

Semelhante a Investigation and Analysis of Digital Evidence

Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
Tyler Shields
 
Roamly Mobile - SIM Overlay Overview
Roamly Mobile - SIM Overlay OverviewRoamly Mobile - SIM Overlay Overview
Roamly Mobile - SIM Overlay Overview
Robert Bent
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
Tyler Shields
 

Semelhante a Investigation and Analysis of Digital Evidence (20)

Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server
 
Report demo(1)
Report demo(1)Report demo(1)
Report demo(1)
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
Internet of things security multilayered method for end to end data communi...
Internet of things security   multilayered method for end to end data communi...Internet of things security   multilayered method for end to end data communi...
Internet of things security multilayered method for end to end data communi...
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
 
Roamly Mobile - SIM Overlay Overview
Roamly Mobile - SIM Overlay OverviewRoamly Mobile - SIM Overlay Overview
Roamly Mobile - SIM Overlay Overview
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 
a-presentation-on-wireless-communication
 a-presentation-on-wireless-communication a-presentation-on-wireless-communication
a-presentation-on-wireless-communication
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
z/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Previewz/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Preview
 
FIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile Connect
 
SMART PHONE
SMART PHONE SMART PHONE
SMART PHONE
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
ESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--editionESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--edition
 
Android phone identifiers and eavesdropping audio
Android phone identifiers and eavesdropping audioAndroid phone identifiers and eavesdropping audio
Android phone identifiers and eavesdropping audio
 

Mais de Don Caeiro

Mais de Don Caeiro (20)

Network Forensics- Social Media Forensics
Network Forensics- Social Media ForensicsNetwork Forensics- Social Media Forensics
Network Forensics- Social Media Forensics
 
Mobile Forensics and Investigation Android Forensics
Mobile Forensics and Investigation Android ForensicsMobile Forensics and Investigation Android Forensics
Mobile Forensics and Investigation Android Forensics
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
Windows Forensics- Introduction and Analysis
Windows Forensics- Introduction and AnalysisWindows Forensics- Introduction and Analysis
Windows Forensics- Introduction and Analysis
 
Crime Scene Photography
Crime Scene PhotographyCrime Scene Photography
Crime Scene Photography
 
Recording of Fingeprints
Recording of FingeprintsRecording of Fingeprints
Recording of Fingeprints
 
Legal Aspects of Questioned Documents
Legal Aspects of Questioned DocumentsLegal Aspects of Questioned Documents
Legal Aspects of Questioned Documents
 
Criminal Justice System.pptx
Criminal Justice System.pptxCriminal Justice System.pptx
Criminal Justice System.pptx
 
Forensic Medicine
Forensic MedicineForensic Medicine
Forensic Medicine
 
Securing the Crime Scene
Securing the Crime SceneSecuring the Crime Scene
Securing the Crime Scene
 
Types of Crime Scenes
Types of Crime ScenesTypes of Crime Scenes
Types of Crime Scenes
 
Biometrics
BiometricsBiometrics
Biometrics
 
Working of Volatile and Non-Volatile memory
Working of Volatile and Non-Volatile memoryWorking of Volatile and Non-Volatile memory
Working of Volatile and Non-Volatile memory
 
Introduction to Digital Forensics
Introduction to Digital ForensicsIntroduction to Digital Forensics
Introduction to Digital Forensics
 
Forensic engineering
Forensic engineeringForensic engineering
Forensic engineering
 
Forensic archaeology
Forensic archaeologyForensic archaeology
Forensic archaeology
 
Currency notes and passports security features
Currency notes and passports security featuresCurrency notes and passports security features
Currency notes and passports security features
 
Questioned documents Full PPT
Questioned documents Full PPTQuestioned documents Full PPT
Questioned documents Full PPT
 
Footprint case study
Footprint case studyFootprint case study
Footprint case study
 
Criminalistics Unit 3
Criminalistics Unit 3Criminalistics Unit 3
Criminalistics Unit 3
 

Último

Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
SaadHumayun7
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Último (20)

Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdfPost Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
The Ultimate Guide to Social Media Marketing in 2024.pdf
The Ultimate Guide to Social Media Marketing in 2024.pdfThe Ultimate Guide to Social Media Marketing in 2024.pdf
The Ultimate Guide to Social Media Marketing in 2024.pdf
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 

Investigation and Analysis of Digital Evidence

  • 2. SIM Cards •Many mobile phones use a special smart card called a subscriber identity module card (SIM card). •A SIM card is issued by a network provider. It maintains personal and contact information for a user and allows the user to authenticate to the cellular network of the provider. 2
  • 3. SIM Card •SIM cards contain several pieces of information that are used to identify the owner and authenticate to the appropriate cell network. •Each SIM card corresponds to a record in the database of subscribers maintained by the network provider. •A SIM card features an integrated circuit card ID (ICCID), •which is a unique 18-digit number used for hardware identification. 3
  • 4. SIM Card •Next, a SIM card contains a unique international mobile subscriber identity (IMSI), which identifies the owner’s country, network, and personal identity. •SIM cards also contain a 128-bit secret key. This key is used for authenticating a phone to a mobile network. •As an additional security mechanism, many SIM cards require a PIN before allowing any access to information on the card. 4
  • 5. INTERNATIONAL MOBILE EQUIPMENT IDENTITY  15-digit number unique to each device  Phone carriers and manufacturers share IMEI numbers to enable tracking of smartphoes that may be stolen or compromised.  IMEI number of your mobil does not have any other phone in the world, and when your device connects to a network it automatically sends this identifier.
  • 6. INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)  unique number, usually fifteen digits, associated with Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS) , identifying a GSM subscriber  This number has two parts.  The initial part is comprised of six digits in the North American standard and five digits in the European standard. It identifies the GSM network operator in a specific country with whom the subscriber holds an account.  The second part is allocated by the network operator to uniquely identify the subscriber.  The IMSI is stored in the Subscriber Identity Module (SIM) inside the phone and is sent by the phone to the appropriate network.
  • 7. INTEGRATED CIRCUIT CARD IDENTIFICATION NUMBER (ICCID)  unique identifier of a Subscriber Identity Module (SIM card) on a mobile device  stored in the SIM cards and printed on the SIM card body  19 or 20 characters containing the Industry Identifier (ISO), country code, issuer identity, account ID, and other data which allows the network operator to identify the card
  • 8. MSISDN (MOBILE STATION INTERNATIONAL SUBSCRIBER DIRECTORY NUMBER)  uniquely identifies a subscription in a GSM network  phone number associated with a single SIM card  he number to which you call or send an SMS message  used to identify a mobile user when they make a call or send an SMS.  International Telecommunication Union Telecommunication Standardization Sector (ITU-T) - limits the maximum length of an MSISDN to 15 digits.  1-3 digits are reserved for country code
  • 9. SIM CLONING`  creating a copy of a SIM (Subscriber Identity Module) card  Unique Identification Number (ICCID), International Mobile Subscriber Identification Number (IMSI)  Including encryption keys – (used to secure data on a SIM card)
  • 10. WHAT TOOLS DOES THE HACKER USE FOR SIM CLONING?  Blank SIM card  SIM card reader  SIM cloning software  SIM card hacking hardware  Mobile device
  • 11. SIM CLONING TECHNIQUES  Physical SIM cloning  Software-based SIM cloning  Hardware-based SIM cloning
  • 12. BLUETOOTH VULNERABILITIES  BlueSmacking  DoS -send a really oversized data packet  BlueJacking  one Bluetooth device hijacks another with spam advertising  BlueSnarfing  can take data- s as your text messages, emails, photos, and the unique identifying information that your phone or laptop uses with your cellular provider or ISP  BlueBugging  to establish a backdoor on a victim’s phone or laptop.
  • 13. POINT OF SALE (POS) DEVICES
  • 14. IOT DEVICE VULNERABILITIES  Weak/Hardcoded Passwords  Insecure Networks  Insecure Ecosystem Interfaces - such as application programming interfaces (APIs) and mobile and web applications  Insecure Update Mechanisms  Insecure or Outdated Components  Insecure Default Settings
  • 15. JUICE JACKING  Data theft  Malware Installation
  • 16. VOICE OVER INTERNET PROTOCOL (VOIP)  Five types of VoIP hacking  Unauthorized use  Toll fraud  Caller ID spoofing  Eavesdropping
  • 17. VISHING (VOIP PHISHING)  Voice Phishing - Voice phishing is the criminal practice of using social engineering over the telephone system to gain access to personal and financial information from the public for the purpose of financial reward. Sometimes referred to as 'vishing’, Voice phishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals.
  • 18. TOLL FRAUDS  International Revenue Sharing Fraud (IRSF)  fraudsters use your phone lines, equipment, or services to generate high volumes of fake long-distance, international, or premium-rate calls while the company owning the targeted system gets charged for them  Fraudsters can target mobile phones, calling cards, pay phones, and phone systems
  • 19. TOLL FRAUDS - TECHNIQUES • Port Scanning: The Session Initiation Protocol (SIP) for VoIP uses TCP ports 5060 and 5061 so an unsecured, internet-facing SIP server is easy to locate. • Passwords: SIP (Session Initiation Protocol) trunks and SIP extensions use passwords, so weak or leaked passwords create a vulnerability. • Servers: VoIP uses SIP servers that attackers can gain unauthorized access to and reconfigure. • Voice Verification Code Spamming: Scripted attacks targeting SMS.
  • 20. PHONE PHREAKING  manipulating or hacking into a telephone system to make free or unauthorized calls  to make long-distance calls for free or to access other services such as voicemail or conference calling
  • 21. OPERATING SYSTEM ON MOBILES PHONES  Mobile Operating System Structure  Mobile Operating System Platforms  Java ME Platform  Palm OS  Symbian OS  Linux OS  Window Phone OS  Google Android Platform  Apple iOS
  • 22. MOBILE OS FEATURES  Features  Multitasking  Scheduling  Memory Allocation  File System Interface  Keypad Interface  I/O Interface  Protection and Security  Multimedia features
  • 23. INTRO TO MOBILE OS  Design and capabilities of a Mobile OS (Operating System) is very different than a general purpose OS running on desktop machines:  constraints and restrictions on their physical characteristic such as screen size, memory, processing power and etc.  Scarce availability of battery power  Limited amount of computing and communication capabilities  Operating System is a piece of software responsible for management of operations, control, coordinate the use of the hardware among the various application programs, and sharing the resources of a device.
  • 24. OPERATING SYSTEM STRUCTURE  A mobile OS is a software platform on top of which other programs called application programs, can run on mobile devices such as PDA, cellular phones, smartphone and etc. Low-Level Hardware, Manufacturer Device Drivers Device Operating System Base, Kernel OS Libraries Applications
  • 26. GOOGLE ANDROID OS  It is a platform and an operating system for mobile devices based on the Linux operating system.  It allows developers design applications in a java-like language using Google-developed java libraries.  It supports a wide variety of connectivity such as GSM, WiFi, 3G, LTE  As of Q3 of 2012, 500 million devices and 1.3 million new activation per day.  Now version 14
  • 27. GOOGLE ANDROID OS Android architecture: http://code.google.com/android/what-is-android.html
  • 28. APPLE IOS  iOS is an operating system run on iPhone, iPad and iPod touch.  It is based on Mach Kernel and Drawin core as Mac OS X.  The Mac OS X kernel includes the following component:  Mach Kernel  BSD  I/O component  File Systems  Networking components
  • 29. APPLE IOS  Mac OS X has a preemptive multitasking environment.  Preempting is the act of taking the control of operating system from one task and giving it to another task.  It supports real-time behavior.  As of half of 2012, it had 23% share of smart phone OS units sold. 410 million devices activated.  65% of mobile web data consumption.  Most recent version iOS 17.3

Notas do Editor

  1. https://www.verizon.com/articles/prepaid-and-cpo/what-to-know-when-buying-a-used-phone/#:~:text=IMEI%20number%20basics.,may%20be%20stolen%20or%20compromised.
  2. https://www.techopedia.com/definition/5067/international-mobile-subscriber-identity-imsi
  3. https://melroselabs.com/glossary/msisdn-mobile-station-international-subscriber-directory-number/#:~:text=MSISDN%20(Mobile%20Station%20International%20Subscriber,or%20send%20an%20SMS%20message.
  4. https://x-it.medium.com/sim-cloning-101-the-basics-and-beyond-8bbd6b8fc0b6
  5. https://cybersecurity.att.com/blogs/security-essentials/bluetooth-security-risks-explained
  6. https://www.encora.com/insights/the-security-vulnerabilities-of-pos https://www.forbes.com/sites/forbestechcouncil/2017/09/27/the-vulnerabilities-of-a-pos-system/?sh=4cf7821a4b58
  7. https://www.fortinet.com/resources/cyberglossary/iot-device-vulnerabilities#:~:text=Weak%2FHardcoded%20Passwords,and%20launch%20large%2Dscale%20attacks.
  8. https://www.malwarebytes.com/blog/news/2019/11/explained-juice-jacking
  9. https://www.nextiva.com/blog/voip-hacking.html
  10. https://www.techtarget.com/searchunifiedcommunications/definition/vishing
  11. https://datadome.co/learning-center/toll-fraud-prevention/#:~:text=protecting%20your%20business.-,What%20is%20toll%20fraud%3F,system%20gets%20charged%20for%20them.
  12. https://datadome.co/learning-center/toll-fraud-prevention/#:~:text=protecting%20your%20business.-,What%20is%20toll%20fraud%3F,system%20gets%20charged%20for%20them.
  13. https://wiki.preterhuman.net/Beginner%27s_Guide_to_Phreaking