Ppt on bluetooth hacking working

Doc.: IEEE 802.15- Submission, Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [6TiSCH Overview.

/draft-ietf-6lo-6lobac http://tools.ietf.org/html/draft-wang-6tisch-6top-sublayer Bluetooth Low Energy DECT Ultra Low Energy Zwave Near Field Comms BACNET 802.15.4e /- Submission Charter Recap, doc.: IEEE 802.15- Submission 8 Description of Working Group The Working Group will focus on enabling IPv6 over the TSCH mode of the IEEE802.15/doc.: IEEE 802.15- Submission Complexity To even reach 24 bits, new proposal “hacks” IPHC IPHC first bits would have multiple interpretations A really clean version with a new/


Doc.: IEEE 802.15-01/137r1 Submission March 2001 Heikki Huomo/Juha Salokannel, NokiaSlide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area.

2001 Heikki Huomo/Juha Salokannel, NokiaSlide 5 The Web of Trillion Devices 2...3G Wireless Bluetooth IrDA WPAN RFID 1 K Operators -- 1 M E-businesses -- 1 B People --/ well. At home, I am the superuser. At office, a humble worker :-) Only works on me. Talks to the various login controls and hooks me up with minimum hassle. /Juha Salokannel, NokiaSlide 9 Lego-like stuff with embedded electronics This kid here hacked a motion capture and automated navigation system into his PAN enabled PowerTransformer hero. /


Communications, networks and internet

Area Network (WAN) The INTERNET Intranet Extranet LAN If you are connection to a LAN you can still work outside of the LAN. You can work independently A LAN is a connection of computers that can share resources on a network. For a workstation/, or usernames and passwords for online banks Phishing attacks are usually made by email. Bluesnarfing Bluesnarfing is the art of hacking a Bluetooth connection. This allows access to a calendar, contact list, emails and text messages, and on some phones users can copy/


1 The Security and Privacy of Smart Vehicles Jean-Pierre Hubaux EPFL Joint work with Srdjan Capkun, Jun Luo, and Maxim Raya

(3)  EMERGENCY VEHICLE SIGNAL PREEMPTION  ROAD CONDITION WARNING  LOW BRIDGE WARNING  WORK ZONE WARNING  IMMINENT COLLISION WARNING (D)  CURVE SPEED ASSISTANCE [ROLLOVER WARNING] (1/Tamper-resistant hardware  Symmetric crypto Problem: an authenticated receiver can hack the system  Asymmetric crypto Problem: additional delay 24 Distance / Service: alternative technologies (e.g., UWB, UTRA-TDD, and Bluetooth) can temporarily support communications 36 Conclusion  The security of vehicular communications/


Work through these.... Acronym – match ‘em up Voip SMS PIN SSID URL LED VLE GPS ISP CCV HTTP USB HDMI Voice over the internet protocol High Definition.

URL LED VLE GPS ISP CCV HTTP USB HDMI A place you can log into and work online – (mymaths) A connector that can be used for peripheral devices An example is/– which belongs where? Downloading music from the internet without paying for it Hacking into a computer to access data Creating a virus to cause harm to someone’s computer/2. Suggest what device might be connected Phones...What? Uh?...Err? Accelerometer NFC GPS WiFi Bluetooth Portable hotspot Flight mode QR Code A chip that can be used to pay for stuff /


Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Chapter Fourteen Working with Remote Access Objectives Examines/being logged on to. PAP has a few weak points. The most significant weak is too easy to be hacked. Authentication in PPP – Challenge Handshake Protocol (CHAP) Three-way handshake When CHAP is first configured on a /way of packet-switching technologies. – Cellular Digital Packet Data (CDPD) – General Packet Radio Service (GPRS) – WCDMA/3G – Bluetooth – Frame Relay – ATM – Sonet/SDH T-lines and E-lines Digital Trunk Line (T1) is used to solve two /


This presentation is an outgrowth of work done under contract to the Institute for Telecommunication Sciences and does not represent the views or policies.

This presentation is an outgrowth of work done under contract to the Institute for Telecommunication Sciences and does not represent the views or policies of the United States federal /.org/advisories.html Dominic Spill and Andrea Bittau. BlueSniff: Eve meets Alice and Bluetooth. http://www.usenix.org/event/woot07/tech/full_papers/spill/ http://www.usenix.org/event/woot07/tech/full_papers/spill/ Henryk Plötz. RFID Hacking. http://events.ccc.de/congress/2006/Fahrplan/events/1576.en.html http://events.ccc/


CSCI 6361: Topics in Mobile Computing Dept. of Computer Science University of New Orleans Fall 2004 Dr. Golden G. Richard III.

typically doesn’t do it all… Poor compatibility between devices Functionality is often duplicated “work belt” syndrome for the mobile computing nerd Bluetooth will help, but bandwidth limited Service discovery and better device cooperation to overcome poverty/G. Richard III, Department of Computer Science, University of New Orleans, 2004 142 Idea: Force Fast Retransmit Hack network stack to force fast retransmission immediately after handoff is complete. Makes connection resume operation almost 0.6sec faster/


Mobile Device Security: Threats, Governance, and Safeguards Larry G. Wlosinski, CISSP, CAP, CCSP, CISM, CISA, CRISC, CBCP, CDP, ITIL v3

that many sensitive medical/healthcare apps have been hacked – 90% of Android apps have been hacked, 22% of these apps were FDA approved /Adopt virtualization and sandbox technologies to contain sensitive data; and (v)Work closely with a carrier that understands data ownership and retention issues and/calendaring, contacts, application installation services, etc.  Manage wireless network interfaces (Wi-Fi, Bluetooth, etc.)  Automatically monitor, detect, and report when policy violations occur, such as /


Broadcast Technology RTV 151 Telephony Internet & WWW Broadband etc. Telephony Internet & WWW Broadband etc.

wireless networking technologies, and includes the now ubiquitous 802.15.1 working group, which is also known as Bluetooth. Developing Technologies G Bluetooth G Name comes from Harald Bluetooth, king of Denmark in the late 900s G There are lots /G Encryption types G WEP -- Wired Equivalency Privacy G easily hacked -- do a ‘Cracking wi-fi’ or cracking WEP search on YouTube Wireless Hacking / WEP hacking / Free wi-fi anywhere Wireless Hacking WEP hacking Free wi-fi anywhere G WPA -- Wi-Fi Protected Access /


Broadcast Technology RTV 151 Telephony Internet & WWW Broadband & Wireless Digital Mobile Communication Telephony Internet & WWW Broadband & Wireless Digital.

Group 15 deals specifically with wireless networking technologies, and includes the now ubiquitous 802.15.1 working group, which is also known as Bluetooth. More wireless data transfer… G Like AppleWatch, ApplePay G Near field communication (NFC) is/G Encryption types G WEP -- Wired Equivalency Privacy G easily hacked -- do a ‘Cracking wi-fi’ or cracking WEP search on YouTube Wireless Hacking / WEP hacking / Free wi-fi anywhere Wireless Hacking WEP hacking Free wi-fi anywhere G WPA -- Wi-Fi Protected Access/


Broadcast Technology RTV 151 Telephony Internet & WWW Broadband & Wireless Digital Mobile Communication Telephony Internet & WWW Broadband & Wireless Digital.

devices can connect to one another--Component cables, Electrical wires, Ethernet cables, WiFi, Infrared signals… G Bluetooth: a networking standard that works at two levels: G Agreement at the physical level – it’s a radio-frequency standard; G AND/G Encryption types G WEP -- Wired Equivalency Privacy G easily hacked -- do a ‘Cracking wi-fi’ or cracking WEP search on YouTube Wireless Hacking / WEP hacking / Free wi-fi anywhere Wireless Hacking WEP hacking Free wi-fi anywhere G WPA -- Wi-Fi Protected Access /


Unit 4 Networks. Computer Networks A computer network is a collection of computers linked together so that they can communicate with each other A computer.

data from and to its own node. Works effectively when processing is distributed across a site. Works effectively when processing is distributed across a site/ and accounting network control and accounting Wireless Media Infra-red Radiowaves Bluetooth Broadband Microwaves Mobile phones use microwaves. Ideal for linking computers in/of User needs Future proofing Future proofing Security strategies Threats: Hacking Hacking Spreading viruses Spreading viruses Deliberate or accidental destruction of data /


NETWORK SECURITY. INTRODUCTION Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However,

as friendly as possible – when you plug the device it starts working right away, usually with no security by default. Several ways wireless nets handle security  802.11i  Bluetooth  WAP 2.0 WIRELESS SECURITY: 802.11 SECURITY IEEE 802.11i/ instructions for how to remedy them. This method has been in use from the early days of computers. ETHICAL HACKING: Goals Hack your systems in a non destructive fashion Enumerate vulnerabilities and if, necessary, prove to upper management that vulnerabilities exists/


How to secure the Internet of Things?

This can be accomplished using power analysis, or fault injection (glitching) attacks. Note: Not all “hacks” are really security attacks (although often advertised as such). For example, replacing the firmware of /Bluetooth Smart devices Examples Fitbit Zepp Golf Sensor Garmin Forerunner 920XT Oral-B Toothbrush Device via Gateway to Cloud Characteristics: Device uploads data to cloud service indirectly via a network gateway (which often implements several radio technologies). Device is pre-configured to work/


Unit 4 Networks. Computer Networks A computer network is a collection of computers linked together so that they can communicate with each other A computer.

data from and to its own node. Works effectively when processing is distributed across a site. Works effectively when processing is distributed across a site/and vice versa *network control and accounting Wireless Media Infra-red Radiowaves Bluetooth Broadband Microwaves Mobile phones use microwaves. Ideal for linking computers in /of User needs Future proofing Future proofing Security strategies Threats; Hacking Hacking Spreading viruses Spreading viruses Deliberate or accidental destruction of data /


Wireless Sensor Systems: Security Implications for the Industrial Environment Dr. Peter L. Fuhr Chief Scientist RAE Systems, Sunnyvale, CA

ISA Wireless Security, P. Fuhr 16 Technology Group: Key Issues Security –Jamming, hacking, and eavesdropping Power Value (clear to customer) Interoperability –Co-existence with other /Permanent relationship and Restricted Services ISA Wireless Security, P. Fuhr 80 Bluetooth Security 3 Levels of Service Access –Require Authorization and Authenication –/continually check for network activity. Card and Socket Services: Packages that work with the host computer operating system, enabling the Wireless LAN adapter/


More on digital media.... First -- creative shooting/editing Check YouTube -- note when to follow advice and when they’re not so good Sample 1 / Sample.

wireless networking technologies, and includes the now ubiquitous 802.15.1 working group, which is also known as Bluetooth. Developing Technologies Bluetooth Name comes from Harald Bluetooth, king of Denmark in the late 900s There are lots of /public places Encryption types WEP -- Wired Equivalency Privacy easily hacked -- do a ‘Cracking wi-fi’ or cracking WEP search on YouTube Wireless Hacking / WEP hacking / Free wi-fi anywhere Wireless Hacking WEP hacking Free wi-fi anywhere WPA -- Wi-Fi Protected Access /


Overview digital media.... Discussion -- revisit theory What does ‘the media’ refer to? Press, cinema, broadcasting, etc.) The ‘new media’ as a term?

networking technologies, and includes the now ubiquitous 802.15.1 working group, which is also known as Bluetooth. Other Wireless Technologies Bluetooth Name comes from Harald Bluetooth, king of Denmark in the late 900s There are lots of/public places Encryption types WEP -- Wired Equivalency Privacy easily hacked -- do a ‘Cracking wi-fi’ or cracking WEP search on YouTube Wireless Hacking / WEP hacking / Free wi-fi anywhere Wireless Hacking WEP hacking Free wi-fi anywhere WPA -- Wi-Fi Protected Access /


Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 1-1© 2007 Prentice-Hall, Inc ELC 200 Day 10.

the physical transmission component of a Bluetooth device Link manager protocol (LMP) is a Bluetooth layer that sets up ongoing link management with Bluetooth devices –Piconet management –Link configuration –Security functions Hacking of Bluetooth is called War Nibbling and bluecasingWar/ used User is served by a succession of satellites 6-22 © 2007 Prentice-Hall, Inc How Cellular Works Network of cell sites distributed over a wide area –Radio transceiver –Base station controller –Tower and antennas Mobile/


Make sure you understand

connecting your tablet to other devices/software/apps Examples synchronise your Facebook to work on your PC and your tablet synchronise your Facebook with your calendar / accidentally deleting or overwriting files lost or become corrupted by computer viruses, hacked into by unauthorised users and deleted or altered destroyed by natural disasters,/ even TVs!). It is secure and has a long battery life. Uses: Bluetooth headset, Sending/Receiving files on phones, Car-Phone connection, Wireless games controllers. /


Lets test YOUR knowledge!

a computer system which you have no access to (hacking) Always make sure hat you log you user area o before leaving work (or when your away from your PC) Use company smartphone for work related business only Do not download any apps onto your/. It can be used in anything (phones, computers, even TVs!). It is secure and has a long battery life. Uses: Bluetooth headset, Sending/Receiving files on phones, Car-Phone connection, Wireless games controllers. USB - This is a standard technology on most computers/


CIA XXIV Copyright (C) 2004 Robert C. Jones, M.D. All Rights Reserved. Wireless LAN IN security 2004 Robert C. Jones, M.D. LtCol, USAF, Medical Corps.

the original sources should increase the market value of said copyrighted works by increasing traffic to the websites presenting this material. l This/ Uncommon alternatives to Wired LANs  Powerline technology, IR, laser, Avian IP l How to hack the airwaves for fun & profit l How to ensure 100% WLAN security l AFH */http://www.ieee802.org/11/Documents/DocumentHolder/ https://www.bluetooth.org/Bluetooth: https://www.bluetooth.org/ https://www.bluetooth.org/ http://www.hiperlan2.comHIPERLAN/2: Official Specs: /


ICT Impact on Society By Charlotte Lee 7A2. Introduction The impact on society is very great. With all the new gadgets and devices, the world cant live.

a virus. Sometimes you click on a video and it could possible have a virus. Work You can research many things on the internet on Google or Bing etc. You can/ may have Bluetooth so if your friends phone has Bluetooth you can send each other stuff for free. Some phones may have Bluetooth so if your friends phone has Bluetooth you can / People can bully you on the computer They can pick on you at school. They can hack into your accounts e.g. MSN, Facebook, Google. Dangerous People There are lots of dangerous /


Unit 4 ICT A level Revision. Remember!! The focus of A level questions is on you being the designer / advisor to organisations wishing to develop their.

. A large business organisation may be primarily concerned with –Prevention of hacking –Avoid viruses –Secure payment site A school may be equally concerned with/ allows permitted users to access the data). Wireless Media Infra-red Radiowaves Bluetooth Broadband Microwaves Mobile phones use microwaves. Ideal for linking computers in two/ loss of personal contact with colleagues Never get to ‘leave the working environment’ Disadvantages for the employer Difficulties in monitoring productivity and managing /


Architectural Considerations in Smart Object Networking IAB RFC 7452 Dave Thaler Hannes Tschofenig Mary Barnes (moderator) 1.

ZigBee IP that uses IPv6 and 6LoWPAN Bluetooth SIG and IETF worked on IPv6 over BTLE (Bluetooth Smart) IP-based alliances expanded (AllSeen, IPSO, OIC, OMA, Thread, etc.) And of course the hackers worked overtime too… 3 Headlines IETF 92 Technical/ Mistakes only made by startups? See BMW ConnectedDriveBMW ConnectedDrive Pictures taken from http://contextis.co.uk/resources/blog/hacking-internet-connected-light-bulbs 30IETF 92 Technical Plenary Missing Key Management Problem Insteon LED Bulbs  To find IoT/


Computer Security for the Appropriately Paranoid A Broad Overview Joseph Kashi, MS, JD.

Notebook computers flash drives flash drives Wireless networks Wireless networks Bluetooth – phones, networks, printers Bluetooth – phones, networks, printers GSM cell phones GSM / Firewall Adds some protection against hacking through the wired Internet connection Adds some protection against hacking through the wired Internet connection /router transmission power to minimum that works If possible, reduce router transmission power to minimum that works Install network traffic transmission monitoring hardware/


Internet of things My T. Thai

: Network  Network communication encompasses following elements  IPv6 protocol  Wireless Network (Wi-Fi, Bluetooth, Wimax, Cellular, Ad hoc, sensor )  Wired Network  RFID network We will focus/ and privacy Risks 19 Threat actors adopt even more sophisticated Technique 7 Hacking DDoS Attack Intrusion on privacy 20 DDoS attacks Botnets and malware based /Spam. Coordinate an attack against a critical infrastructure. Serve a malware. Work as entry point within a corporate network. Under attack A Linux worm/


 A computer virus is a computer program that can reproduce itself and spread from one computer to another. and leaving infections as it travels, Like.

Bluetooth-enabled mobile phones or laptops. Bluesnarfing is the theft of data from a Bluetooth phone. Like Bluejacking, Bluesnarfing depends on the ability of Bluetooth-/for software that deliberately harms, restricts, alters, or stops your computer from working properly where the true purpose of the download or installation is hidden or / He started a website called "HackingTruths". At 15, his book on Ethical Hacking made him the youngest author to be published by Macmillan India.Ethical HackingMacmillan /


All the Worlds a Filesystem An explanation of what FUSE is and why it matters Josh Glover Tokyo Linux Users Group -

gmailfs ● Use: – http://richard.jones.name/google-hacks/gmail- filesystem/gmail-filesystem-using.html http://richard.jones.name/google-hacks/gmail- filesystem/gmail-filesystem-using.html – I cannot get it to work :( Flickrfs - 1/2 ● Mount your Flickr /Bluetooth File System ● http://www.mulliner.org/bluetooth/btfs.php http://www.mulliner.org/bluetooth/btfs.php ● Btfs is a simple application to map some basic bluetooth functions into the filesystem. With btfs a simple ls DEVICES shows you all bluetooth/


“ I C T a d v i s o r y s e r v i c e s ” “ I C T a d v i s o r y s e r v i c e s ” Current Strategies for protecting the ICT Infrastructure,

place phone calls, send and receive text messages, and even connect to the Internet. - Bluebugging - Refers to hacking into a Bluetooth device and using the commands of that device without notifying or alerting the user. By blue bugging, a hacker could/ of the enterprise, we need to combine the logical, physical, and administrative countermeasures. Need for National Legal frame works and policies: All countries need to develop an effective legal and policy framework for security and the human dimension of/


Yan Zhang Cheng Li Brian Kirkpatrick Low rate WPAN standard.

Bluetooth SMD(3.3Typ.) Supply Voltage2.8-3.4 V3.0-3.6 V Transmit Current35 mA normal mode 45 mA boost mode 65mA(100mA Max.) Receive current50 mA35mA(60mA Max.) Power-down sleep current <10 µA25mA default settings 2.5mA deep sleep Connected current50 mA30mA normal mode 8mA lower power sniff Easy to use http://www.cooking-hacks/ info services object interaction (Internet of Things) ZigBee Wireless Control that Simply Works HOME CONTROL TV VCR DVD/CD remote security HVAC lighting control access control /


Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 6-1© 2007 Prentice-Hall, Inc ELC 200 Day 9.

the physical transmission component of a Bluetooth device Link manager protocol (LMP) is a Bluetooth layer that sets up ongoing link management with Bluetooth devices –Piconet management –Link configuration –Security functions Hacking of Bluetooth is called War Nibbling and bluecasingWar/ used User is served by a succession of satellites 6-33 © 2007 Prentice-Hall, Inc How Cellular Works Network of cell sites distributed over a wide area –Radio transceiver –Base station controller –Tower and antennas Mobile/


Cosc 4765 Wireless Technology and security. WiFi, IEEE 802.11 standard services provided: –Association establishes initial association between computer.

little interference and no problems with compatibility on Access points. –More channels, from 12 to 20 channels –Should work (soon) with international systems as well. Short ranged –only 180 feet, so you need more access points, /without needing money. Bluetooth (3) Bluetooth hacking (bluejacking) –There are entire web sites devoted to how-to hack into bluetooth PDAs and cell phones. http://www.bluejackingtools.com/ With Bluetooth now included in cars to even refrigerators. Bluetooth security is becoming /


Broadband/Wireless for Peadar Transmission Theory What happens between the time that a signal begins to propagate down a wire and the time that it reaches.

a phoneline, thus no need for IT investment –Analog transmission –Computers work with digital transmission Modem transforms digital computer signals into an analog form/ time –1500+ difference vendors have agreed to distribute Bluetooth enabled devices Bluetooth products Piconet Every Bluetooth device can simultaneously maintain up to 7 connections, but/11 Security Wired Equivalent Privacy (WEP) –Software that automates the hacking process is widely available Locate vulnerable access points by driving around /


ELC 200 Day 10. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #3 Corrected –2 A’s, 10 B’s, 3 C’s, 1 D, 2 F’s and 1 non-submit.

(2.4 Ghz) –baseband layer Coverts data to signals –link manager protocol Security, authentication, and encryption Hacking of Bluetooth is called War NibblingWar Nibbling Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 23 Personal Area / points Poor (but may get access points) Probably higherProbably Lower HigherLower DiscoveryNoYes Discovery allows devices to figure out how to work together automatically Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 30 Most of today’s “long-haul” bulk/


NATIONAL 4 & 5 COMPUTING SCIENCE Prepared by M Feldman.

) Bit-Mapped Graphics (Resolution & Colour Depth) Bit-Mapped Graphics (Storage) Bluetooth Blu-ray Drive Browser Brightness & Contrast (Graphics) Buses (Data & Address)/costs of paying for this service. Security concerns about possibility of hacking of important data. HARDWARE Backing Storage Devices Backing Storage Devices include /Building Societies  Police Scotland, Special Branch, MI5 Customs & Excise, Dept of Work & Pensions  Employers and Education Authorities etc COMPUTERS AND THE LAW The Data /


1 Man-in-the-Middle Attack […] But its a real-life attack, too. Heres a story of a woman who posts an ad requesting a nanny. When a potential nanny responds,

April 15, 2004 http://www.schneier.com/crypto-gram.html 2 Bluetooth Privacy Hack Seems that Bluetooth cell phones are vulnerable to snooping: not the conversations, the contents of the phones. […] The hack is called "Bluesnarfing," and allows a hacker to remotely download / up a secure voice connection in no time. […] 26 http://cryptome.org/fake-prints.htm The consequences of the work are even more devastating[…] : –the use of fingerprint recognition offers a lower security than the lowest level of security/


123 Oldham Road, Royton, Oldham, OL1 8NN R001 Introduction to Computer Systems – A Student’s Guide Cambridge Nationals ICT 2015 Exam Date: May 13 th 2015.

Royton, Oldham, OL1 8NN 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 15) Explain the relevant/ methods below of connecting peripherals to a computer system b) Wireless Methods (WIFI, Bluetooth, Infra – Red) An IR remote control (the transmitter) sends out pulses of/  Accessing computer material without permission with intent to commit further criminal offences, eg hacking into the banks computer and wanting to increase the amount in your account.  /


Data Loss – Prevention and Controls Mark Lachniet, Solutions Architect – Analysts International Bret Straffon, PSS Security – Cisco Systems Lansing, MI.

[archive]University of Toledoarchive West Seneca School District - [2008-04-12] (Students hack school district computer system 1,800 employees notified) [archive]West Seneca School Districtarchive Bowdoin / data Prevent copying to external media (USB flash and disk, IR/Bluetooth devices) Prevent using with (inter)network applications (e- mail, IM/Log Review) that are discussed in this seminar In addition, we have worked with many organizations to create security policies such as: –Acceptable Use Policies/


Standard Grade Computing Communications and Networks.

is a problem, wireless networks are easy to hack into security is a problem, wireless networks are easy to hack into Wireless Protocols Infrared communication Infrared communication Like the TV controls Like the TV controls Bluetooth Bluetooth Range of about 10 metres Range of about 10/The key point about these terminals is that they have little or no local processing or memory How does multi-access work? It gives each terminal a slice of the processors time. It goes round the users very quickly, so quickly/


How to surf the Net without getting PWND!. Thanks to everyone that put this conference together! Thanks to all of you for taking the time to attend. No.

client to connect to a network. Wherever and whenever your wireless card is on Even on airplanes! Hacking the friendly skies… How does it work? Attacker passively monitors RF in the area Victim wireless clients send probes looking for their network(s)/ broadcast all sorts of sensitive information Bonjour service (e.g. Macs, iTunes, etc.) Windows Media Center Universal Plug-n-Play Bluetooth – person’s name or computer name IPv6 – enabled by default on current OSs. Etc. 46 Passwords The bane of security/


Security Issues in Wireless Networks

a distribution system Most often end-stations available in terminals (work-stations, laptops etc.) Typically Implemented in a PC-Card/parabolic dish antenna. “PC cards” vary in power: 25mW -- 100mW Mateti WiFi Security Wireless Hacking Tools 802.11 Attack Freeware Many open source also Airsnort (Linux) WEPcrack (Linux) Kismet (/wireless/  Tom Karygiannis and Les Owens, Wireless Network Security: 802.11, Bluetooth and Handheld Devices, National Institute of Standards and Technology Special Publication 800-48/


Chapter 4 COMPUTER NETWORKS Kitty IG1. 4.1 INTRODUCTION.

as war driving and poses a security risk to any unsecured WiFi system. BLUETOOTH Bluetooth is an example of wireless personal area networking (WPAN) technology. Spread spectrum/for doing this.  It is safer since there is less chance of external hacking of viruses.  It is possible to prevent employees from accessing unwanted websites. /through a WAN, e.g. the internet, if national or international, the system works in real time and uses additional hardware such as webcams, large monitors/television screens,/


 A cell phone operating system controls the cell phone.  It provides a platform to handle and use each and every application of a cell phone.  It determines.

source WEBKIT layout engine, coupled with V8 JavaScript engine.  It provides connectivity technologies as GSM, WiFi, Bluetooth.  It supports following media platforms – WebM, H.263, MPEG, MP3, MIDI,JPEG,PNG,GIF, / platform, android devices are more risked of hacking. It does not video calling at the main stream. The graphic support/ internet services, mail sending and receiving is quiet easier with a blackberry.  It works as a personal digital assistant to the user.  The os provides a wireless synchronization/


Nokia 770 Doing my bidding with Linux. Mini tablet search Minimum requirements. ● Small ● Lightweight ● Open ● Long battery life ● PDA sized screen.

unofficial apps 4. OS-2006, unofficial apps and xterm command shell apps 5. OS-2006, unofficial apps, xterm, Bluetooth and USB hacks. 6. Small but effective angry killer cyborg. Current app full screen Plus or minus button Power button Speaker Arrow keys/Random command line notes... ● Install vim, busybox vi sucks! do a touch ~/.vimrc as well ● scp works, the ssh server works, and X forwarding works minus window management ● the package management system uses more or less standard apt and dpkg, you can edit/


SECURITY THREAT REVIEW. Page 2 Agenda Main topics Central threats Terminology Malware in Action Brief history, case examples, functionality F-Secure Anti-Virus.

through web, chat channels, peer-to-peer networks, CD-ROMs, floppies, infrared beaming, Bluetooth, etc… Worm Spread through email or find their way through security holes (vulnerabilities), without / it and that is sent in large volumes Page 26 Other Threats CRACKING (also HACKING ) is gaining direct access to a target system Wide range of methods available (/ times a day Automated update methods Page 29 How Does the Anti-Virus Lab Work? Incoming samples Most comes in via e-mail from customers 30% comes via /


Discovering Computers

organization Another new related risk is Bluesnarfing, which is the unauthorized access to information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops & PDAs Mobile Devices: Protecting Data Below are some best practices to / that the IP addresses of the hacker and customer were different and suspected a hacking incident. The anti-virus software was out-dated and not working. Keystroke Logger Report Information Privacy How can you control spam? E-mail filtering /


Ernest Staats Director of Technology and Network Services at GCA MS Information Assurance, CISSP, CEH, MCSE, CNA, CWNA, Security+, I-Net+, Network+, Server+,

needs to be going across your system Know what types of paths are open to your data WIFI, USB, BlueTooth, Remote Acess Web 2.0 Mobile device access HACKER MENTALITY Hackers are motivated by various factors: Ego Curiosity and / networks but can be used on for small shops as well. (works with Nagios); http://www.groundworkopensource.com http://www.groundworkopensource.com More Tools: Google (Get Google Hacking book) The Google Hacking Database (GHDB) http://johnny.ihackstuff.com/modules.php?op=modload&name/


S ECURITY FLAWS IN MOBILE DEVICES Seminar on Software Engineering, Long Presentation 06.03.2008 Christian Gruber.

published on the Internet → many modified version surfaced. HOW DOES C ABIR WORK ? It is design to load at phone boot up and send itself to available devices using Bluetooth. It sends itself as a Symbian installation file (as CARIBE.SIS) the//http://www.kaspersky.com/ FastCompany.com: http://www.fastcompany.com/articles/2007/11/hacking-the- iphone.html?page=0%2C1 http://www.fastcompany.com/articles/2007/11/hacking-the- iphone.html?page=0%2C1 Security Evvaluators: http://www.securityevaluators.com/iphone/http/


Ads by Google