did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781598631067

Hacking Mobile Phones

by
  • ISBN13:

    9781598631067

  • ISBN10:

    1598631063

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2005-12-07
  • Publisher: Cengage Learning Ptr
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $24.99
We're Sorry.
No Options Available at This Time.

Summary

The mobile phone is the most successful digital device on the planet and has revolutionized the way we lead our lives. Mobile phones have become a useful and indispensable part of modern life but with them have brought a combination of safety, security, and privacy fears. Hacking Mobile Phones, is the first book to tackle this growing concern and hot technology topic. Written for anyone who wants to educate and prepare themselves against a growing number of mobile phone security threats, it will appeal to both a hardcore technical audience as well as those who just want to know how to protect their mobile phone. It provides comprehensive coverage of the most common and dangerous mobile phone-related security threats and reveals the tools, techniques, and methods that criminals use to break into mobile phones. Written in an approachable style, the book features real-life case studies, numerous examples, graphics, tips, and a quick reference appendix that make it easy to understand the technical concepts.

Author Biography

Ankit Fadia is an independent computer security consultant based in Silicon Valley

Table of Contents

Introduction xii
Part I Security Threats
1(162)
Bluetooth Hacking
3(64)
Discovery
4(3)
Pairing
5(1)
Binding
6(1)
Bluetooth Security Modes
7(1)
Case Studies
7(3)
New York City, USA
7(1)
Hong Kong
8(1)
Singapore
8(1)
Tokyo, Japan
9(1)
Beijing, China
9(1)
Osaka, Japan
9(1)
Kuala Lumpur, Malaysia
10(1)
Types of Bluetooth Attacks
10(18)
BlueJacking
11(9)
BlueJacking Countermeasures
20(1)
BlueSnarfing
21(1)
BlueSnarfing Countermeasures
22(1)
Blue Backdoor
23(1)
BlueBugging
23(1)
Other Attacks
23(2)
Blueprinting
25(3)
Vulnerable Mobile Phone Handsets
28(1)
Countermeasures
29(1)
Live Attack Logged Data
30(10)
Case Study 1
30(3)
Case Study 2
33(7)
Fadia's Hot Picks for Popular Bluetooth Tools
40(27)
Mobile DoS Attacks
67(16)
Case Studies
68(1)
Sydney, Australia
69(1)
Paris, France
69(1)
Taipei, Taiwan
69(1)
Types of MDoS Attacks
69(9)
BlueSmacking: The ping of Death
70(3)
Jamming
73(1)
Malformed OBEX Message
73(1)
Failed Authentication
74(1)
Remote Malformed SMS Message
75(1)
Local Malformed SMS Message
76(1)
Malformed MIDI File
77(1)
Malformed Format String
77(1)
Vulnerable Mobile Phone Handsets
78(1)
Countermeasures
78(1)
Live Attack Logged Data: Case Study
79(1)
Fadia's Hot Picks for Popular BlueSmacking Tools
80(3)
Email Attacks
83(24)
Mobile Phone Email Threats
85(1)
Popularity
85(1)
Spying Attacks
85(1)
Anonymity
86(1)
Case Studies
86(1)
Tokyo, Japan
86(1)
Shenzhen, China
86(1)
Types of Email Attacks
86(16)
Abusive Messages
87(1)
Abusive Messages Countermeasures
88(6)
Forged Messages
94(2)
Forged Messages Countermeasures
96(4)
Spam
100(1)
Spam Countermeasures
100(2)
Fadia's Hot Picks for Popular Email Threats Tools
102(5)
Viruses, Worms, and Trojans
107(56)
Malicious Files
108(1)
Viruses
108(1)
Worms
108(1)
Trojans
108(1)
Case Studies
108(2)
Seoul, Korea
109(1)
Shanghai, China
109(1)
Shenzhen, China
109(1)
Wellington, New Zealand
109(1)
Types of Malicious Files
110(1)
The Cabir Worm
111(5)
Removal Instructions
114(1)
Vulnerable Mobile Phone Handsets
115(1)
Countermeasures
116(1)
The SymbOS.Cabir.I Worm
116(3)
Removal Instructions
118(1)
Vulnerable Mobile Phone Handsets
119(1)
Countermeasures
119(1)
The Mabir Worm
119(3)
Removal Instructions
121(1)
Vulnerable Mobile Phone Handsets
121(1)
Countermeasures
121(1)
The Lasco Worm
122(2)
Removal Instructions
123(1)
Vulnerable Mobile Phone Handsets
124(1)
Countermeasures
124(1)
The Commwarrior MMS Virus
124(4)
Removal Instructions
127(1)
Vulnerable Mobile Phone Handsets
128(1)
Countermeasures
128(1)
The WinCE Duts Virus
128(1)
Removal Instructions
129(1)
Vulnerable Mobile Phone Handsets
129(1)
Countermeasures
129(1)
The Skulls Trojan
129(6)
Removal Instructions
133(2)
Vulnerable Mobile Phone Handsets
135(1)
Countermeasures
135(1)
The MOS Trojan
135(2)
Removal Instructions
136(1)
Vulnerable Mobile Phone Handsets
136(1)
Countermeasures
137(1)
The Fontal Trojan
137(2)
Removal Instructions
138(1)
Vulnerable Mobile Phone Handsets
138(1)
Countermeasures
138(1)
The Hobbes Trojan
139(2)
Removal Instructions
140(1)
Vulnerable Mobile Phone Handsets
141(1)
Countermeasures
141(1)
The Drever Trojan
141(2)
Removal Instructions
142(1)
Vulnerable Mobile Phone Handsets
143(1)
Countermeasures
143(1)
The Locknut Trojan
143(3)
Removal Instructions
144(1)
Vulnerable Mobile Phone Handsets
145(1)
Countermeasures
146(1)
The Onehop Trojan
146(2)
Removal Instructions
147(1)
Vulnerable Mobile Phone Handsets
148(1)
Countermeasures
148(1)
The MGDropper Trojan
148(4)
Removal Instructions
150(1)
Vulnerable Mobile Phone Handsets
151(1)
Countermeasures
152(1)
The Appdisabler File Dropper
152(1)
The Damping File Dropper
152(1)
Removal Instructions
153(1)
Vulnerable Mobile Phone Handsets
153(1)
Countermeasures
153(1)
The Doomboot Trojan
153(2)
Removal Instructions
154(1)
Vulnerable Mobile Phone Handsets
155(1)
Countermeasures
155(1)
The Brador Trojan
155(1)
Removal Instructions
156(1)
Vulnerable Mobile Phone Handsets
156(1)
Countermeasures
156(1)
General Virus, Worm, and Trojan Countermeasures
156(1)
Live Attack Logged Data
157(4)
Case Study 1
158(1)
Case Study 2
158(1)
Case Study 3
159(1)
Case Study 4
159(1)
Case Study 5
160(1)
Fadia's Hot Picks for Popular Mobile Antivirus Tools
161(2)
Part II Security Tips and Tricks
163(44)
Nokia Security
165(22)
Display the IMEI Number
165(2)
Display the Month and Year of Manufacture
167(1)
Display and Modify the Date of Purchase
168(1)
Display the Serial Number
169(1)
Display the Mobile Software Version
170(1)
Restore the Default Factory Settings
171(4)
Enable the Secret Menu
171(4)
Enable the Secret Menu on Older Phones
175(1)
Send an SMS Text Message Quickly
175(1)
Save a Number During a Phone Call
175(1)
Use the Silent Mode Shortcut
176(1)
Improve the Sound Quality
176(1)
Enable the Display Light On Shortcut
176(1)
Display Larger Font in the Address Book
176(1)
Crash Your Friend's Mobile Phone
177(1)
Force Your Phone to Restart
178(1)
Unlock Mobile Phone Locks
178(1)
Bypass Mobile Phone Locks
179(1)
Customize the Background Display
180(2)
Eavesdrop on Other People
182(1)
Retrieve Original Ringtones
182(1)
Save Battery Time
183(1)
Live Attack Logged Data
184(1)
Make a Spoofed Phone Call
184(1)
Change the Language Code
184(1)
Fadia's Hot Pick for Popular Mobile Security Tips and Tricks
185(2)
Motorola Security
187(6)
Display the IMEI Number
187(2)
Calculate Distance from the Closest Base Station
189(1)
Gather Signal Quality Information
189(1)
Increase Memory
190(1)
Use Secret Codes
190(2)
Improve Sound Quality
192(1)
Samsung Security
193(2)
Secret Shortcuts, Tips, and Tricks
193(2)
Sony Ericsson Security
195(2)
Secret Shortcuts, Tips, and Tricks
195(2)
Siemens Security
197(2)
Secret Shortcuts, Tips, and Tricks
197(2)
Display the IMEI Number
197(1)
Enable Monitor Mode
198(1)
Unlock the Operator Lock
198(1)
Display the Sunset Easter Egg
198(1)
BlackBerry Security
199(8)
Free Messaging
204(1)
Fadia's Hot Picks for BlackBerry Devices Security Software
205(2)
Part III Appendices
207(92)
Appendix A Security Test: Comparing Various Handsets
209(4)
Appendix B GSM Versus CDMA
213(2)
Appendix C IMode
215(2)
Appendix D Online Resources
217(74)
Ankit Fadia Online
217(1)
Downloadable Utilities
217(1)
Antivirus Software
217(1)
BlackBerry
218(1)
Bluetooth
218(46)
Email Threats
264(1)
Mitsubishi
264(1)
Motorola
264(22)
Nokia
286(1)
Panasonic
287(1)
Philips
287(1)
Sagem
288(1)
Samsung
288(1)
Security
288(1)
Siemens
289(1)
Sony Ericsson
289(2)
Appendix E Mobile Phone Platforms
291(2)
Appendix F Bluetooth-Enabled Mobile Phones
293(2)
Appendix G Infrared-Enabled Mobile Phones
295(2)
Appendix H GPRS-Enabled Mobile Phones
297(2)
Index 299

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program