Jump to content

Possible New Attack Vector Mobile Phones


Recommended Posts

First off really sorry if that has already been looked at and covered but after a quick google and no decent results I thought I should bring the topic up for discussion.

1. Which member of an organisation is lightly to have a smart-phone with exchange capabilities?

The network Administrator

2. What level of account access to a lot of network admins account have?

Enterprise Admin

3. How many phones get stolen every month in the UK?

As many as 10,000 mobile phones are stolen every month - met police

So my question is how easy is it to either extract the hash and either straight out decrypt or just pass it?

Dose the phone have to be stolen to get access to the password or can we use Ubertooth?

Link to comment
Share on other sites

If the attacker has physical or ubertooth access to the phone than its game over. Besides I just read an article on the ComputerWorld website stating, this type of attack vector could be emerging any time soon. And its something that organizations and companies should take into account and be prepared for.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...