Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Cellular Security"

From NetSec
Jump to: navigation, search
 
(2 intermediate revisions by the same user not shown)
Line 6: Line 6:
 
Most cellular phones vulnerable to this method of exploitation are not x86, and therefore x86-related shellcode will not work. Some architectures more likely on cellular devices include:
 
Most cellular phones vulnerable to this method of exploitation are not x86, and therefore x86-related shellcode will not work. Some architectures more likely on cellular devices include:
 
:*ARM
 
:*ARM
 +
 +
A new area of cellular security is [[VOIP]]. [[VOIP]] has many vulnerabilities as it is new and not secure as of yet.

Latest revision as of 21:25, 13 August 2012

This article contains too little information, it should be expanded or updated.
Things you can do to help:
  • add more content.
  • update current content.

Cellular Security is the area of security involved with mobile communication networks.

A largely undocumented vulnerability in wireless phones (cellular phones) involves something called SIS Attachment Exploitation. SIS attachments are the picture and video attachments that can be attached to SMS text messages and sent phone to phone. Because most vendors do not check buffers surrounding this attachment zone, it is easy for an attacker to overflow the buffer and cause arbitrary machine code to be executed. It is for this reason that cellular phones should also never be trusted with sensitive data.

Most cellular phones vulnerable to this method of exploitation are not x86, and therefore x86-related shellcode will not work. Some architectures more likely on cellular devices include:

  • ARM

A new area of cellular security is VOIP. VOIP has many vulnerabilities as it is new and not secure as of yet.