Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
[toggle_content title="Transcript"] Hi Leo Dregier here. This is a mobile and we are going to learn how to hack it. Doesn't really matter if it is an android or an iPhone or a BlackBerry the fact that everyone has one we are going to use that to our advantage. Most of our common attacks that we have talked about goes far are available here. We have talked about trojans. A mobile device you can use software you can manipulate that. It doesn't matter if it is a windows 8 or a blackberry there is a lot of reason which we can manipulate the cellphone process. Everything from spoofing phone numbers to getting access to somebody else's phone taking content from a phone because are most coveted devices that we use today and so I would like to think all of you who have them mobile phone that make this section possible. Let us go ahead and we can get started and I am going to show you how we can break this simple device. [/toggle_content] An extension of the previous Wireless module, the Mobile Hacking module looks at the additional obstacles penetration testers and ethical hackers must face in supporting mobile devices. The Mobile Hacking module discusses and demonstrates how to hack into mobile devices, which is surprisingly easy. Every device type from Apple's iPhone to Samsung's Galaxy phone have vulnerabilities and they are each discussed thoroughly. You'll learn how to easy it is to spoof contacts, phone numbers and other data and manipulate a cell phone processes. The topics explored in the Mobile Hacking module include: - Whiteboard, which shows the interrelationship of all the basic components you must master for this module - There are no penetration testing simulation labs for the Mobile Hacking module.