11B: Launch Attacks on Mobile Devices Flashcards

3.2 Given a scenario, research attack vectors and perform wireless attacks. 3.5 Explain common attacks and vulnerabilities against specialized systems.

1
Q

A method used by attackers to send out unwanted text messages, images, or videos to a mobile phone, tablet, or laptop using a Bluetooth connection.

A

BlueJacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A more aggressive attack than Bluejacking, as a malicious actor is able to read information from a victim’s Bluetooth device. The end goal is to glean sensitive data from the victim, like their contacts, calendars, email messages, text messages, etc.

A

BlueSnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Using a virtualized environment, this provides a safe environment to analyze malware.

A

Sandbox Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly