I jailbroke my phone, so it's a major pain in the ass to upgrade, as I have to pretty much re-jailbreak it and then reinstall all my jailbroken apps.
I assume there's no jailbreak for IOS6 yet.
Anyone with a halfway contemporary knowledge of the current malware threatscape has all the excuses they need to avoid Android like the plague.
It's got a modified linux kernel, what could possibly go wrong?
"Android is a software stack for mobile devices that includes an operating system, middleware and key applications and uses a modified version of the Linux kernel. 60,000 cell phones with Android are shipping every day. Android platform ranks as the fourth most popular smartphone device-platform in the United States as of February 2010. To date, very little has been discussed regarding rootkits on mobile devices. Android forms a perfect platform for further investigation due to its use of the Linux kernel and the existence of a very established body of knowledge regarding kernel-level rootkits in Linux. We have developed a kernel-level Android rootkit in the form of a loadable kernel module. As a proof of concept, it is able to send an attacker a reverse TCP over 3G/WIFI shell upon receiving an incoming call from a 'trigger number'. This ultimately results in full root access on the Android device. This will be demonstrated (live). The implications of this are huge; an attacker can proceed to read all SMS messages on the device/incur the owner with long-distance costs, even potentially pin-point the mobile device's exact GPS location. Such a rootkit could be delivered over-the-air or installed alongside a rogue app. Our talk will take participants down this path of development, describing how the PoC was written and laying the foundations for our research to be taken further."
more
PoC
Fuck apple fanboys man, elitist SCUM
That's why I'm android all day #realtalk
Last edited by 408Mike; 09-27-2012 at 07:40 AM.
Originally Posted by sonatine
Although for those who don't trust your wife/husband, android can be rather appealing...
Calling the rootkitted mobile phone from the trigger number, initiates a reverse TCP over
WiFI/3G shell to the attacker. From here, he can proceed to interact fully with the Android
mobile device.
Some misuse scenarios that we performed successfully were the following:
1. Retrieve GPS coordinates by querying the GPS subsystem /dev/smd27.
2. Knock out GSM communication
3. Initiate phantom calls to potentially premium rate numbers.
4. Retrieve the SMS database from the phone
Originally Posted by sonatine
#FREEJACK #NEVERFORGET
NoFraud Online Poker Room: http://nofraud.pokerfraudalert.com:8087. For password resets and reload requests PM me.
There are currently 1 users browsing this thread. (0 members and 1 guests)