Friday, July 27, 2012

Hijacked via wireless Smartphone

many people have low NFC-their cell phone's value purchased through skilled hackers suggests how to hijack a smart phones via short-range radio technology is known in the near field communications (NFC as ) has used.


Created a tool to force the phone to visit Charlie Miller seed attack software website.


Helped a Miller steal the data and see the booby-trapped websites on software, holding a cell phone.


NFC is used as a digital wallet and gadget electronic ticket is more and more common to Smartphones.

Beam Guide

Miller showed work at Accuvant research consultant, security companies, Las Vegas Black Hat hacker Conference.


Showed how to attack Miller three separate phone in his presentation: Samsung Nexus S, - run both Android - Google Galaxy nexus, Nokia N9 will run on MeeGo system.


Writing software that controls the reader tags to work with NFC phone attack on Mr. Miller. As its name implies, NFC works is located near the reader tips or near the devices together.


Miller one of the demo exploit known as the beam of the Android Smartphone feature him we pipe the command through the custom chip. Information and links for the owner of the phone it is to send other phones in short distance


He visits the Web links of any beam Android by default even open all the files sent, discovered the power of the mobile phone. He was mobile phone forced to visit the website ran the create code that exploits a vulnerability in Android known via this route.


"To you is your browser suddenly, nothing, go to my website it is ideal," said the technology news site Ars Technica, Miller said.


The attack in one demonstration was Miller is display the files on the target phone.


That Miller abused the NFC Nokia phones, and send the complete control of the target phone, text or he showed how to make a call through a weakness exploited by customized radio tags.


Mr Miller said cell phones unlocked, must activate their screen to attack Android successfully, the specific versions of the operating system.


Knew Miller and Nokia Research and survey's the N9 phone said you were actively against claims his success. It exploits a loophole in the NFC over the unaware someone else was.


Google has yet to comment to research.

No comments:

Post a Comment