1 00:00:00,120 --> 00:00:06,780 Welcome to Section 11 and this section, we're going to go over mobile phone security, this is essentially 2 00:00:06,780 --> 00:00:12,780 a section here that is going to give you an overview of how you can protect your phone, how you can 3 00:00:12,780 --> 00:00:14,550 go about hacking different phones. 4 00:00:14,550 --> 00:00:14,900 Right. 5 00:00:15,120 --> 00:00:20,790 Because remember, we always want to look at things from the hackers perspective, from the black hackers 6 00:00:20,790 --> 00:00:27,810 perspective, and then also understanding how they would go about attacking a phone so we can also keep 7 00:00:27,810 --> 00:00:34,560 our own phones safe and secure as well, as well as some different tools and techniques to ultimately 8 00:00:34,650 --> 00:00:36,990 keep your phone as safe as possible. 9 00:00:37,020 --> 00:00:38,280 So let's go ahead and jump in here. 10 00:00:38,580 --> 00:00:45,510 Section 11, we're going to be going over mobile phone networks and operating systems and then mobile 11 00:00:45,510 --> 00:00:46,590 attack vectors. 12 00:00:46,710 --> 00:00:51,980 What exactly those are and how those come into play and then mobile malware. 13 00:00:52,410 --> 00:00:57,720 This is very important here because these can take over your cell phones and actually cause quite a 14 00:00:57,720 --> 00:01:04,140 bit of damage and then mobile hacking using you URLs and then the mobile platform vulnerabilities and 15 00:01:04,140 --> 00:01:11,880 countermeasures and then jailbreaking and routine considerations, privacy issues due to geolocation 16 00:01:12,390 --> 00:01:15,080 and then finally mobile phone data security. 17 00:01:15,090 --> 00:01:17,350 So there's a lot to be covered here. 18 00:01:17,520 --> 00:01:22,380 I'm going to give you a quick overview of this section, and then Anthony's going to be walking you 19 00:01:22,380 --> 00:01:25,760 through a lot more in-depth in the individual lecture. 20 00:01:25,770 --> 00:01:30,210 So let's go ahead and look at the mobile phone network, especially in today's day and age. 21 00:01:30,210 --> 00:01:32,230 Everybody has a cell phone, right? 22 00:01:32,460 --> 00:01:39,300 You have kids, you have teenagers, you know, in elementary school that are getting cell phones and 23 00:01:39,300 --> 00:01:45,600 are on cell phones pretty much every single day, especially now with adults, with individuals. 24 00:01:45,810 --> 00:01:51,240 I mean, our attention spans are so, so low because we're on our phones. 25 00:01:51,240 --> 00:01:51,570 Right. 26 00:01:51,570 --> 00:01:53,010 Pretty much 24/7. 27 00:01:53,370 --> 00:02:00,420 And the big thing here is to understand that having our cell phones is very important to the average 28 00:02:00,420 --> 00:02:04,650 person in the majority of phones are connected to a 4G network. 29 00:02:04,660 --> 00:02:10,680 So whatever service provider you have, you know, whether whether it be Sprint, Verizon, T-Mobile, 30 00:02:10,860 --> 00:02:15,810 you know, whatever that may be, you're typically going to be on a 4G network in the way that you're 31 00:02:15,810 --> 00:02:21,900 connected to a wireless phone network is the device, which is typically known as a terminal, uses 32 00:02:21,900 --> 00:02:24,860 radio frequencies to communicate with the base station. 33 00:02:24,880 --> 00:02:32,580 So when you're near a particular tower, you are essentially emitting radio frequency waves from the 34 00:02:32,580 --> 00:02:35,900 phone in order to be able to communicate with those stations. 35 00:02:35,910 --> 00:02:41,850 And so depending on your location, whatever tower or base station that you're next to, you're going 36 00:02:41,850 --> 00:02:47,220 to be meeting those radio frequency waves and they're going to be bouncing off of that base station 37 00:02:47,490 --> 00:02:53,160 and then being able to be connected to that 4G network so you can actually use your phone and also the 38 00:02:53,160 --> 00:02:53,630 Internet. 39 00:02:54,090 --> 00:02:59,820 And so as we go deeper into the mobile phone networks, understanding how to hack into mobile phones, 40 00:02:59,970 --> 00:03:06,180 it's really important for you to get this foundational understanding of how mobile phone networks work. 41 00:03:06,420 --> 00:03:11,820 You know, the foundational elements here and essentially what the 4G network is really about. 42 00:03:12,180 --> 00:03:15,030 So now let's look at mobile phone operating systems. 43 00:03:15,030 --> 00:03:19,110 Now, there are two main operating systems for mobile devices. 44 00:03:19,350 --> 00:03:22,070 There's no one, the Android from Google. 45 00:03:22,110 --> 00:03:28,080 This is where you have your Samsung phone, Motorola phone, Google phone. 46 00:03:28,080 --> 00:03:28,350 Right. 47 00:03:28,370 --> 00:03:32,190 Those are going to be the ones that you're using the Android on. 48 00:03:32,190 --> 00:03:32,570 Right. 49 00:03:32,580 --> 00:03:39,120 And this is where you can essentially use your phone to play games, to call people to text and whatever 50 00:03:39,120 --> 00:03:40,590 other applications you have there. 51 00:03:40,590 --> 00:03:46,290 Now, iOS from Apple, this is going to be their specific operating system as well. 52 00:03:46,500 --> 00:03:52,710 And this operating system is typically used through the different iPhone, iPad and iPod as well. 53 00:03:53,160 --> 00:03:55,110 Same thing with Google for the most part. 54 00:03:55,590 --> 00:04:00,590 When you have Android, they're going to be typically running on the tablets as well. 55 00:04:00,840 --> 00:04:07,260 And one of the key pieces of information here that I want you to understand is that Apple has been known 56 00:04:07,260 --> 00:04:10,920 previously for being the leader in mobile security. 57 00:04:10,920 --> 00:04:11,220 Right. 58 00:04:11,340 --> 00:04:17,310 A lot of people say, hey, you know, iOS, Apple phones, Apple technology, very difficult to break 59 00:04:17,310 --> 00:04:17,640 into. 60 00:04:17,640 --> 00:04:21,470 And that has been the case for quite some time. 61 00:04:21,480 --> 00:04:27,010 However, according to a recent article by Senate, Android is actually gaining ground. 62 00:04:27,030 --> 00:04:29,850 So there's a lot more technology that's becoming available. 63 00:04:29,850 --> 00:04:33,930 Android is stepping up as hackers are getting more sophisticated. 64 00:04:34,200 --> 00:04:36,270 So is Android as well. 65 00:04:36,450 --> 00:04:39,800 OK, so let's talk about social engineering with mobile phones. 66 00:04:40,110 --> 00:04:42,540 So now I want to give you an example of this. 67 00:04:42,660 --> 00:04:48,930 Let's suppose that you receive a text message, right, from an unknown number, and that number is 68 00:04:48,930 --> 00:04:51,510 telling you that you've won some sort of prize. 69 00:04:51,660 --> 00:04:59,220 And in order for you to get that prize, all you need to do is reply back with your name, email account 70 00:04:59,220 --> 00:04:59,940 and any other. 71 00:04:59,980 --> 00:05:05,620 A personal information, maybe your cell phone number or perhaps your last four of your social rank. 72 00:05:06,130 --> 00:05:13,870 This is where a lot of people get taken advantage of here because they are just trusting out of nowhere 73 00:05:13,870 --> 00:05:18,740 blindly this message that they're receiving from some unknown source. 74 00:05:18,810 --> 00:05:19,080 Right. 75 00:05:19,510 --> 00:05:27,250 And so this is where you need to be very, very wary of here as far as text messages coming from unsolicited 76 00:05:27,490 --> 00:05:29,580 or just numbers out of the blue. 77 00:05:29,590 --> 00:05:29,940 Right. 78 00:05:30,250 --> 00:05:35,440 So very important to be aware of that, because this is where people get oftentimes taken advantage 79 00:05:35,440 --> 00:05:35,680 of. 80 00:05:35,980 --> 00:05:39,060 And I've received these kind of messages in the past as well. 81 00:05:39,280 --> 00:05:46,660 And typically I just delete them or I reply back with staff or just pretty much don't do anything about 82 00:05:46,660 --> 00:05:46,750 it. 83 00:05:46,750 --> 00:05:52,390 Because what's going to happen is if you click on the link or if you reply back with any information, 84 00:05:52,630 --> 00:05:58,150 they're going to be able to get access to maybe your cell phone or just your information alone. 85 00:05:58,150 --> 00:06:03,790 If you respond back with your name, email or phone number, whatever, they're going to be able to 86 00:06:03,790 --> 00:06:07,690 have access to that and be able to use that to their advantage. 87 00:06:07,720 --> 00:06:12,700 And so what I want to show you now is I want to show you this text message down here that I got the 88 00:06:12,700 --> 00:06:13,270 other day. 89 00:06:13,570 --> 00:06:19,510 And as you can see here, this is a text message from some sort of secret shopper program or whatever, 90 00:06:19,840 --> 00:06:21,450 and it was out of the blue. 91 00:06:21,760 --> 00:06:25,180 I never signed up for any kind of program or whatever like that. 92 00:06:25,180 --> 00:06:30,640 As far as inputting my information to learn more about this, it pretty much sent me a message. 93 00:06:30,640 --> 00:06:32,350 I don't know what we're talking about. 94 00:06:32,350 --> 00:06:33,850 I can earn some extra money. 95 00:06:34,060 --> 00:06:34,340 Right? 96 00:06:34,390 --> 00:06:35,650 Six hundred dollars a week. 97 00:06:35,650 --> 00:06:39,120 And that it wouldn't affect my job or wouldn't affect me, whatever. 98 00:06:39,130 --> 00:06:39,400 Right. 99 00:06:39,910 --> 00:06:45,190 And so you think about it, both of these links here, if you click on them, could give you some sort 100 00:06:45,190 --> 00:06:48,160 of Trojan, could give you some sort of virus malware. 101 00:06:48,160 --> 00:06:48,510 Right. 102 00:06:48,760 --> 00:06:52,990 And also could lead you to go to a website where they could steal your information. 103 00:06:53,020 --> 00:06:56,140 So this is where you want to be very, very careful. 104 00:06:56,170 --> 00:07:02,680 There are thousands of people that unfortunately get taken advantage of because they're blindly trusting 105 00:07:02,980 --> 00:07:07,720 people that are just sending them messages or text messages or whatever that may be. 106 00:07:07,990 --> 00:07:10,120 And they're not doing their proper research. 107 00:07:10,120 --> 00:07:10,420 Right. 108 00:07:10,750 --> 00:07:16,180 So very important that when you're receiving these types of messages that you do your homework, you 109 00:07:16,180 --> 00:07:22,150 research the company, whoever's sending you a message because you're going to get taken advantage of 110 00:07:22,150 --> 00:07:23,150 if you do not now. 111 00:07:23,440 --> 00:07:24,940 And let me give you another example. 112 00:07:24,950 --> 00:07:31,240 So one of the other types of messages that I received in the past is where the individual, the hacker, 113 00:07:31,450 --> 00:07:34,870 may have access to somebody's stolen credit card information. 114 00:07:34,870 --> 00:07:38,000 So just out of the blue, they're sending me this message. 115 00:07:38,000 --> 00:07:41,560 You're telling me, hey, I will pay you for you to build me a website. 116 00:07:41,560 --> 00:07:43,570 And do you accept credit card? 117 00:07:43,570 --> 00:07:43,910 Right. 118 00:07:43,930 --> 00:07:46,780 And it's just some number out of nowhere, out of the blue. 119 00:07:46,960 --> 00:07:51,400 And so those are the kinds of messages and things you want to be on the lookout for. 120 00:07:51,550 --> 00:07:56,390 Essentially, if it sounds too good to be true, it often is too good to be true. 121 00:07:56,410 --> 00:07:58,330 So make sure to keep that in mind. 122 00:07:58,490 --> 00:08:02,500 Let's go over some of the most common phone hacking methods, phishing. 123 00:08:02,500 --> 00:08:08,900 So this is where you're lowering your target with fake versions of legitimate sites to extract credentials. 124 00:08:08,910 --> 00:08:12,230 So think about the last text message that we just looked at. 125 00:08:12,400 --> 00:08:14,430 They have very specific links on there. 126 00:08:14,440 --> 00:08:21,820 They have your URL Shawna's and that link or those links could actually lead to a website, a fake version 127 00:08:21,820 --> 00:08:25,450 of a legitimate site, and it can actually extract your information. 128 00:08:25,460 --> 00:08:32,080 So very, very important to be very careful to do your research and not just blindly click on the links 129 00:08:32,080 --> 00:08:33,390 or messages that are received. 130 00:08:33,400 --> 00:08:35,750 And then we have control message attacks. 131 00:08:36,040 --> 00:08:40,020 This involves sending a control message on the device that you want to hack. 132 00:08:40,450 --> 00:08:44,180 This allows you to get access to the settings menu of the targeted cell phone. 133 00:08:44,200 --> 00:08:50,800 So this is like if you were to receive a message saying, hey, this is Verizon or this is T-Mobile, 134 00:08:51,020 --> 00:08:55,680 you need to update your phone and you need to get it to the newest version. 135 00:08:55,690 --> 00:09:01,000 And then what ends up happening is you click the button or whatever or click the link and your phone 136 00:09:01,000 --> 00:09:01,770 gets updated. 137 00:09:01,780 --> 00:09:08,260 But what happens is you get malicious type of information, maybe some sort of malware or a virus on 138 00:09:08,260 --> 00:09:08,830 your phone. 139 00:09:08,860 --> 00:09:11,920 OK, so very important to look out for these as well. 140 00:09:12,280 --> 00:09:16,480 And then probably the most common one here is the spam messages. 141 00:09:16,510 --> 00:09:20,810 So this is where hackers are getting access to a victim's Google account. 142 00:09:20,830 --> 00:09:27,430 Now, Google accounts are very, very important here because oftentimes people will have like a Gmail 143 00:09:27,430 --> 00:09:32,980 account, right, that they sign up with, do all their online shopping, maybe Amazon, maybe they 144 00:09:32,980 --> 00:09:37,590 have it connected to their bank account, to their social media accounts. 145 00:09:37,900 --> 00:09:43,810 And oftentimes when you are able to get access to these, you don't need a security code if you have 146 00:09:43,810 --> 00:09:46,100 the password to the Google account. 147 00:09:46,120 --> 00:09:52,810 So very important to make sure that any messages that are coming out of the blue out of nowhere, that 148 00:09:52,810 --> 00:09:58,210 you're not just blindly clicking them, you're making sure and verifying that it's indeed from the actual 149 00:09:58,210 --> 00:09:59,740 sender and that you're not. 150 00:09:59,850 --> 00:10:05,730 Getting taken advantage up here, so this is a very quick and short section overview here for Section 151 00:10:05,730 --> 00:10:06,210 11. 152 00:10:06,420 --> 00:10:12,240 I wanted to give you an understanding of what exactly phone networks are, how they function, the different 153 00:10:12,240 --> 00:10:18,840 mobile operating systems, and then some of the common methods that are used to hack phone Anthony is 154 00:10:18,840 --> 00:10:24,870 actually going to dig a whole lot deeper into mobile phone hacking, how to protect your phone, how 155 00:10:24,870 --> 00:10:27,540 to keep your phone secure in this section here. 156 00:10:27,600 --> 00:10:31,140 So I'm excited for you to get started and look forward to seeing you on the next one.