Difference between pages "Cell phones" and "Malware"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Forensics)
 
(Exploit Kit)
 
Line 1: Line 1:
'''Cell phones''' or '''mobile phones''' are an important target for [[forensic investigator]]s.
+
'''Malware''' is a short version of '''Malicious Software'''.
  
== Technologies ==
+
Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.
+
* [[CDMA]]
+
* [[TDMA]]
+
* [[GSM]]
+
* [[iDEN]]
+
* [[EDGE]]
+
* [[GPRS]]
+
* [[UMTS]]
+
  
== Hardware ==
+
== Virus ==
 +
A computer program that can automatically copy itself and infect a computer.
  
* [[RIM BlackBerry]]
+
== Worm ==
* [[T-Mobile Sidekick  ]]
+
A self-replicating computer program that can automatically infect computers on a network.
* [[SIM Cards]]
+
  
== Operating Systems ==
+
== Trojan horse ==
 +
A computer program which appears to perform a certain action, but actually performs many different forms of codes.
  
* [[Microsoft PocketPC]]
+
== Spyware ==
* [[Microsoft Windows Mobile]]
+
A computer program that can automatically intercept or take partial control over the user's interaction.
* [[Palm]]
+
* [[RIM BlackBerry]]
+
* [[Symbian]]
+
* [[Linux]]
+
  
== Forensics ==  
+
== Exploit Kit ==
 +
A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits]. Often utilizing a drive-by-download.
  
'''Procedures'''
+
=== Drive-by-download ===
 +
Any download that happens without a person's knowledge [http://en.wikipedia.org/wiki/Drive-by_download].
  
* [[Cell Phone Forensics]]
+
== See Also ==
* [[SIM Card Forensics]]
+
* [[External Memory Card Forensics]]
+
* [[Blackberry Forensics]]
+
* [[JTAG Forensics]]
+
  
== Tools ==
+
== External Links ==
 +
* [http://en.wikipedia.org/wiki/Malware Wikipedia entry on malware]
 +
* [http://en.wikipedia.org/wiki/Drive-by_download Wikipedia drive-by-download]
 +
* [http://www.viruslist.com/ Viruslist.com]
 +
* [http://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares Androguard]: A list of recognized Android malware
  
'''Flashers'''
+
=== Exploit Kit ===
* [[UFS Tornado]]
+
* [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits What Are Exploit Kits?], by [[Lenny Zeltser]], October 26, 2010
 +
* [http://nakedsecurity.sophos.com/2013/07/02/the-four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/ The four seasons of Glazunov: digging further into Sibhost and Flimkit], by Fraser Howard, July 2, 2013
  
'''Hardware'''
+
[[Category:Malware]]
* [[Azimuth RadioProof™ Enclosures]]
+
* [[Cellebrite UFED]]
+
* [[LogiCube CellDEK]]
+
* [[LogiCube CellDEK TEK]]
+
* [http://www.msab.com/xry/field-version | Micro Systemation Field Version]
+
* [[Network Security Solutions Secure Tents]]
+
* [[Network Security Solutions Seizure Bags for Cell Phones/PDAs/Laptops]]
+
* [[Paraben CSI Stick]]
+
* [[Paraben Device Seizure Toolbox]]
+
* [[Paraben Handheld First Responder Kit]]
+
* [[Paraben StrongHold Bag]]
+
* [[Radio Frequency (RF) Jammers]]
+
* [[Radio Tactics Acesso]]
+
* [[Radio Tactics Apollo]]
+
* [[Radio Tactics Athena]]
+
* [[SIM Card Readers]]
+
 
+
'''Software'''
+
* [[BitPIM]]
+
* [[BK Forensics Cell Phone Analyzer]]
+
* [[FloAt's Mobile Agent]]
+
* [[ForensicMobile]]
+
* [[ForensicSIM]]
+
* [[Guidance Software Neutrino]]
+
* [[iDEN Companion Pro]]
+
* [[iDEN Media Downloader]]
+
* [[iDEN Phonebook Manager]]
+
* [[.XRY |MicroSystemation .XRY]]
+
* [[MOBILedit!]]
+
* [[Oxygen Forensic Suite 2010]]
+
* [[Paraben Device Seizure]]
+
* [[Paraben SIM Seizure]]
+
* [[Pandora's Box]]
+
* [[Quantaq USIMdetective]]
+
* [[Quantaq USIMcommander]]
+
* [[Quantaq USIMdetective]]
+
* [[Quantaq USIMexplorer]]
+
* [[Quantaq USIMprofiler]]
+
* [[Quantaq USIMregistrar]]
+
* [[SIMiFOR]]
+
* [[Susteen Secure View]]
+
* [[TULP2G]]
+
* [[WOLF]]
+
 
+
==See Also==
+
[[Cell phone forensics bibliography]]
+

Revision as of 01:05, 21 October 2013

Malware is a short version of Malicious Software.

Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.

Virus

A computer program that can automatically copy itself and infect a computer.

Worm

A self-replicating computer program that can automatically infect computers on a network.

Trojan horse

A computer program which appears to perform a certain action, but actually performs many different forms of codes.

Spyware

A computer program that can automatically intercept or take partial control over the user's interaction.

Exploit Kit

A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [1]. Often utilizing a drive-by-download.

Drive-by-download

Any download that happens without a person's knowledge [2].

See Also

External Links

Exploit Kit