Secure Phone and Hack Phone Android Intensive
βSECURE PHONEβ
- Letβs create a phone using ANDROID OS as an example
- With protection against network traffic interception;
- With notification about substitution of the base station (BS);
- By choosing open source firmware or removing built-in backdoors (yes, yes, theyβre present in almost every firmware!);
- By encrypting it and making it resistant to forensics;
- Discuss backup and recovery methods, as well as encryption for secure storage;
- Talking about antiviruses for Android: are they useful and which one to choose?
- We will highlight services of automatic callerβs number detection, as well as services of automatic call recording of GSM standard and messengers;
- Figuring out the safest messengers of the 3 dominant types (federated, centralized, and p2p);
- Protecting sim cards, types of root and frameworks to change OS function on the fly;
- Using VPN for smartphone;
- Protecting the phoneβs DNS from spoofing;
- Using firewalls for Android;
- By protecting your smartphone from being tapped by third-party applications;
- Safely deleting files, with a clear understanding of why you canβt give your phone to repair or sell it without first scrubbing it.
βHACK PHONEβ
- Phone as a pentester tool that is always on hand
- Phone as a bootable flash drive for hacking and administering Windows;
- Phone as a BAD UASB tool to deliver a payload;
- Net Hunter and its installation types, directly on the phone, or as an element of Smartphone firmware;
Testing router security via Smartphone;
Setting up and optimizing Termux to work with root rights and pentester frameworks for βunderhandβ testing