29.09.2015 Views

Legal Disclaimer

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Hacking For Beginners – Manthan Desai 2010<br />

7. Mobile hacking – SMS & Call forging<br />

It was bound to happen - they have hacked just about everything else. Now it's the cell phones. Cellphone hacking has<br />

just recently surfaced and been made public ever since some one did some cellular phone hacking on Paris Hilton's cell<br />

phone.<br />

This article will give you some information about what is going on out there and what you can do to better protect your<br />

cell phone information.<br />

What Does It Involve<br />

The fact of someone hacking cell phone became public knowledge when Paris Hilton's cell phone, along with her<br />

information was recently hacked. Unfortunately for her, all her celebrity friends and their phone numbers were also<br />

placed on the Internet - resulting in a barrage of calls to each of them.<br />

Cell phone hackers have apparently found a glitch in the way the chips are manufactured. The good news, though, is that<br />

it only applies to the first generation models of cell phones that use the Global System for Mobile communications (GSM).<br />

Another requirement is that the hacker must have physical access to the cell phone for at least three minutes - which is a<br />

real good reason not to let it out of your sight. Currently, although the problem has been remedied (at least for now) in<br />

the second and third generation phones, it seems that about 70% of existing cell phones fall within the first generation<br />

category.<br />

Another way that mobile phone hacking can take place is for a hacker to walk around an area with people that have cell<br />

phones and a laptop that has cellphone hacker programs on it. Through an antenna, and a little patience, his computer<br />

can literally pick up your cell phone data - if it is turned on. This is more applicable to cell phones that use Bluetooth<br />

technology.<br />

What Can A Hacker Do?<br />

Surprisingly, there are quite a number of things that can be accomplished by the hacker. Depending on their intent here<br />

are a few of them.<br />

<br />

<br />

Steal Your Number<br />

Your phone number can be accessed and obtained by cellphone hacking. This allows them to make calls and have<br />

it charged to your account.<br />

Take Your Information<br />

Mobile hacking allows a hacker to contact your cell phone, without your knowledge, and to download your<br />

addresses and other information you might have on your phone. Many hackers are not content to only get your<br />

information. Some will even change all your phone numbers! Be sure to keep a backup of your information<br />

somewhere. This particular technique is called Bluesnarfing.<br />

w w w . h a c k i n g t e c h . c o . t v Page 72

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!