Mobile Forensics / UC2WMD051

Mobile Forensics / UC2WMD051

For this report I am testing three mobile forensics tools to evaluate them on various criteria. I am looking at ease of use, documentation/guidance, graphical interface, analysis quality and reporting. For this report I am using an iPhone 5 (Model: A1429) with 32 GB...
Windtalker / UC2WMD051

Windtalker / UC2WMD051

There are a vast amount of security features implemented into technology today, making life harder for people with malicious intent to gain access to valuable information. Whilst we use two-factor authentication, 256-bit cryptography and other means to secure digital...
Interaction / UC2WMD051

Interaction / UC2WMD051

In the Wireless and Mobile Devices -course we have had a great deal of interaction. Mostly I have been interacting with C.P. Bakke and A.F. Løvhøiden, and it has been mostly discussions and testing in regards to various wireless attacks. The original entry was made by...
Cracking WEP / UC2WMD051

Cracking WEP / UC2WMD051

Although most providers and users today are using WPA2 encryption, there are still a lot of users that set their wireless network with WEP security (Wired Equivalent Privacy). It is estimated that the amount of WEP-users correlate with the number of Swedish people in...
Network scan / UC2WMD051

Network scan / UC2WMD051

After you have gained access to a network either by doing the MITM attack, or perhaps using Brute Force or social engineering, there are a number of different things you can do to go from there. Like looking at the network traffic with Wireshark or you can force users...
MITM Attack / UC2WMD051

MITM Attack / UC2WMD051

Earlier I wrote a journal entry about BSSID and the information about them. And I wanted to take a closes look on what types of attacks can be made on just knowing the BSSID and the information surrounding the Access Point. A little background on how wireless...