1/10
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Restricted
Changes
In iOS and Android, the user account created during setup is able to install apps and configure settings, but it is ______ from making any system-level ______
Privilege Escalation
An attacker's ability to gain higher-level access to a system or network by exploiting vulnerabilities or misconfiguration — (Goog)
Users who want to avoid the restrictions that some OS vendors, handset OEMs, and telecom providers put on the devices must use some type of _______
2 types
Root Access
Jailbreak
The 2 types of Mobile Device Privilege Escalation
Root Access
Jailbreak
Root Access
Gaining superuser level access over an Android-based mobile device – (A+)
Some vendors provide authorized mechanisms for users to access the root account on their device
For some devices a user must
Exploit a vulnerability
Use custom firmware
Essentially a new Android OS image applied to the device
Custom Firmware aka Custom ROM (In the context of Root Access Privilege Escalation)
This is a method for some Android users to gain access to the root account on their device
It is essentially a new Android OS image applied to the device
This can also be referred to as a custom ROM,
(after the term for the read-only memory chips that used to hold firmware)
Jailbreaking
Removes the protective seal and any OS specific restrictions to give users greater control over the device – (A+)
iOS _____ is accomplished by booting the device with a patched kernel
For most exploits, this can only be done when the device is attached to a computer while it boots
(tethered _____ )
Term for exploits enabling the user to
Obtain root privileges,
Sideload apps (download apps not from official app store)
Change or add carriers
Customise the interface
True
However, the main goal is to gain unrestricted system-level access to the OS by subverting the security controls built into the OS
True or False: Rooting or jailbreaking mobile devices has the side effect of leaving many security measures permanently disabled
Safety consequences of Jailbreaking & Custom Firmware/ROM
If the user has root permissions
Essentially any management agent software running on the device is compromised
If the user has applied a custom firmware image
They could have removed the protections that enforce segmentation of corporate workspaces
The device can no longer be assumed to run a trusted OS
True
MDM suites also have routines to prevent access to an enterprise app, network, or workspace in response to this
True or False: Mobile-device management (MDM) suites have routines to detect a rooted or jailbroken device or custom firmware with no valid developer code signature
Containerisation
Cryptography
______ and enterprise workspaces can use ______ to protect the workspace In a way that is much harder to compromise than a local agent (local device software/process on phone) even from a rooted/jailbroken device
Developer Mode
Mobile device feature/mode designed for testing apps during development that may weaken corporate security protections if misused – (A+)
Makes advanced configuration settings and diagnostic/log data available
Should
Be used only for actual app development work
Not be enabled routinely
Can purposefully be misused to install bootleg apps without jailbreaking
Devices with ____ enabled can be blocked by MDM software