[Security] Mobile Based MiTM attack by Bilal Bokhari

If we look at the history of computer development, the computer developers/engineers just 10 years back did not have any clue as to how this industry is going to be, the way this industry we have today. The Computers and its applications nowadays are more powerful and much smarter than ever before. Computer applications are used in every industry like engineering, designing, music programming, web development etc which enables their users to come up with amazing products every day.

So far so good the story of the computer development sounds amazing but there is a problem with its development. When computer applications are developed, they are not particularly a complete perfect solution. They contain some flaws or bugs which can be exploited by computer hackers.
Normally when a computer “Exploit” or “Flaw” is discovered, it is either fixed quickly by its developers or it is exploited by the computer hacker. The computer exploits which are discovered by computer hackers before the applications developers are “zero day vulnerability” and if they are exploited then they are called the “Zero Day Attacks”. It is just one explanation of how computer users can be affected, but there are other different types of computer based attacks that can disrupt computer communication flow. They can either be user information disclosures, DDOS attacks, Website defacements, Botnets, Trojans, Spywares, Email spam and etc. All these mentioned attacks utilize some applications, operating system and procedures which act as a platform in order to make them happen and to affect a targeted user. So it is clear that a platform and a target are required in order to launch a successful computer based attack. Like computers, mobile phones of today have also redefined the way of communication. They are more like a personal computer rather than being just a simple two-way communication device. You no longer need to sit in front of a monitor screen just to check your facebook comments, emails, news, forums, blogs etc because all can be done right from your handheld device. Everyday more and more developments are made to make the user experience on mobile phone more pleasant than ever before. Mobile phones of today are more like the re-invention of the computer itself. They are small in size and are powerful enough to carry out tasks which earlier required a chair, table and a pc. Just visualize for a moment, what if the same computer based platforms are provided in small handheld devices then what? Well, only the computer’s history of development will be repeated but in a smarter way. The same pros and cons will be inherited. It also means that the same computer attacks will be executed right from the attacker’s handheld device. By now this mobile based computer attacks is not at all a new concept. There are a lot of platforms, applications and procedures available and developed for mobile devices to launch the same computer based attacks with the same amount of damage.



Popular posts from this blog

[Hack crack] Tổng hợp Google Dork

[Security] Internet blackout scheduled in protest of SOPA