ExtremeHacking
Today : | Time : | safemode : ON
> / Main Website / Cyber Surakha Abhiyan / Hackers Charity / Linkedin / facebook / twitter /
Name Author Perms Com Modified Label

T-Mobile Wi-Fi Calling App vulnerable to Man-in-the-Middle attack Unknown rwxr-xr-x 0 3/24/2013

Filename T-Mobile Wi-Fi Calling App vulnerable to Man-in-the-Middle attack
Permission rw-r--r--
Author Unknown
Date and Time 3/24/2013
Label
Action
Ethical Hacking Institute in Pune
./Arizona Team

T-Mobile devices having a default Wi-Fi Calling feature that keeps you connected in areas with little or no coverage using Wi-Fi connection. But according to new finding by students Jethro Beekman and Christopher Thompson from University of California Berkeley, that this feature lets millions of Android users vulnerable to Man-in-the-Middle attack.

















The simplest way to become a man-in-the-middle would be for the attacker to be on the same open wireless network as the victim, such as at a coffee shop or other public space.

In a technical analysis of the exploit, The flaw could potentially allow hackers to access and modify calls and messages made by T-Mobile users on certain Android smartphones. Beekman and Thompson informed T-Mobile, a division of Deutsche Telekom, of the flaw in December and on March 18 T-Mobile was able to resolve the issue for all affected phone models.

T-Mobile uses regular VoIP for Wi-Fi Calling instead of a connection that encrypted, something that aids in its vulnerability. The certificate validation had not been fully implemented, so without this proper verification, hackers could have created a fake certificate and pretend to be the T-Mobile server.

T-Mobile released a security update to its Android users on March 18 that resolved the issue. Other carriers around the world have similar features enabled on some smartphones, including Rogers Wireless in Canada and Orange in Britain.

www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE
 

Cyber Suraksha Abhiyan | Sadik Shaikh © 2015 Sadik Shaikh | CEH V9 | ETHICAL HACKING Course Training Institute in India-Pune
Extreme Hacking Template design by Sadik Shaikh | Cyber Suraksha Abhiyan