Features: This paper will review WAP, WAP Push, WML, and WMLScript and their ability to host malicious software. Exploits such as buffer overflows, authentication, and encryption schemes are outside the scope of this paper. Finally to detech such future threats,…
TULP2G
Features: Uses Microsoft .NET Performs forensic extracting and decoding of date store in electronic devices Plugins available to read data from mobile phones and Sim cards.
Analysis of 3G Mobile Security
Features: Online Page which is a report on 3G security
Neverbefore Bluetooth Intrusion
Features: Protect yourself again intruder using this manual learn how an attacker step by step gains access to symbian and bluetooth enable phones Takes control and even can steal call credit
Phreak 2k
Features: Mobile Phone Phreaking Document covers phreaking methods, systems and setups
Undelete SMS
Features: can recover deleted SMS messages from a GSM SIM card Must be ran from command prompt Can display delete sms to command prompt, not restore on phone