IJETEV1I1A003 – ANDROID HACKING AND EXPLOITATIONUSING KALI LINUX : A CYBER FORENSIC ANALYSIS OFVULNERABIILTIES AND MITIGATION

  • Home
  • ENGINEERING
  • IJETEV1I1A003 – ANDROID HACKING AND EXPLOITATIONUSING KALI LINUX : A CYBER FORENSIC ANALYSIS OFVULNERABIILTIES AND MITIGATION

IJETEV1I1A003 -  ANDROID HACKING AND EXPLOITATION USING KALI LINUX : A CYBER FORENSIC ANALYSIS OF VULNERABIILTIES AND MITIGATION

AUTHORS : G.Vishvanath Sundharam, Sudhakaran S, Vijayasarathi S,  James Godwin G.

ABSTRACT – IT security is a paramount concern in today’s internet landscape due to the prevalence of communication activities. Testing for personal data theft using social engineering methods aims to identify potential security vulnerabilities in the system and network of a user’s Android device. These vulnerabilities could be exploited by hackers if users are unaware of social engineering tactics, allowing for data theft through the use of a Remote Administration Tool (RAT) inadvertently downloaded onto the Android device. The deployment of a RAT via social engineering represents a viable and effective method for compromising the privacy of Android users. This study provides an overview of fundamental concepts related to data theft, ranging from recent call and personal data breaches to the remote manipulation of Android users’ cameras and microphones. users no longer need to install additional tools manually. Apart from that, Kali Linux also has an intuitive user interface so that users can efficiently operate the system and the tools provided. Another advantage is modifying and customizing the tools according to user needs through manual configuration or built-in features such as meta packages. Thus, Kali Linux is one of the right choices for android hacking practitioners in conducting security testing on the Android system.

Previous Post

Leave A Comment

Cart