{"id":6989,"date":"2025-06-25T18:24:20","date_gmt":"2025-06-25T18:24:20","guid":{"rendered":"https:\/\/ijete.com\/?p=6989"},"modified":"2026-03-16T18:40:19","modified_gmt":"2026-03-16T18:40:19","slug":"ijetev1i1a003","status":"publish","type":"post","link":"https:\/\/ijete.com\/index.php\/2025\/06\/25\/ijetev1i1a003\/","title":{"rendered":"IJETEV1I1A003 &#8211; ANDROID HACKING AND EXPLOITATIONUSING KALI LINUX : A CYBER FORENSIC ANALYSIS OFVULNERABIILTIES AND MITIGATION"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6989\" class=\"elementor elementor-6989\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6c0c50 e-con-full e-flex e-con e-child\" data-id=\"e6c0c50\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3ea7ebf e-con-full e-flex e-con e-child\" data-id=\"3ea7ebf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-392145c elementor-widget elementor-widget-heading\" data-id=\"392145c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><span style=\"letter-spacing: 0px\">IJETEV1I1A003 -&nbsp;<\/span> ANDROID HACKING AND EXPLOITATION   \nUSING KALI LINUX : A CYBER FORENSIC ANALYSIS OF                                 \nVULNERABIILTIES   AND MITIGATION <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d03feba e-con-full e-flex e-con e-child\" data-id=\"d03feba\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4552d35 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"4552d35\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"color: #b20909;\">AUTHORS<\/span> :<\/strong> G.Vishvanath Sundharam, Sudhakaran S, Vijayasarathi S,\u00a0 James Godwin G.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5fb607 elementor-widget elementor-widget-post-info\" data-id=\"b5fb607\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-fcdd1a1 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/ijete.com\/index.php\/2025\/06\/25\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>June , 2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9ac1d9 elementor-widget elementor-widget-text-editor\" data-id=\"e9ac1d9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #b20909;\"><strong>ABSTRACT<\/strong><\/span> &#8211;\u00a0<span style=\"font-family: inherit; font-weight: inherit; letter-spacing: 0px;\">IT security is a paramount concern in today&#8217;s internet landscape due to the prevalence of communication activities. Testing for personal data theft using social engineering methods aims to identify potential security vulnerabilities in the system and network of a user&#8217;s Android device. These vulnerabilities could be exploited by hackers if users are unaware of social engineering tactics, allowing for data theft through the use of a Remote Administration Tool (RAT) inadvertently downloaded onto the Android device. The deployment of a RAT via social engineering represents a viable and effective method for compromising the privacy of Android users. This study provides an overview of fundamental concepts related to data theft, ranging from recent call and personal data breaches to the remote manipulation of Android users&#8217; cameras and microphones. users no longer need to install additional tools manually. Apart from that, Kali Linux also has an intuitive user interface so that users can efficiently operate the system and the tools provided. Another advantage is modifying and customizing the tools according to user needs through manual configuration or built-in features such as meta packages. Thus, Kali Linux is one of the right choices for android hacking practitioners in conducting security testing on the Android system.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78b471e elementor-widget elementor-widget-button\" data-id=\"78b471e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/ijete.com\/wp-content\/uploads\/2025\/06\/IJETEV1I1A003.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">DOWNLOAD<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4dc644 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b4dc644\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IJETEV1I1A003 &#8211;&nbsp; ANDROID HACKING AND EXPLOITATION USING KALI LINUX : A CYBER FORENSIC ANALYSIS OF VULNERABIILTIES AND MITIGATION AUTHORS : G.Vishvanath Sundharam, Sudhakaran S, Vijayasarathi S,\u00a0 James Godwin G. ABSTRACT &#8211;\u00a0IT security is a paramount concern in today&#8217;s internet landscape due to the prevalence of communication activities. Testing for personal data theft using social engineering [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6989","post","type-post","status-publish","format-standard","hentry","category-engineering"],"_links":{"self":[{"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/posts\/6989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/comments?post=6989"}],"version-history":[{"count":4,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/posts\/6989\/revisions"}],"predecessor-version":[{"id":6997,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/posts\/6989\/revisions\/6997"}],"wp:attachment":[{"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/media?parent=6989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/categories?post=6989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/tags?post=6989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}