Analysis of Remote Access Trojan Attack using Android Debug Bridge
نویسندگان
چکیده
The security hole in the android operating system sometimes not realized by users such as malware and exploitation third parties to remote access. This study conducted identify vulnerabilities of using Ghost Framework. vulnerability smartphone are found Android Debug Bridge (ADB) with method well analyze test results access Trojan attacks. several steps from preparing tools connecting testing commands device have been conducted. result shows that version 9 can be entering exploit via ADB. Some information has obtained parties, enter change contents directory like an authorized do any activities on opening lock screen, system, changing etc.
منابع مشابه
Vnc Architecture Based Remote Desktop Access through Android Mobile Phones
In this paper, we will enlist the process to access the desktops of remote computer systems with the use of a android based cellular phone. This process will be carried out using Virtual Network Computing based architecture. A user will be able to access and manipulate the desktops of remote computers through a VNC viewer that will be provided on the user's cell-phone. Conditions that must be f...
متن کاملanalysis of ruin probability for insurance companies using markov chain
در این پایان نامه نشان داده ایم که چگونه می توان مدل ریسک بیمه ای اسپیرر اندرسون را به کمک زنجیره های مارکوف تعریف کرد. سپس به کمک روش های آنالیز ماتریسی احتمال برشکستگی ، میزان مازاد در هنگام برشکستگی و میزان کسری بودجه در زمان وقوع برشکستگی را محاسبه کرده ایم. هدف ما در این پایان نامه بسیار محاسباتی و کاربردی تر از روش های است که در گذشته برای محاسبه این احتمال ارائه شده است. در ابتدا ما نشا...
15 صفحه اولPreamble : Remote Storage in Android Using SCTP
from the last three four years the smart phones are much popular in the people but with this popularity everyone is expecting more and more about the performance and functionality. There are many Smartphone manufacturers providing more and more features day by day. The Smart phones have pick up their market share because of android operating system. With this growing market there are some limit...
متن کاملPreventing collusion attack in android
Globally, the number of Smartphone users has risen above a billion, and most of users use them to do their day-today activities. Therefore, the security of smartphones turns to a great concern. Recently, Android as the most popular smartphone platform has been targeted by the attackers. Many severe attacks to Android are caused by malicious applications which acquire excessive privileges at ins...
متن کاملscour modeling piles of kambuzia industrial city bridge using hec-ras and artificial neural network
today, scouring is one of the important topics in the river and coastal engineering so that the most destruction in the bridges is occurred due to this phenomenon. whereas the bridges are assumed as the most important connecting structures in the communications roads in the country and their importance is doubled while floodwater, thus exact design and maintenance thereof is very crucial. f...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Informatics for Development: IJID
سال: 2022
ISSN: ['2549-7448', '2252-7834']
DOI: https://doi.org/10.14421/ijid.2021.2839