Backdoor Implementation in Android using Open Source Tools
Rajasekhar Reddy. R1, P.S.G.Aruna Sri2, Ram Sai. P3, Jedediah.B4, Anusha. M5
1Rajasekhar Reddy. R*, Student, Department of Electronics & Computer Engineering, Konreu Lakshmaiah Education Foundation, Vaddeswaram, AP, India.
2P.S.G.Aruna Sri, Associate Professor, Department of Electronics & Computer Engineering, Konreu Lakshmaiah Education Foundation, Vaddeswaram, AP, India.
3Ram Sai.P, Student, Department of Electronics & Computer Engineering, Konreu Lakshmaiah Education Foundation, Vaddeswaram, AP, India.
4Jedediah.B, Student, Department of Electronics & Computer Engineering, Konreu Lakshmaiah Education Foundation, Vaddeswaram, AP, India.
5Anusha.M. Associate Professor, Department of Computer Science Engineering, Konreu Lakshmaiah Education Foundation, Vaddeswaram, AP, India
Manuscript received on December 15, 2019. | Revised Manuscript received on December 20, 2019. | Manuscript published on January 10, 2020. | PP: 2870-2872 | Volume-9 Issue-3, January 2020. | Retrieval Number: C8920019320/2020©BEIESP | DOI: 10.35940/ijitee.C8920.019320
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In this paper, we are showing the usage of hacking into android framework with the help of an open source tool. Turn around TCP opens an indirect access on the target system and which is remotely operated by the attacker without the target’s information. However the connection must be initiated by the victim. The Metasploit tool is an open source tool. It help about the susceptibilities and helps in performing penetration testing. Metasploit framework consists of an exploits database, payloads, and vulnerabilities. By this attack, the assaulter creates a payload, and that payload is transferred into the victim system. When the payload is initiated, the attacker gets access to the victim’s system, files, images, contacts, messages etc.
Keywords: Metasploit Framework, Firewall, Remote Backdoor, Reverse TCP,
Scope of the Article: Patterns and Frameworks