similarity-Analysis of Remote Access Trojan Attack using Android Debug Bridge

Sunardi, Sunardi (2021) similarity-Analysis of Remote Access Trojan Attack using Android Debug Bridge. IJID (International Journal on Informatics for Development), 10 (2). ISSN 2549-7448

[thumbnail of Analysis of Remote Access Trojan Attack using Android Debug Bridge.pdf] Text
Analysis of Remote Access Trojan Attack using Android Debug Bridge.pdf

Download (3MB)

Abstract

Thesecurity hole in the Androidoperating system is sometimes not realizedby userssuch as malware and exploitation by third parties to remote access.Thisstudy was conducted to identify the vulnerabilities ofthe Androidoperating system by using Ghost Framework. The vulnerability of the Android smartphone is found by using the Android DebugBridge (ADB) with the exploitation method as well as to analyze the test results and identify remote access Trojan attacks. The exploitation methodwithseveral steps from preparing the tools and connecting the testing commands to the testing devicehas been conducted. The result shows that Androidversion 9 can be remotelyaccessedby entering the exploit via ADB.Some information has beenobtainedby third parties,enter and change the contents of the system directory byremote accesslike an authorized todo any activities on the device such as opening lock screen, entering the directory system, changing the system, etc

Item Type: Artikel Umum
Subjects: T Technology > T Technology (General)
Divisi / Prodi: Faculty of Industrial Technology (Fakultas Teknologi Industri) > S1-Electrical Engineering (S1-Teknik Elektro)
Depositing User: SUNARDI
Date Deposited: 23 Aug 2022 02:15
Last Modified: 23 Aug 2022 02:19
URI: http://eprints.uad.ac.id/id/eprint/36440

Actions (login required)

View Item View Item