Sunardi, Sunardi (2021) similarity-Analysis of Remote Access Trojan Attack using Android Debug Bridge. IJID (International Journal on Informatics for Development), 10 (2). ISSN 2549-7448
Text
Analysis of Remote Access Trojan Attack using Android Debug Bridge.pdf Download (3MB) |
Abstract
Thesecurity hole in the Androidoperating system is sometimes not realizedby userssuch as malware and exploitation by third parties to remote access.Thisstudy was conducted to identify the vulnerabilities ofthe Androidoperating system by using Ghost Framework. The vulnerability of the Android smartphone is found by using the Android DebugBridge (ADB) with the exploitation method as well as to analyze the test results and identify remote access Trojan attacks. The exploitation methodwithseveral steps from preparing the tools and connecting the testing commands to the testing devicehas been conducted. The result shows that Androidversion 9 can be remotelyaccessedby entering the exploit via ADB.Some information has beenobtainedby third parties,enter and change the contents of the system directory byremote accesslike an authorized todo any activities on the device such as opening lock screen, entering the directory system, changing the system, etc
Item Type: | Artikel Umum |
---|---|
Subjects: | T Technology > T Technology (General) |
Divisi / Prodi: | Faculty of Industrial Technology (Fakultas Teknologi Industri) > S1-Electrical Engineering (S1-Teknik Elektro) |
Depositing User: | SUNARDI |
Date Deposited: | 23 Aug 2022 02:15 |
Last Modified: | 23 Aug 2022 02:19 |
URI: | http://eprints.uad.ac.id/id/eprint/36440 |
Actions (login required)
View Item |