Browse By Repository:

 
 
 
   

Penetration testing for android using metasploit framework

Tan, Chun Yong (2021) Penetration testing for android using metasploit framework. Project Report. Universiti Teknikal Malaysia Melaka, Melaka, Malaysia. (Submitted)

[img] Text (24 Pages)
Penetration testing for android using metasploit framework.pdf

Download (328kB)
[img] Text (Full Text)
Penetration testing for android using metasploit framework.pdf - Submitted Version
Restricted to Repository staff only

Download (3MB)

Abstract

Penetration Testing is a simulated cyberattack on your computer to check for vulnerabilities that can be exploited in order to improve and enhance an organization security system. Unfortunately, many users do not really understand what are the vulnerabilities on their devices behind the pentest implementation. This project is about developing an pentesting tool with other penetration tools which is not only to extract the information from the targeting victim’s devices, but also will help the victim to understand what was the vulnerabilities of their devices and help improve their security knowledge during the pentest execution. The objective of this project is to test the developed pentesting tool and secure the target device in the pre-setup testbed, to develop an pentesting tool with application file using MSFvenom tool to extract information about the targeting android devices, to set up a listener to receive the connection from the reverse TCP connection from targeting victim’s devices in order to obtain the information from the devices, and lastly is generate a risk report to educate victim about the knowledge on how to secure their devices from being exploit by the attackers. This project is designed by combining all the 5 stages on pentesting which include reconnaissance, scanning, gain access, risk analysis & recommendation and report generation. Lastly, as the penetration tester, you should look into security points for an android device to conduct a risk report to victim by including all information from the pentesting process to prevent information exploit by the attackers which include disable the enable option unknown resources by downloading application from third-party website applications other than Google Play Store which contains high security level and also can installed anti-virus into devices to detect the virus of the application.

Item Type: Final Year Project (Project Report)
Uncontrolled Keywords: Devices, Vulnerabilities, Tool, Security, Android, Application, Victim, Penetration, Device, Tcp
Divisions: Library > Final Year Project > FTMK
Depositing User: Norfaradilla Idayu Ab. Ghafar
Date Deposited: 22 May 2023 05:31
Last Modified: 22 May 2023 05:31
URI: http://digitalcollection.utem.edu.my/id/eprint/27347

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year