Abstract

This work focuses mainly on the penetration test function and stability of Android smartphones under Kali 2019 and creates a stable penetration function of Android smartphones to form a strong reverse transmission control protocol connection. Using the silent installation technology supported by the Accessibility Service (integrated on a nontoxic functional platform), the Android Package that injects the penetration function successfully bypasses the common mobile phone antivirus software on the market to improve the penetration efficiency.

Highlights

  • Things Net is known as the third wave of the information revolution, and its development will have a huge social and economic benefits

  • We propose a source-level optimization method to modify the Metasploit reverse transmission control protocol (TCP) connection with the application startup service script together to increase the stability of penetration testing

  • With the rapid rise of the mobile Internet of Things and the Internet, both manual auditing and automated infiltration techniques need to be built on technologies that remain stable in penetration testing sessions

Read more

Summary

Introduction

Things Net is known as the third wave of the information revolution, and its development will have a huge social and economic benefits. We propose a source-level optimization method to modify the Metasploit reverse transmission control protocol (TCP) connection with the application startup service script together to increase the stability of penetration testing. After obtaining the UI element on the current operation interface of the mobile intelligent terminal, the action execution method is used to send an operation effect request to the smartphone At this point, the accessibility service system began to enter the cycle phase and achieved the effect of silent installation. The onDestroy method (List 3) in the rewrite service class can be used to implement the automatic restart function when the service is destroyed.[16] At the same time, locate the Metasploit source code that contains the Android attack and the module that uses the module, namely, the MainService.java package, and add the following code to the MainService class: List 5. The conclusion is that the two methods work best together

Conclusion
Findings
Related work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call