![]() ![]() The attack can be summarized in something like this: ![]() It's all about mocking or tricking people to use or download a Malware and take advantage of it for malicious purposes. Social Engineering is a term that describes nontechnical intrusion that relies heavily on human interaction by tricking other people to break normal security procedures. N order to explain the concept very clearly, we can split the term into two elements, where Social can set up as personal and professional lives, Engineering refers to performing tasks by following certain steps to achieving targets. This demo was created on a controller and local lab, but it can be done on WAN networks easily. This is a pretty common "Social Engineering Attack", and it's focused on generating a reverse TCP connection, where the attacker easily can generate shell access to your Android phone in the time you are using the infected application and do some harmful stuff or access your private information without any concern.Īnd when a mean “Social Engineering Attacks” is because the way it propagates, I’ll explain in a bit how are the typical phases of this attacks. This writing demonstrates a practical and simple example on how to generate a Reverse TCP back-door on an existing APK file. Both have pros and cons, they are designed and configured with default security settings that maybe not the ideal for non-experienced people. ![]() The battle of smart-phones remains today between IOs and Android. Many entrepreneurs left behind web-based experiences for building disruptive mobile solutions. We have to set a point, mobile applications are a HUGE market today. Backdooring Android Apps with FatRat and Metasploit Framework ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |