Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Penetration Testing of Vulnerability in Android Linux Kernel Layer via an Open Network (Wi-Fi)

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Buthaina Mohammed Al-Zadjali
10.5120/ijca2016907998

Buthaina Mohammed Al-Zadjali. Article: Penetration Testing of Vulnerability in Android Linux Kernel Layer via an Open Network (Wi-Fi). International Journal of Computer Applications 134(6):40-43, January 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Buthaina Mohammed Al-Zadjali},
	title = {Article: Penetration Testing of Vulnerability in Android Linux Kernel Layer via an Open Network (Wi-Fi)},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {134},
	number = {6},
	pages = {40-43},
	month = {January},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

Android Smartphones, which is highly competitive smart phone in market, stores an enormous amount of data locally and remotely which sometimes cause a big challenge in security feature encouraging hackers to inject the malicious code in Android OS to steal the confidential data.

The key focus of this paper is to analyze and investigate the vulnerability in Android OS by injecting malicious code through penetration tools in the Linux kernel layer. This work will involve to selecting one type of security threats in Android system which is a Wireless access point (Wi-Fi) to evaluate the vulnerability in Android to proof if possible to attack the Linux Kernel in Android system through the open Wi-Fi network. This test will be done by using the Metasploit Framework.

References

  1. A. Alonso-Parrizas, "Securely deploying Android devices," Dublin, Ireland, 2011.
  2. V. VIJITH, "Android Forensic Capability and Evaluation of Extraction Tools," 2012.
  3. Naresh Kumar & Muhammad Ehtsham Ul Haq, "Penetration Testing of Android-based Smartphones," p. 5, 2011.
  4. D. M. Hafele, "Three Different Shades of Ethical Hacking Black, White and Gray," SANS Institute InfoSec Reading Room, 2004.
  5. Linda McCarthy and Denise Weldon-Siviy, Hackers and Crackers, D. Weldon-Siviy, Ed., Linda McCarthy, 2010.
  6. N. Jaswal, Mastering Metasploit, First Edition ed., BIRMINGHAM - MUMBAI: Packt Publishing Ltd., 2014, p. 22.
  7. A. Singh, Metasploit Penetration Testing Cookbook, Birmingham: Packt Publishing Ltd, 2012, p. 34.
  8. Mati Aharoni,William Coppola,Devon Kearns,David KennedyMatteo Memelli,Max Moser,Jim O'Gorman,David Ovitz and Carlos Perez , "https://www.offensive-security.com/metasploit-unleashed/," JUNE 2011. [Online]. Available: https://www.offensive-security.com/metasploit-unleashed/.
  9. David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni, Metasploit The Penetration Tester’s Guide, San Francisco: William Pollock, 2011.
  10. S. Sleuth, "http://www.security-sleuth.com/sleuth-blog/2015/1/11/using-metasploit-to-hack-an-android-phone," 12 JANUARY 2015. [Online]. Available: http://www.security-sleuth.com/sleuth-blog/2015/1/11/using-metasploit-to-hack-an-android-phone. [Accessed 2015].

Keywords

Android Smartphone, Linux Kernel Layer, penetration test.