Monday, August 19, 2019
data reverse engineering in smart phones Essay --
There are numerous tools for data reverse engineering in smart phones, specifically Android phones. Some useful Android tools are Android Network Toolkit(ANTI), DroidBox, AVD Clone, and Smart Pentest Framework (SPF). The tools that are covered can support in retrieving significant information and help out in criminal investigations. The Android Network Toolkit is very useful and effecient application tool. According to the website Hackers Online Club, "This app is capable of mapping your network, scanning for vulnerable devices or configuration issues. It is for use by the amateur security enthusiast home user to the professional penetration tester, ANTI provides many other useful features." Here are some of the features for Android Network Toolkit (ANTI): it provides an easier connection to visual sniffing, and open ports. Visual sniffing usually refer to retrieving Cookies and URLs. The ANTI application also allows the user to perform MiTM attacks, allows the user to exploit Server and Client Sides. MiTM is normally use in cryptography and computer security. MiTM is basically eavesdropping. The application also comes with password cracker which determines the security level's in a password. ANTI may also replace an image in Denial of Service attacks and demos. All of these features are parrt of the Android Ne twork Toolkit (ANTI). Another helpful application is the DroidBox. This purpose of the DroidBox is perfrom dynamic analysis of other Android applications. The application generates many useful results. These are the results when the analysis has ended: it shows the incoming and outgoing network data. It also shows the hashes for the analyzed package, the application does file reads and write operations. It provides inform... ...will also be integrated with existing tools. Some of those tools are SET , Metasploit, and mcuh more. Conclusion Data Reverse Engineering on smartphone can have postivie and negative effect. Many of the applications today were created because of Data Reverse Engineering. a postive effect is that application developer can use Data Reverse Engineering to create a similar or new app from an existing app. A negative effect would be the creation of an application that is used to retrieve certain data from an individual or application attack other devices. An application may also be created to support criminal investigation and other forensic related subjects. There are numerous amount forensic tools application for all type of devices. Overall, an application that is created to attack other devices is not always bad, it just depence on the who is using the application.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.