We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Penetration Testing of Vulnerability in Android Linux Kernel Layer via an Open Network (Wi-Fi)

by Buthaina Mohammed Al-Zadjali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 6
Year of Publication: 2016
Authors: Buthaina Mohammed Al-Zadjali
10.5120/ijca2016907998

Buthaina Mohammed Al-Zadjali . Penetration Testing of Vulnerability in Android Linux Kernel Layer via an Open Network (Wi-Fi). International Journal of Computer Applications. 134, 6 ( January 2016), 40-43. DOI=10.5120/ijca2016907998

@article{ 10.5120/ijca2016907998,
author = { Buthaina Mohammed Al-Zadjali },
title = { Penetration Testing of Vulnerability in Android Linux Kernel Layer via an Open Network (Wi-Fi) },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 6 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 40-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number6/23922-2016907998/ },
doi = { 10.5120/ijca2016907998 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:34:28.863325+05:30
%A Buthaina Mohammed Al-Zadjali
%T Penetration Testing of Vulnerability in Android Linux Kernel Layer via an Open Network (Wi-Fi)
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 6
%P 40-43
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Android Smartphones, which is highly competitive smart phone in market, stores an enormous amount of data locally and remotely which sometimes cause a big challenge in security feature encouraging hackers to inject the malicious code in Android OS to steal the confidential data. The key focus of this paper is to analyze and investigate the vulnerability in Android OS by injecting malicious code through penetration tools in the Linux kernel layer. This work will involve to selecting one type of security threats in Android system which is a Wireless access point (Wi-Fi) to evaluate the vulnerability in Android to proof if possible to attack the Linux Kernel in Android system through the open Wi-Fi network. This test will be done by using the Metasploit Framework.

References
  1. A. Alonso-Parrizas, "Securely deploying Android devices," Dublin, Ireland, 2011.
  2. V. VIJITH, "Android Forensic Capability and Evaluation of Extraction Tools," 2012.
  3. Naresh Kumar & Muhammad Ehtsham Ul Haq, "Penetration Testing of Android-based Smartphones," p. 5, 2011.
  4. D. M. Hafele, "Three Different Shades of Ethical Hacking Black, White and Gray," SANS Institute InfoSec Reading Room, 2004.
  5. Linda McCarthy and Denise Weldon-Siviy, Hackers and Crackers, D. Weldon-Siviy, Ed., Linda McCarthy, 2010.
  6. N. Jaswal, Mastering Metasploit, First Edition ed., BIRMINGHAM - MUMBAI: Packt Publishing Ltd., 2014, p. 22.
  7. A. Singh, Metasploit Penetration Testing Cookbook, Birmingham: Packt Publishing Ltd, 2012, p. 34.
  8. Mati Aharoni,William Coppola,Devon Kearns,David KennedyMatteo Memelli,Max Moser,Jim O'Gorman,David Ovitz and Carlos Perez , "https://www.offensive-security.com/metasploit-unleashed/," JUNE 2011. [Online]. Available: https://www.offensive-security.com/metasploit-unleashed/.
  9. David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni, Metasploit The Penetration Tester’s Guide, San Francisco: William Pollock, 2011.
  10. S. Sleuth, "http://www.security-sleuth.com/sleuth-blog/2015/1/11/using-metasploit-to-hack-an-android-phone," 12 JANUARY 2015. [Online]. Available: http://www.security-sleuth.com/sleuth-blog/2015/1/11/using-metasploit-to-hack-an-android-phone. [Accessed 2015].
Index Terms

Computer Science
Information Sciences

Keywords

Android Smartphone Linux Kernel Layer penetration test.