Sushan Pujari PDF
Sushan Pujari PDF
I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline in order for my assignment to be accepted and marked. I am fully
aware that late submissions will be treated as non-submission and a mark of zero will be awarded.
Abstract
The following report projects the usage of mobile devices in the modern world and how it has
occupied most of the professional and personal life. The report provides knowledge on how
important it is to provide mobile device security in current scenarios . The report also consists
of an attack demonstration which provide brief concept on how an attacker can grant access to
In the demonstration phase, the attacker is a Kali Linux Machine and the target is an android
phone. In the attack scenario, the attacker tricks the target to install the malware and later gains
full access to the target’s device and information. This attack scenario is based on a real case
After the demonstration, the report provides the legal implication of the demonstrated attack in
our society with some recommendation which help to prevent and stay protected from these
App : Application
BS : Bikram Shambat
OS : Operating System
PC : Personal Computer
1. Introduction....................................................................................................................... 1
2. Background ....................................................................................................................... 4
4. Development ..................................................................................................................... 9
5. Demonstration ................................................................................................................. 11
6. Conclusion ...................................................................................................................... 12
7. References....................................................................................................................... 14
8. Appendices ..................................................................................................................... 16
1. Introduction
With the growth of modern era, the advancement of technology has created new inventions
every day. With this advancement, people are getting more and more addicted to their
devices to the point where these technological devices are part of their daily need. One of
these addictive devices is “Mobile Phone”. With the creation of internet and many different
virtual platforms, we can realize that people are more involved in their virtual life than that
of their social life. And with the updating generation, “Mobile Phone” which now known
as “Smart Phone” are able to perform different activities besides phone calls, like playing
games, sending and receiving emails, social medias and electronic banking transactions.
And with the increasing features of smart phones, cybercriminals are finding new and smart
ways to steal confidential information from the users. In this report, such demonstration
will be provided. The demonstration will include, how an android device is vulnerable to
attacks and how can it be manipulated without the knowledge of the target.
safe but currently these safes are virtually set. Back in the days, the only way to steal
data from a person is by physically stealing the data but due to vast increasing number
of technologies this information is virtually stored rather than physically. And these
virtually stored data are more prone to being stole than that of physical storage.
Nowadays, with the invention of smartphone every person has a minicomputer in their
hands which come with more than enough software and application to perform
different kind of task as per users need. As of fourth quarter of 2019, Android users
were able to choose between 2.57 million apps in Google Play store and 1.84 million
1|Page
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
With vast majority of applications to choose from, people tend to choose such
applications which makes their smart phone faster and more customizable. And to lean
towards these customizable setting and improvement in their smart devices, different
tweaks and hacks are used. These tweaks and hacks can be a simple like a wallpaper
and screen saver changes or it can be a core system changes like, gaining root access
With the installation of these tweaks and hacks, devices become more vulnerable to
attacks. There are many hackers who phish the target to install these hacks, in order to
1. Man-in-the-Middle Attack
3. SMS Attacks
According to study, roughly 72% of world population uses android based smart phones
which includes Samsung, Huawei, Xiaomi, Sony and other android vendors. Just in
China, it was found that there was around 121 thousand of new android malware.
Which shows that, with increasing technology, the threats of cyber-attacks are also
Due to higher number in android user, this report will demonstrate, how an android
2|Page
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
to complete.
1.2.1 Aims
By rapid increase in android users, it can be seen that hackers are creating new
possible. Thus, this report will demonstrate such attack in which an android
device is the target and Kali Linux OS will be the attacker. The main aim will
be to retrieve confidential data from the target without alerting the target itself
1.2.2 Objectives
Said aims will be achieved through following objectives:
3|Page
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
2. Background
As increasing adaptation of smartphones, especially android, people are getting more
vulnerable to cyber-attack. Although, there are many benefits using smartphone, there is
no denying that everyone is prone to cyber-attacks. And internet is like a huge data storage
which stores and collect everyone’s information. Information about their jobs, home
address, their status and finance. Trusting technology, thinking that it can secure all these
Although, there are significant numbers of attacks that network security and firewall can
prevent, there are also a lot of unknown attacks. These types of data security actually work
to protect a PC from attacks, but they are not intelligent enough to protect from human
devices which helps to form an interface between the human network and the
communication network are known as end devices. End devices can be either a source
or a destination of data transmitted over the network. Some familiar examples of end
As this report is about mobile devices and its vulnerability to attacks, lets define the
4|Page
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
of human era, these mobile phones are constantly upgrading to meet user’s need.
Mobile phones allow user to communicate with another user anywhere in the
world in fact they have their contact information. This feature helps to
2. Emergency:
like camera, voice recording and so on which can be helpful during time of
need.
3. Storage:
Mobile phones can also act as a data storage in which you can store your
documents, photos, videos, recordings and many different types of data files
4. Educational Purpose:
As being a student myself, mobile phone has played a significant role in the
(Techwalla, 2020)
5|Page
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
networks it connects to. Smartphone is one of the widely used mobile devices. And
why is it vital to secure these mobile devices? As, from above paragraph 2.1.1, it
states that mobile devices have many features and one of them is storing data. Data
about personal life, business dealing, banking accounts and other confidential
information. According to Cisco Resource Center, more than half of the business
are handled through mobile device (Cisco, 2020) which inevitability invites cyber-
threats.
So, to adapt to these upcoming challenges, it is important to keep the mobile device
6|Page
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
3. Literature Review
The literature review section will provide a study on a similar case which is demonstrated
in Topic 5 of this report. The section also contains a brief conclusion about the case study.
Figure 1 Googligan Malware Infected Cases (Check Point Software Technologies Ltd, 2016)
During 2016, it was found that many of android devices were infected by the malware
named “Googligan Trojan Horse”. It was estimated that everyday more than 13000
android devices were being infected by this malware. The above picture shows the
Lollipop OS. The malware gets installed when the user download malware-infected
7|Page
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
Figure 2 Googligan Working Method. (Check Point Software Technologies Ltd, 2016)
Once the malware is installed, it would break into user’s google operated services
(Google photos, drives, docs, Gmail) and then installs application from the google
play store to provide reviews and ratings for apps and send data about the device to
remote server.
If the malware achieved root access, it would send the google accounts and
authentication token information to the remote server and provide full control to the
3.2 Conclusion
In an interview, the Head of Mobile and Cloud Security of Check Point, Michael
Shaulov said, “This attack was a part of an advertising fraud scheme”. The case study
shows that, the Googligan was one of the largest google account breaches ever
occurred. These breaches occur due to the user was unaware enough to install
applications through unauthentic vendors and phishing links. (Check Point Software
8|Page
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
4. Development
The development section of the report will provide brief information about the attack
4.1.1 Nmap
Nmap is a vulnerability scanner and network discovery tool. This tool is used to
gather information about the active status and the logical information of the
4.1.2 msfvenom
msfvenom is a framework combined with msfpayload and msfencode. This
avoid detection.
And HTML page is created to phish the target to download the payload
without suspicion.
9|Page
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
“www.instalite.com”. This page will be the download site for the target.
target’s device.
uploaded and executed as “user 0”. The shell script consists of the command
which forces the device to run the malicious software every 30 second. And even
if the user exits the software, this script will continuously run the application
10 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
5. Demonstration
This section demonstrates the attack scenario using different tools and techniques through
pictures and a brief paragraph about the picture. This section only has payload creation and
breaching of the target device. The detailed demonstration of the attack is provided in
Appendix-II.
The above figure 3 shows the creation of the payload. With the help of msfvenom, an
named as InstagramLite.apk.
11 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
Figure 4 shows the access was granted to the target’s android device in which
6. Conclusion
The above report has explained the vulnerability and threats present in mobile devices,
mostly in android OS. By analyzing the report, it can be said that many of the attacks are
caused due to human errors rather than the vulnerability in the device itself. In which, the
use of third-party app store and unlicensed application has higher chances on cyber-threats.
The following section explains the legal implication on the demonstrated attack and some
12 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
confidential data and violates Section 45 of Electronic Transaction Act 2063 BS.
The attacker not only gains unauthorized access but also steals information and spies
The attacks also demonstrate the alteration of an authentic apk application which is
alteration in source code and violates Section 44 of Electronic Transaction Act 2063
BS.
This attack scenario also shows the alteration and disruption of the target’s device in
which a script is injected to alter the running process of the device. This action violates
shown in Appendix-III.
6.2 Recommendation
The following section provides some recommendation to stay protected from malware
13 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
7. References
Bushnell, M., 2019. 10 Ways to Secure Your Smartphone Against Hackers. [Online]
hackers.html
Check Point Software Technologies Ltd, 2016. More Than 1 Million Google Accounts
breached-gooligan/
center/security/mobile-device-security.html#~introduction
leading-app-stores/
Juniper Networks, 2012. 2011 Mobile Threat Reports, Sunnyvale, USA: Juniper
Networks Inc.
14 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
asia/159244/
due-malware-android-apps.php
a-network/
against-modern-android-based-smartphones/
15 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
8. Appendices
8.1 Appendix – I (Threat Description)
The following appendix section provides the description about the biggest mobile
threats in current world. These threats are most active during this modern age in which
each and every person have their smartphone close to them and every bit of financial,
personal and business-related information are stored. As this information are valuable
through these following attacks to steal information from the mobile devices.
1. Man-in-the-Middle attacks:
can exploit the vulnerability and steal the information before it redirects the data
the traffic between your phone and the server which eventually let them to spy on
internet browsing activity, record keystrokes and intercept messages and phone
calls.
Third party application are those apps which are developed to work in android and
iOS operating system but are not created by actual vendors instead by a third-party
developer. These kinds of app may not go through same security check as the
16 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
3. SMS Attacks:
This is one of the most popular android phishing attacks. This type of attack installs
malicious application through received SMS. When the attackers click the link
This attack took advantages of Open Mobile Alliance Client Provisioning (OMA
network-specific setting, due to its less security, it was not possible to identify
either the received setting was originated from the network operator or a malicious
The above elaborated threats are the part of problem domain in current scenario. A
17 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
The above figure 5, shows the scan of live host in the network “192.168.1.0/24”.
In which the target is also active i.e. Huawei Technologies (Android Device).
18 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
The above figure shows creation of a payload which is embedded in the authentic
Instagram lite apk application with the help of msfvenom. The payload creates
a reverse TCP connection to the host and port that is suggested in the payload.
19 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
The above figure 8 is the phishing page to trick the target to download the
payload.
20 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
Figure 9 shows that the payload is downloaded without any detection and in
figure 10, it is shown the installation of the payload and finally figure 11 shows
21 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
In figure 12, a listener is being set up so that when the target executes the payload
the attacker can gain access to the android device. As per the payload created,
In figure 13, it is shown that the options for the payload is configured in which
“4444”.
22 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
Figure 14 shows the execution of the payload in the target’s android device.
The above figure 15 shows that the access is granted when the payload is
executed in the android device. To confirm the access, command “UUID” is used
23 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
The above figure 16 shows the extraction of SMS and Call log information
The figure 17 shows that the extracted information about the call logs are
accurate.
24 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
In figure 18, it is shown that the SMS information extracted from the target is
accurate.
The above figure 19 shows the transmission of SMS from the target’s device
to another device. And it also shows that another device has received the text
message.
25 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
detected.
The above figure 21 shows the tracing of target’s device, it is also shown that
the extraction has provided with geo location tag for google map.
26 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
The above figure 22 shows the creation of a shell script. The reason why shell
script was created is because the android device is based on Linux OS. In the
shell script, an infinite loop is created in which the android device “user 0”
continuously.
27 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
The above figure 23 shows the upload of the shell script to the target’s device.
And later it is shown that, the upload was successful. Then in figure 24, the
shell script is executed then the yellow outline highlights that the
28 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
The above figure 25 shows the execution of continuous access without the
target interaction to the payload which decisively shows that the access is
29 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
8.3.1 Section 44
The section 44 of the Electronic Transaction Act of 2063 BS are as follows:
code is required to be kept as it is position for the time being the prevailing law,
if any person, knowingly or with mala fide intention, pirates, destroys, alters
liable to the punishment with imprisonment not exceeding three years or with a
Explanation: For the purpose of this section "computer source code" means the
8.3.2 Section 45
The section 45 of the Electronic Transaction Act of 2063 BS are as follows:
to have access in any program, information or data of any computer, uses such a
such a computer or even in the case of authorization, performs any act with an
such authorization, such a person shall be liable to the punishment with the fine
exceeding three years or with both depending on the seriousness of the offence.
30 | P a g e
Sushan Pujari || 17031066
CC6051NI Ethical Hacking
8.3.3 Section 46
The section 46 of the Electronic Transaction Act of 2063 BS are as follows:
and with a mala fide intention to cause wrongful loss or damage to any institution
affects it injuriously or causes any person to carry out such an act, such a person
shall be liable to the punishment with the fine not exceeding two thousand
Rupees and with imprisonment not exceeding three years or with both.
31 | P a g e
Sushan Pujari || 17031066