E. Blancaflor, Harold Kobe S. Billo, Bianca Ysabel P. Saunar, John Michael P. Dignadice, Philip T. Domondon
{"title":"Penetration assessment and ways to combat attack on Android devices through StormBreaker - a social engineering tool","authors":"E. Blancaflor, Harold Kobe S. Billo, Bianca Ysabel P. Saunar, John Michael P. Dignadice, Philip T. Domondon","doi":"10.1109/ICICT58900.2023.00043","DOIUrl":null,"url":null,"abstract":"With the continuous advancement of technology, it became necessary to use the internet to communicate and exchange information. Since the internet is a known open platform, malicious people also utilize it with the dangerous intention of exploiting confidential information. With unethical hacking, attackers ensure that the user does not discover their exploitation methods. At a higher level of hacking, the attacker aims not to be detected by security enhancement software or technical staff. Social media is one of the most common means of exposure to attacks such as social engineering, wherein individuals receive unsolicited e-mails, messages, or any form of text that contains a malicious link that can endanger their sensitive data. Most people are unaware of the security risks that may harm their identity and device. With this, the study conducted an online survey to determine whether people are knowledgeable of suspicious activities that may occur with a social engineering attack. The survey revealed that twenty-four (24) respondents are aware of suspicious URL links that can access their personal information when clicked. To further understand the methods of social engineering attacks, the researchers performed a simulation attack using StormBreaker, a Social Engineering Toolkit (SET). Results show that StormBreaker can access device information, accurate location, webcam or front camera, and device microphone. Thus, the researchers recommend implementing a firewall to enhance network security and to be more vigilant in internet usage.","PeriodicalId":425057,"journal":{"name":"2023 6th International Conference on Information and Computer Technologies (ICICT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 6th International Conference on Information and Computer Technologies (ICICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT58900.2023.00043","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the continuous advancement of technology, it became necessary to use the internet to communicate and exchange information. Since the internet is a known open platform, malicious people also utilize it with the dangerous intention of exploiting confidential information. With unethical hacking, attackers ensure that the user does not discover their exploitation methods. At a higher level of hacking, the attacker aims not to be detected by security enhancement software or technical staff. Social media is one of the most common means of exposure to attacks such as social engineering, wherein individuals receive unsolicited e-mails, messages, or any form of text that contains a malicious link that can endanger their sensitive data. Most people are unaware of the security risks that may harm their identity and device. With this, the study conducted an online survey to determine whether people are knowledgeable of suspicious activities that may occur with a social engineering attack. The survey revealed that twenty-four (24) respondents are aware of suspicious URL links that can access their personal information when clicked. To further understand the methods of social engineering attacks, the researchers performed a simulation attack using StormBreaker, a Social Engineering Toolkit (SET). Results show that StormBreaker can access device information, accurate location, webcam or front camera, and device microphone. Thus, the researchers recommend implementing a firewall to enhance network security and to be more vigilant in internet usage.