Penetration assessment and ways to combat attack on Android devices through StormBreaker - a social engineering tool

E. Blancaflor, Harold Kobe S. Billo, Bianca Ysabel P. Saunar, John Michael P. Dignadice, Philip T. Domondon
{"title":"Penetration assessment and ways to combat attack on Android devices through StormBreaker - a social engineering tool","authors":"E. Blancaflor, Harold Kobe S. Billo, Bianca Ysabel P. Saunar, John Michael P. Dignadice, Philip T. Domondon","doi":"10.1109/ICICT58900.2023.00043","DOIUrl":null,"url":null,"abstract":"With the continuous advancement of technology, it became necessary to use the internet to communicate and exchange information. Since the internet is a known open platform, malicious people also utilize it with the dangerous intention of exploiting confidential information. With unethical hacking, attackers ensure that the user does not discover their exploitation methods. At a higher level of hacking, the attacker aims not to be detected by security enhancement software or technical staff. Social media is one of the most common means of exposure to attacks such as social engineering, wherein individuals receive unsolicited e-mails, messages, or any form of text that contains a malicious link that can endanger their sensitive data. Most people are unaware of the security risks that may harm their identity and device. With this, the study conducted an online survey to determine whether people are knowledgeable of suspicious activities that may occur with a social engineering attack. The survey revealed that twenty-four (24) respondents are aware of suspicious URL links that can access their personal information when clicked. To further understand the methods of social engineering attacks, the researchers performed a simulation attack using StormBreaker, a Social Engineering Toolkit (SET). Results show that StormBreaker can access device information, accurate location, webcam or front camera, and device microphone. Thus, the researchers recommend implementing a firewall to enhance network security and to be more vigilant in internet usage.","PeriodicalId":425057,"journal":{"name":"2023 6th International Conference on Information and Computer Technologies (ICICT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 6th International Conference on Information and Computer Technologies (ICICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT58900.2023.00043","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

With the continuous advancement of technology, it became necessary to use the internet to communicate and exchange information. Since the internet is a known open platform, malicious people also utilize it with the dangerous intention of exploiting confidential information. With unethical hacking, attackers ensure that the user does not discover their exploitation methods. At a higher level of hacking, the attacker aims not to be detected by security enhancement software or technical staff. Social media is one of the most common means of exposure to attacks such as social engineering, wherein individuals receive unsolicited e-mails, messages, or any form of text that contains a malicious link that can endanger their sensitive data. Most people are unaware of the security risks that may harm their identity and device. With this, the study conducted an online survey to determine whether people are knowledgeable of suspicious activities that may occur with a social engineering attack. The survey revealed that twenty-four (24) respondents are aware of suspicious URL links that can access their personal information when clicked. To further understand the methods of social engineering attacks, the researchers performed a simulation attack using StormBreaker, a Social Engineering Toolkit (SET). Results show that StormBreaker can access device information, accurate location, webcam or front camera, and device microphone. Thus, the researchers recommend implementing a firewall to enhance network security and to be more vigilant in internet usage.
通过社会工程工具StormBreaker对Android设备进行渗透评估和打击攻击的方法
随着科技的不断进步,利用互联网来沟通和交换信息变得很有必要。由于互联网是一个已知的开放平台,恶意的人也利用它来利用机密信息的危险意图。使用不道德的黑客攻击,攻击者确保用户不会发现他们的利用方法。在更高级别的黑客攻击中,攻击者的目标是不被安全增强软件或技术人员发现。社交媒体是暴露于诸如社会工程等攻击的最常见手段之一,其中个人接收未经请求的电子邮件、消息或任何形式的文本,其中包含可能危及其敏感数据的恶意链接。大多数人都没有意识到可能会损害他们的身份和设备的安全风险。为此,该研究进行了一项在线调查,以确定人们是否了解社会工程攻击可能发生的可疑活动。调查显示,24(24)名受访者意识到可疑的URL链接,点击后可以访问他们的个人信息。为了进一步了解社会工程攻击的方法,研究人员使用社会工程工具包(SET) StormBreaker进行了模拟攻击。结果表明,StormBreaker可以访问设备信息、准确位置、网络摄像头或前置摄像头以及设备麦克风。因此,研究人员建议实施防火墙来提高网络安全性,并在使用互联网时更加警惕。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信