Bryan Juville C. Ecarma, Justine Paul S. Luyon, Ma. Michelle A. Pantoja, Kent Dominic A. Quiros, Joacquin Carlo R. Sobrepeña, E. Blancaflor
{"title":"Vulnerability Assessment and Attack Simulation on a Rooted Android Device","authors":"Bryan Juville C. Ecarma, Justine Paul S. Luyon, Ma. Michelle A. Pantoja, Kent Dominic A. Quiros, Joacquin Carlo R. Sobrepeña, E. Blancaflor","doi":"10.1109/ICICT55905.2022.00024","DOIUrl":null,"url":null,"abstract":"A rooted android device is a means of unlocking the operating system, which allows any user to install unapproved programs, remove unwanted bloatware, upgrade the operating system, replace the firmware, overclock the processor, modify anything, and more. In this study, the researchers used Android 7 Nougat as an operating system seeking the security of a rooted android device. To test out the overall security of rootkits and advantages they claim to the phone itself, the group conducted penetration of a rooted android phone using the infected application, msfvenom, meterpreter, and metasploit, which resulted in successfully compromising or attacking the android phone. Despite the device being rooted, the Android 7.0 Nougat could not recognize the malicious files and did not protect the device. Though the rooting process was expected to boost the device's security due to superusers and administrative permissions, it could not prevent malicious files into the device.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Information and Computer Technologies (ICICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT55905.2022.00024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A rooted android device is a means of unlocking the operating system, which allows any user to install unapproved programs, remove unwanted bloatware, upgrade the operating system, replace the firmware, overclock the processor, modify anything, and more. In this study, the researchers used Android 7 Nougat as an operating system seeking the security of a rooted android device. To test out the overall security of rootkits and advantages they claim to the phone itself, the group conducted penetration of a rooted android phone using the infected application, msfvenom, meterpreter, and metasploit, which resulted in successfully compromising or attacking the android phone. Despite the device being rooted, the Android 7.0 Nougat could not recognize the malicious files and did not protect the device. Though the rooting process was expected to boost the device's security due to superusers and administrative permissions, it could not prevent malicious files into the device.