z-logo
open-access-imgOpen Access
Sneaking into Mobile
Author(s) -
K. LakshmiSupraja
Publication year - 2021
Publication title -
international journal for research in applied science and engineering technology
Language(s) - English
Resource type - Journals
ISSN - 2321-9653
DOI - 10.22214/ijraset.2021.36042
Subject(s) - exploit , computer science , android (operating system) , penetration (warfare) , computer security , mobile device , android application , penetration test , security testing , embedded system , operating system , cloud computing security , engineering , security information and event management , cloud computing , joint (building) , architectural engineering , operations research
As the numbers of android mobiles are increasing day by day and are used to store sensitive information. So, maintaining security is becoming a difficult thing. Here comes the role of penetration testing. The process of performing a penetration test is to verify that mobile devices are vulnerable to security risk or not. We will exploit the mobile devices by preparing and performing the penetration test using Metasploit. It is a framework for developing and executing exploit code against a remote target machine. The main goal is to provide an understanding of mobile device penetration testing using Metasploit Framework and how to utilize it as a security professional.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here