Vous êtes sur la page 1sur 9

Android Device Hacking Tricks and

Countermeasures
Khulood Al Zaabi
College of Technological Innovation
Zayed University
Abu Dhabi, UAE
k.alzaabi12@hotmail.com

Abstract -- Cybercrimes have increased against Android countermeasures. In other words, the research paper
devices due to the increased usage of Instant Messaging, focuses on how criminals utilize the Android’s built-
Global Positioning Systems (GPS) and Webcam in vulnerabilities, and showcases how they overtake
Applications which are built into the Android device, the victim’s phone by using diverse hacking
resulting in invasion of the victim’s privacy. The strategies in order to violate their victim’s personal
existing studies demonstrate how to utilize the information. The remainder of this paper is organized
vulnerabilities of the Android device; however, none
as follows: Section II presents the “Background and
have proposed a comprehensive study highlighting the
hacking tricks and their countermeasures. This study Related Work” where I review the previous literature
demonstrates how to discover and fully control the regarding hacking tricks for Android devices . In
Android device using existing tools. Furthermore, it section III, I talk about the “Problem and
proposes a novel GPS Tracking Application. The Motivation”. Section IV illustrates the “Proposed
purpose of this research is twofold: 1. To demonstrate Approach” and the tools and techniques used. This is
how to disclose the victim’s sensitive information after then followed by an overview of my “Experimental
performing diverse hacking tricks; and 2. To implement
Results” in section V, and the results are discussed in
countermeasures for each Android hacking trick. The
author believe that such a scenario is needed for the section titled “Experimental Discussion”. In
implementing awareness among Android device users. section VII, I conclude my research and propose
Also, it shows Android and Instant Messaging “Future Work”.
Application developers to mitigate existing
vulnerabilities, thereby enhancing security levels. II. BACKGROUND AND RELATED
WORK
Keywords----Android Hacking; GPS Hacking; WhatsApp The domain of Android hacking is an ever-
Hacking; Android Hacking Tricks; Android Hacking evolving area at both the individual and business
Tools; Countermeasures
level due to the unique characteristics, features, and
I. INTRODUCTION flexibilty of this device. In the following sections, the
In the Post-PC era, the use of small, portable research paper will introduce: 1. The Android device
tablets and Smartphones has skyrocketed. They have platform; 2. An overview of the WhatsApp Instant
Messaging Application, and 3. The Global
become the preferred choice for communication,
Positioning System.
performing online banking transactions, taking and
uploading photos and videos, sending messages via A. Android Device Platform
Instant Messaging Applications (i.e. WhatsApp), The Open Handset Alliance (OHA) developed an
pinpointing locations using the Global Positioning open-market Operating System which strives to
System (GPS), and more. The number of Smartphone “accelerate innovations in mobiles and offers
users has reached around 7 billion worldwide. consumers a richer, less expensive, and better mobile
Currently, the Android Operating System has gained experience” [7]. Gartner Inc. stated that the Android
significant popularity over the Apple device since device embraced 25.5% of the world’s Smartphone
being released into the mobile industry in 2008 [1, 2, sales. According to the IDC Q2 2014 report [8], the
3]. The Smartphone is popular due to significant Android device occupied 85% of the market as seen
improvements in its functionality, and because it has in Fig. 1. However, sophisticated criminal offenders
the capacity to store a considerable amount of the have become familiar with the Android device’s
user’s sensitive data [2, 4]. However, the Smartphone built-in vulnerabilities and loopholes [1, 9].
has also become more susceptible to cybercrimes that Cybercriminals have made millions of dollars by
violate the victim’s confidentiality, integrity, and deceiving Android users by requesting them to
availability [1, 5, 6]. As stated by the Norton Report download malicious third-party Applications [5]. The
in 2013 [5], 38 percent of Smartphone users are being unverified Applications subsequently grant the
targeted by criminal activities. The scope of this attacker full access to the victim’s sensitive data [5,
paper is to concentrate on the Android hacking tricks 8].
and
(NLP). The GPS is more accurate than the NLP;
however, it is only capable of being operated
outdoors. Moreover, the GPS takes a long time to
forward the requested location. On the other hand,
the NLP consumes less battery power than the GPS
and can be operated indoors and outdoors. However,
identifying the user's location is complicated because
the longitude and latitude becomes different every
time the user moves to a new place.
This section presents a comprehensive review of
Fig. 1. Distribution of mobile operating system in Q2 2014,
according to IDC. Source (media.kaspersky, 2014) the plethora of related research studies that cover
Android device hacking techniques. More
B. Overview of WhatsApp Instant Messaging specifically, it focuses on the hacking of Android
Application Applications, Android Messaging Application such
In September 2015, the popularity of the as WhatsApp, Global Positioning Systems on
WhatsApp messaging application reached 900 Android devices, describing the various types of
million users worldwide as shown in Fig. 2 [10, 11, attacks and the countermeasures. Whether or not the
12, 13]. WhatsApp is a free proprietary cross- Application is running, Wu and Li [18] succeeded in
platform messaging application which is installed on hacking the Android Application by proposing two
a client's Smartphone and is not operable without the methods: static and dynamic methods. In the static
Internet. The user can then subscribe to the method, they modified the Application’s dex and
WhatsApp service to send text messages, share APK files, while in the dynamic method, they
images, videos, locations and more with other modified the execute byte code. Moreover, they
WhatsApp users [10, 13, 14, 15]. In late January concluded their research by discussing how to detect
2015, Koum [10] announced on his Facebook page and protect the Android Application against these
that: types of attacks [18].
“Our web client is simply an extension of your Abura’ed et al. [19] discussed three exploitable
phone: the web browser mirrors conversations and vulnerabilities: 1. Overriding the default behaviors of
messages from your mobile device—this means all of buttons; 2. Access permissions, and 3. The lack of
your messages still live on your phone” identity indicators used to perform phishing attacks
using a Trojan. They succeeded in imposing a
Koum's announcement was about the release the significant threat without the victim’s knowledge,
WhatsApp PC desktop version called “WhatsApp and without degrading the victim’s machine
Web” [10, 12, 13]. This version supports all desktop performance. In addition, they recommended
browsers except for the Microsoft Internet Explorer enhancing the Android’s security against these types
and was activated to work with Google Android, of attacks by monitoring the machine’s running
Windows Phones, Nokia, iPhones, and BlackBerry process, implementing the SSL certificate for each
devices [10, 12, 14]. Due to the increase in the trusted Application, and keeping the identity
numbers of WhatsApp Web users, now reaching 200 indicator such as the watermark [19]. Erich and Cliff
million, cyber-attacks are also on the rise, thus [20] conducted a novel denial-of-convenience attack
compromising the personal data stored on the these against Android and iPhone devices for non-technical
devices [11, 12]. users. The researchers exploited the Smartphone’s
connectivity management protocol by configuring a
fake Wi-Fi access point, and forcing their victims to
connect via the non-valid access point. This was done
with the purpose of disabling the Internet connection
availability of their victims. At the end of their
research, they proposed a novel Internet access
validation protocol as a defense against this type of
attack. The proposed solution used cellular networks
in order to send a secret key phrase to the Internet’s
validation server [20].
Furthermore, Yubo et al. [21] presented their
Fig. 2. Number of monthly active WhatsApp users worldwide (in research on how to deploy a malware against a
millions). Source (statista, 2015)
Smartphone device such as the Android system. This
C. Global Positioning System (GPS) was accomplished by manipulating the Short
The Global Positioning System was developed by Message System (SMS) protocol and using the Short
the U.S Department of Defense (DoD) in 1995, using Message Type (RS MT) as an attack vector. Next,
24 satellites. This system is capable of operating with they attempted to forward this message to the
civil, commercial, and military users around the victim’s device by using a Software Defined Radio
globe [16]. The Android GPS is part of the Google (SDR). The authors achieved their goal after proving
Play Services, which tracks and pinpoints the exact that the device’s antivirus software was not able to
location of the users [17]. GPS users can utilize both detect the injected attack [21]. Additionally, Nguyen
the built-in GPS and Network Location Provider et al. [22] achieved their goal in stealthily discovering
the target’s location without the victim’s consent, by criminals who spy on users and violate their privacy
developing an unauthorized Location Inference via the Internet [1]. Kaspersky Lab’s security [8]
(UnLocIn) approach. This approach was possible illustrates various types of attack statistics against
with the insensitive Wi-Fi permission, as it bypassed Android users in May 2012 (Fig. 3). Their study
the malware detection technique. The researchers stated that the number of Android attacks and the
examined 51 free Apps on Google Play, and targeted users grew dramatically during the period
succeeded in inferring the target’s location with a 50- between August 2013 and July 2014 [8].
meter accuracy range. This paper also discussed how
to counter the proposed UnLocIn attack [22]. While
[23] described the most common social engineering
attack techniques on knowledgeable workers,
Krombholz et al. presented comprehensive
terminology that assisted them in classifying the
social engineering attacks in terms of four
parameters. These parameters include the attack
channel, the attack operator, various kinds of social
Fig. 3. Detections by Kaspersky Lab’s security of cyber-attacks on
engineering and realistic attack scenarios. Moreover, Android. Source (media.kaspersky, 2014)
this research included the most advanced attack
vectors within the common communication channels The recently released WhatsApp Desktop version
and computer-supported collaboration, such as not only attracts users, but also attracts
Mobile Messaging Applications (i.e. WhatsApp). In cybercriminals. It allows them to launch a series of
addition, the researchers supported their research by attacks such as spreading malicious messages for the
describing countermeasures against this type of purpose of infecting the user's phone device and
attack [23]. In this paper, Krombholz et. al. invading their privacy for monetary benefits [25].
demonstrated the Cross-site scripting attack This is one of the reasons why the authors employed
(XSS)techniques used against the Android's hacking techniques against WhatsApp and the
WebView, whereas, Bhavani [24] utilized the Web Android device’s GPS. According to Ralf-Philipp
Application vulnerabilities to exploit the victim’s Weimann, a researcher at the University of
WebView, by launching a malicious code through the Luxembourg [26], the GPS is a critical Android
HttpClient APIs. The researcher concluded that this device vulnerability. The issue begins when the
type of attack can result in disclosing the victim’s Android device asks the victim to pinpoint their
sensitive information (i.e. phone contacts), session approximate location on the cellular network. These
hijacking, and stealing the cashed cookies in order to messages are then sent to an unsecured Internet link,
impersonate the victim [24]. which encourages the attacker to trick the Android
This paper complements the existing research by device into exchanging the location message with
conducting various types of hacking tricks against them, instead of the cellular network. As a result, the
Android devices. However, the previous work did not attacker is able to track the victim’s location, and
demonstrate a comprehensive hacking phase such as also, to send a malicious code directly onto the
the one conducted in this research. The author of this victim’s device processor. This is done with the
paper performed social engineering tricks to discover purpose of remotely controlling the victim’s
the victim’s current geolocation (GPS hacking). Smartphone [26]. The goal of the present research
Moreover, the researcher intended to gain full control was to identify these vulnerabilities, exploit them,
of the victim’s Android device, such as overtaking and implement countermeasures.
the Android’s Webcam, decrypting the WhatsApp
Instant Messaging, and more. Furthermore, the author IV. PROPOSED APPROACH
was able to discover all of the active devices which To conduct the experimental scenarios, the author
were connected to the same attacker’s network using configured a Laptop with the required mobile
the zANIT. Lastly, the researcher presented hacking tools, as well as two Samsung Galaxy S3
countermeasures for each trick in order for the devices. The "Rooted" Android device acted as an
victims to become savvy in safeguarding themselves attacker to exploit the victim’s device, while the other
and also, protecting their private information from one was used as the victim's device featuring various
being exposed to attackers. types of vulnerabilities for exploitation purposes. The
devices were used for the purpose of performing
III. PROBLEM AND MOTIVATION diverse types of Android hacking tricks by using
As reported by the Google Investor website [9], different tools and hacking techniques. By using the
over 350,000 devices are being activated daily as of Android Studio, NetBeans IDE, and PHP
February 2011. This is because of the Android’s respectively, the author proposed various types of
Smartphone features which enable communication Android hacking tricks against the victim’s device.
between individuals and businesses with a high level GPS Tracking was the first trick used to identify the
of information management. However, the developer current victim’s geolocation. Moreover, all of the
of the Android device offers it in the open-market discovered live devices were connected to the same
model with limited controls. As a result, the Android network as the attacker using the zANTI Application,
Operating System and its Applications have become as well as the victim’s built-in Webcam, decrypting
susceptible to critical security threats by sophisticated WhatsApp and the Kali Linux NetHuntertool (i.e.
Metasploitable Framework). The author’s intention in
this research was to alert WhatsApp users, as the App
plays a significant role in tracking their geolocation
and disclosing their privacy, especially after the
author’s success in exploring WhatsApp
vulnerabilities when overtaking the Android device.
The main thrust of this research was threefold: 1. To
discover the victim’s active device and its associated
features using the zANTI discovery tool; 2. To track
the victim’s geolocation, device ID, and Timestamp
Fig. 5. zANTI Software Interface
using the GPS Tracking Application; and 3. To take
control of the victim’s Android device using Kali B. GPS Tracking
Linux and its associated Applications (i.e. In this section, the attacker intended to track her
Metasploit). In the following sections, the paper victim’s current geolocation with their permission, by
presents the requirements and the installation designing two different Applications. These are the
instructions for all of the hacking tricks conducted. Android App “app-release.apk” (Android Application
A. Network Map Discovery Package File), using the Android Studio, and the
Desktop App “GPS_Tracker.jar", which is designed
The attacker browsed their Android device using using the NetBeans IDE. The Android App has three
Starbucks' Wi-Fi public network for the purpose of classes: the GPS.java, the Launcher.java, and the
hunting their victim. The zANTI penetration testing PostTask.java. The GPS.java is a type of Android
tool assisted them in achieving their goal. Therefore, service and it implements the LocationListener which
in order to install the zANTI, the attacker rooted her is triggered when the GPS location is changed. In
Android device by installing the “KingRoot” addition, the “toString()” method is used to obtain the
software, Kingroot.apk file from Play Store. The location, based on the last updated time. Lastly, the
rooted device was verified by installing the “Root .java represents the launcher activity in the Android
Checker Basic” as illustrated in Fig. 4. java, and has a layout called “activity_launcher.xml”,
which consists of a label and a button. Therefore,
whenever the user clicks on the “Get GPS Position”
button, the launcher activity retrieves the current
geolocation from the GPS.java and displays it on that
label. Furthermore, the third class PostTask.java is
used to get the geolocation from the launcher.java,
and posts it onto the attacker’s Webserver. Fig. 6
Fig. 4. Root Checker Basic Software illustrates the AndroidManifest.xml file.

Then the attacker downloaded the zANTI.APK file


from Zimperium Mobile Security, and installed it on
their Android device, allowing her to discover all of
the connected devices such as Laptops and mobile
devices. Fig. 5 illustrates the zANTIL software
interface, including all of the active devices that were
Fig. 6. AndroidManifest.xml file
connected to the same network as the attacker. In
this scenario, the attacker started probing this
The second App, which is a desktop has one class
Android device with an IP address of “192.168.x.x”
“Launcher.java”, which is linked with two functions:
and connected via “port 0”. All logs and Nmap scan
the clearTable() and the refreshTable(). The
outputs were displayed for the targeted Android
“ClearTable” function is used to connect to the server
devices. The attacker could then perform advanced
and clears the database files which have old logs. The
scans against her target, by specifying the scan types
“RefeshTable” function is used to connect to the
from the “Operative Actions” option, then connecting
Webserver to search for and retrieve old records.
to the remote ports to exploit the open ports and
Moreover, this App has a JTable which encompasses
discovering vulnerabilities. This was conducted using
four columns: the Serial Number, the Device’s ID,
diverse types of attacks such as the Man-in-the-
the GPS’ location (latitude and longitude), and the
Middle attack. In addition, it could also check and
Timestamp (in GMT). Normally, for the purpose of
crack weak passwords, as well as verify the target’s
Tracking Applications, the attacker creates two
“ShellShock” and “SSL Poodle” vulnerabilities.
scripts and one text file to be available on her
Moreover, the attacker could perform “Smart
Webserver which are “gps.php”, “clear.php”, and
Scanning” which enabled her to automatically check
“gps.txt” respectively. The gps.php script is used to
for vulnerabilities. In this scenario, the attacker
receive data from the Android App and these records
intended to perform an “Intense Scan”, which is also
are saved onto the “GPS.txt” file, while, the
known as an “Intrusive Scan” against the targeted
“clear.php” script is used to delete all entries from the
device. This type of attack permits the attacker to
gps.txt file located on the attacker’s Webserver. The
detect versions and scripts of the Operating System.
malicious user performed social engineering
techniques to send the “app-release.apk” file onto her process should run until it is completed in order to
victim’s Android device. After downloading the move to the next step, which is clicking on the
received .apk file and accepting the displayed “Start” button to run the container. Now, the VNC
permissions, the victim installed the “My GPS Viewer Applications will be used to connect to the
Finder” on their Android device’s App interface, as container when entering these values such as
illustrated in Fig. 7. Later, and whenever the victim ADDRESS (i.e. localhost), NAME (i.e. Kali), and
used the “GPS_TRACKER APP” to check the GPS PASSWORD. After setting these values, the
details, the App secretly sent details such as the “Connect” button should be pressed to display the
Android device’s ID, the current geolocation Kali Linux interface and therefore, start the Webcam
(latitude and longitude), and Timestamp in GMT snapping without the victim’s knowledge. The
time-zone, and recorded them onto the Webserver of attacker is now able to launch her attack by creating a
the hacker. Therefore, the victim’s sensitive backdoor (.apk), typing the attacker's IP address
information was monitored and displayed onto the (LHOST) and attacker’s port number (LPORT)
attacker’s Desktop App which was linked with the respectively; msfvenom –p
Webserver. android/meterpreter/reverse_tcp;
LHOST=<xxx.xxx.xx.xx>LPORT<xxxx> R >
/root/<filename.apk. Then, the Metasploit console
will be loaded to install a listener by setting up a
reverse payload, and the listener begins by typing the
“Exploit” command as the following: msfconsole
use exploit/multi/handler
set payload android/meterpreter/reverse_tcp
setLHOSTxxx.xxx.xx.xx
setLPORTxxxx
exploit
After that, the attacker performed social
engineering against her victim with the purpose of
convincing them to download the fake.apk file by
enabling the “Unknown sources: Allow the
installation of non-Market Apps” option as shown in
Fig. 7. My GPS Finder App Permission
Fig. 8.
C. Overtake Android Device
In this study, the attacker intended to take control
of the victim’s Android device, in particular the
Android’s Webcam and decrypting the WhatsApp
using the Kali Linux NetHunter which was installed
on the attacker's Android device. The Metasploit
Framework exists on the Kali Linux NetHunter,
which is a computer security project used for both
penetration testing and executing the exploit code
against the targeted machine. So, in order to install
the Kali Linux NetHunter onto the Android device
(i.e. Samsung) in chroot mode, the malicious users
need to install the following three Applications from
the Android’s Play Store:
 Busy Box: which provides the user with Fig. 8. Download .apk File onto the Victim’s Android Device
several UNIX tools in a single executable file;
 Linux Deploy: an open-sourced software used
When the victim opened the fake.apk file and
for easy installation of the Operating System
downloaded it onto their device, the meterpreter
and GNU/Linux on the user’s Android device,
prompt popped-up. The intention was to hack the
and
victim's Webcam, so that the attacker could take
 VNC Client, or VNC Viewer: is a remote control of it by typing “webcam_list” to list all of the
access and control software which is victim’s front and back Webcams. The next step was
compatible with Windows, Mac, UNIX and to take a photo without the victim's knowledge using
Linux machine agents, or a centralized server the “webcam_snap” 1command. Moreover, the
is required. attacker performed various activities when she
The next step was to install these Applications successfully took control of the victim’s Android
onto the attacker’s Android device. As mentioned device. These include discovering the Android’s
earlier, the Busy Box should be installed first to grant system information, disclosing the victim’s contacts
the attacker a Root user. Moreover, the attacker list, dumping the victim’s SMS messages, and
should ensure that she has a good Internet connection
and she needs to keep the installation options as the
default. However, she should modify the distribution 1
By default, the webcam_snap command was used to take a photo
by choosing “Kali Linux”. Then, the installation using the first (Back) camera
sending SMS messages from the attacker's device
onto the one of the victim’s contacts list.
Furthermore, the malicious user intended to disclose
and decrypt the victim’s WhatsApp database by
employing the following files: the
“msgstore.db.crypt8” and the key which is used to
decrypt the encrypted database using commands.
Lastly, the researcher installed the “Windows
WhatsApp Viewer App” for the WhatsApp Database
decryption purposes. The first step was to insert the
“msgstore.db.crypt8” and the key files, generate the
“msgstore.decrypted” file, and view this file as
illustrated in Fig. 9.

Fig. 10. Nmap Scan Output of the zANTI

Fig. 11 illustrates the victim’s current geolocation


at Timestamp Thursday 10 10:30:51 GMT +05:30
2016, with a latitude value of “24.7531393” and a
longitude value of “78.8387845” while using the
“My GPS Finder” App.

Fig. 9. WhatsApp Viewer

V. EXPERIMENTAL RESULT
The author conducted various types of hacking
tricks against the victim’s Android device as was
mentioned in the previous section. The first hacking
trick was performed using scanning from Starbucks’
public network. This was done with the purpose of
discovering all active Android devices connected to Fig. 11. Victim’s Current Geolocation at Timestamp Thursday 10
the same network of the attacker using the zANTI 10:30:51 GMT +05:30 2016
penetration testing toolkit. Fig. 10 illustrates the
Nmap Scan Output of the zANTI. The victim’s Moreover, the attacker was able to monitor her
device (IP address) was detected, which victim’s current geolocation as illustrated in Fig. 12.
corresponded with all of the open/filtered and closed The “GPS Tracker Interface” Desktop App, displayed
ports that were associated with its service for both four different latitude, longitude, device ID and
protocols, UDP and TCP. This output displays the Timestamp values for three different locations and
existence of the vulnerable ports which were utilized Timestamps. Furthermore, the attacker continued her
to launch an attack against the targeted device. malicious activities by taking control of the victim’s
Moreover, the attacker received the following Android device, more specifically, the Android’s
message after OS fingerprinting for the targeted Webcam and by decrypting the victim’s WhatsApp
device: “Too many fingerprints match this host to database.
give specific OS details”. Furthermore, the zANTI
network discovery tool obtained a lot of information:
traceroute results such as the number of hops (1
HOP), Round Trip Time (RTT: 13.18ms), the
targeted IP address (192.168.x.x), the number of
active hosts (1 host up), and all scanned ports were
closed.
For the second round of hacking tricks, the attacker
gained the current geolocation; latitude and
longitude, the device’s ID, and the Timestamp values
by performing GPS Tracking. These values varied in
accordance with the victim’s current geolocation, and
changed from minute-to-minute whenever the victims Fig. 12. GPS Tracker Interface App
attempted to check their GPS using the customized
Application called “My GPS Finder”. The attacker succeeded in taking control of the
Android’s Webcam and taking a photo using the back
camera of their victim’s Android device without their
knowledge. They saved the Webcam shot on this in-the-Middle attack against her target’s device, nor
path: /root/JHOJRDTz.jpeg. Table 1 illustrates the to crack the victim’s Android device as they received
victim’s sensitive information which was found on a message that “cracking 192.168.x.x service
the Android device after taking control of it. <Protocol> [http-get /], finished, no results”. In
addition, the attacker discovered that the target’s
Table 1. Outputs generated after Overtaking Victim’s Android device was not vulnerable to the ShellShock and SSL
Device
Poodle vulnerabilities.
Command Output
sysinfo Computer : localhost Currently, GPS Tracking is considered to be one of
OS : Android 4.4.4 - Linux 3.4.0-2656 the most crucial hacking tricks that threatens
armv7l) Smartphone users around the globe. As discovered in
Meterpreter : java/android this study, it is capable of revealing the victim’s vital
dump_contacts [*] Fetching 6 contacts into list
[*] Contacts list saved to:
information such as the device's ID and geolocation.
contacts_dump_20160315121308.txt It can therefore assist the attacker to visit the victim’s
dump_sms [*] Fetching 36 sms messages geolocation and perform advanced hacking
[*] SMS messages saved to: techniques such as social engineering, which can
sms_dump_20160315121421.txt
result in stealing money from the attacker's victims.
webcam_snap - Webcam shot saved to:
12 /root/YPAxqHMj.jpeg The paper’s author was able to track the current
record_mic 5 Audio saved to: /root/EyYFewpa.wav geolocation of the targeted Android device, and
send_sms -d [+] SMS sent - Transmission successful disclose their device's ID for every Timestamp when
+97150xxxxxx the victims used the phishing GPS App. Besides that,
x -t "Hi
Khulood." the malicious Android App developer achieved her
goals by designing and linking the fake GPS App
Furthermore, the decrypted WhatsApp database onto her Webserver, and therefore, monitored and
was disclosed by the malicious user as shown in Fig. displayed it onto her Desktop Interface as shown in
13. The WhatsApp Viewer App detected sensitive Fig. 12. This technique and the customized GPS App
information about one of the victim’s WhatsApp updates the attacker regarding her victim’s
contact list. These include the phone number starting geolocation, records them onto the log files in
with the country code, last message Timestamp, and chronological order, and utilizes these records for
a WhatsApp chat between the attacker’s victim and future cybercrime activities. Also, social engineering
the victim’s WhatsApp contact list. plays a main role in performing GPS hacking.
Currently, an attacker can switch on/off the victim’s
GPS or even the Internet using the .apk file which
can be forwarded onto their victim via social
engineering tricks. In the case of this research, GPS
Tracking was performed with the victim’s permission
to specify the current geolocation specifications.
Also, the Android Studio tool assists the malicious
user in creating fake .apk files to track her victims.
Therefore, users should be aware of this type of
hacking trick. However, the GPS has advantages,
despite its risks. From the perspective of forensic
Fig. 13. msgstore.decrypted.db (WhatsApp Viewer) examiners, law enforcement agencies and parental
VI. EXPERIMENTAL DISCUSSION supervision, a GPS is beneficial in many ways. It can
assist them to detect crimes, reveal threats to the
The attacker succeeded in discovering all live
parents’ children, or to monitor their children’s
devices with their open TCP or UDP ports associated
movement. It can also be used to protect children
with the services running on the targeted device. The
from pornography-related types of crime, by
scanning process is the second phase after
preventing their children from sharing their location
reconnaissance, which involves discovering all of the
to meet with others, for example.
target’s active IP addresses, open ports, and finding
Taking control of the victim’s Android device
vulnerabilities related to the device’s OS, and more.
played a significant role in this study. Using the
An attacker commented that the zANTI pen-testing
Metasploit which is a pen-test tool used by both pen-
tool was powerful while using it for Android hacking.
tester and attacker simultaneously, the attacker was
However, the “Too many fingerprints match this host
able to fully control the victim’s device without their
to give specific OS details” message appeared while
knowledge. This trick is dangerous, as the attacker is
performing an intense scan (advanced scan) against
able to disclose the victim’s privacy such as dumping
the target’s Android device. This message appeared
the contacts list, WhatsApp list and conversations in
when there were no open ports responding to the
plain-text, Webcam snap and more. Furthermore, this
network traffic. As a result, the zANTI was not able
tool can launch malicious codes which are generated
to perform an OS detection. Moreover, it relies on the
by the same tool (fake.apk file), to then overtake the
type of scan being used. In addition, the attacker
victim’s device, either by being connected on the
came to realize that the scan type used during the
same network (LAN), or a different network (WAN).
experiment was not the best type if his intention was
In this study, the malicious user snapped the victim’s
to footprint the target device’s OS. However, the
photo and saved it onto her website to be utilized
current hacker was neither able to perform the Man-
later for black mail, which is also called extortion  Avoid connecting the Android device to public
mail. This type of cybercrime has become Wi-Fi connections and,
increasingly common nowadays. Table 1 illustrates  Make sure to disable this option: “Install Apps
the researcher’s finding after controlling the Android from unknown sources”
device and revealing crucial information about that
device, such as the Operating System installed on the VII. CONCLUSION
targeted device. By knowing the device’s OS, the Overall, my research identifies the most critical
attacker can footprint the devices’ vulnerabilities by vulnerabilities within the Android device and/or with
performing Search Engine techniques to seek updated its associated third party Applications such as
vulnerabilities and their patches. This is conducted in WhatsApp and GPS, which are currently considered
order to attempt to design a sophisticated exploitation to be crucial cybercrime platforms within cyberwar .
against the vulnerabilities of the security controls, All users are advised to be wary while using their
and therefore, continue her hacking activities. Android device. They should co-operate with both
Moreover, the device's OS assists the attacker in Android device companies and third party
creating fake patches for these OS, and she then Applications (i.e. WhatsApp) in identifying any
upload them onto the Android’s Play Store, which noticeable and critical vulnerabilities. These should
results in a hacking activity. Furthermore, the paper’s then be reported in order to mitigate any loopholes
author succeeded in disclosing 6 of the victim’s before they are exploited by a potential attacker.
contacts lists and 36 of the victim’s SMS messages, Furthermore, the Android device developer must
and then saved them onto her website. In addition, enhance the device's security levels to protect their
the researcher was able to send SMS messages from customers and avoid losing their trust. Also, Android
metasploit onto the victim’s contact list. This hacking users should be wary of GPS Tracking by learning
trick is widely used, not only to track more victims, about social engineering tricks that can prevent
but also to impersonate a victim. She commit her attackers from accessing their GPS Tracking.
crimes using the victim’s device, which is also called Moreover, zANTI may assist the security analyst in
“Daisy Chaining”. This is done to hide her identity, thwarting the malicious users, by identifying and
and therefore counter law enforcement agencies by alerting them to the device's vulnerabilities, and also,
misleading and delaying their investigation process. may simultaneously assist the hacker in exploiting
Furthermore, this trick is currently appearing in the vulnerabilities of the victim’s device. The
cyberwar committed against countries in order to recommended future research is to conduct reverse
deceive their enemies after taking over one of their engineering to regenerate a new .APK file with a
soldier’s phone devices. This trick is beneficial for legitimate interface, so that it can be then uploaded
law enforcement agencies, especially if they would onto the App Store, to better analyze the
like to discover the identity of the real criminal. Not vulnerabilities of prospective victims worldwide.
only that, but WhatsApp is also considered a crucial Furthermore, it would be able to create an .apk file to
cyber-attack platform at the present time to determine track the victim’s location. In other words, to switch
the victim’s location. In this study, the researcher was the GPS on whenever the attacker chooses.
successful in dumping and decrypting the victim’s Moreover, the paper’s author would like to conduct a
WhatsApp database, including the victim’s contact Stagefright attack code against vulnerable Android
list of phone numbers with country codes, the device through text or MMS, for the purpose of trick
messages’ content, and the last message Timestamp. investigating other exploitable vulnerabilities with
The researcher implemented the following Android devices.
countermeasures for each type of Android hacking
tricks for the purpose of mitigating or eliminating the REFERENCES
risks generated from the Android’s hacking tricks, [1] Gupta, A. (2014, March). Learning Pentesting for Android
Devices (1st ed.).
and thereby safeguarding the victims: [2] Packtpub. (2015). Practical Mobile Forensics. Retrieved
 Avoid social engineering, by not loaning or March 06, 2016, from
borrowing other Android phones, as this can https://www.packtpub.com/packtlib/book/ApplicationDevelopme
allow criminals to scan the WhatsApp QR code nt/9781783288311/pref05
[3] Casey, E., 2011, Digital evidence and computer crime:
(WhatsApp Web); Forensic science, computers, and the internet, Academic press
 Avoid opening any suspicious links; [4] Bommisetty, S., Tamma, R., & Mahalik, H. (2014, July).
 Use the relevant GPS radio jamming or phone Practical Mobile Forensics (1st ed.). Birmingham, UK: Packt
Publishing.
frequencies to counter satellite Tracking devices; [5] Ballano, M. (2014, August 11). Mobile Attacks:
 Avoid accepting any received .APK fake files; Cybercriminals' New Cash Cow. Retrieved March 06, 2016, from
 Avoid sharing locations via WhatsApp; http://www.symantec.com/connect/blogs/mobile-attacks-
cybercriminals-new-cash-cow
 Check the third party’s authenticity before [6] Chell, D., Erasmus, T., Colley, S., & Whitehouse, O. (2015).
downloading its Applications; The Mobile Application Hacker's Handbook.
 Protect the Android device from being tricked by [7] Lessard, J., & Kessler, G. (2010, September). Android
SMS Trojans by implementing controls; Forensics: Simplifying Cell Phone Examinations. In Small Scale
Digital Device Forensics Journal, vol. 4, no. 1.
 Pen-test the Android device using zANTI; [8] Kaspersky. (2014, October). Mobile Cyber Threats.
 Be very cautious while browsing an Android Retrieved March 06, 2016, from
rooted device as it will have Superuser http://media.kaspersky.com/pdf/Kaspersky-Lab-KSN-Report-
mobile-cyberthreats-web.pdf
privileges;
[9] Hoog, A. (2011). Android Forensics Investigation, Analysis [19] Abura’ed, N., Otrok, H., Mizouni, R., & Bentahar, J. (2014,
and Mobile Security for Google Android. November). Mobile Phishing Attack for Android Platform. In
[10] Wikipedia. (2015). WhatsApp. Retrieved March 06, 2016, Innovations in Information Technology (INNOVATIONS), 2014
from https://en.wikipedia.org/wiki/WhatsApp 10th International Conference on (pp. 18-23). IEEE.
[11] Buchanan, I. (2015, September 9). 200 million Whatsapp [20] Zou, C., & Dondyk, E. (2013, January). Denial of
users open to attack. Retrieved March 06, 2016, from convenience attack to smartphones using a fake Wi-Fi access
http://geekpower.co.uk/2015/09/200-million-whatsapp-users- point. In Consumer Communications and Networking
open-to-attack/ Conference (CCNC), 2013 on (pp. 164-170). IEEE.
[12] Global Positioning System. (2007, January 11). [21] Yubo, S., Zhiwei, Z., & Yunfeng, X. (2014, November).
Countermeasures against GPS trackers. Retrieved March 06, Using Short Message Service (SMS) to deploy Android exploits.
2016, from In Cyberspace Technology (CCT 2014), International Conference
https://globalpositioningsystem.wordpress.com/2007/06/11/count on (pp. 1-5). IEEE.
ermeasures-against-gps-trackers/ [22] Nguyen, L., Tian, Y., Cho, S., Kwak, W., Parab, S., Kim, Y.,
[13] Statista. (2015). Number of monthly active WhatsApp users Tague, P., & Zhang, J. (2013, June). UnLocIn: Unauthorized
worldwide from April 2013 to September 2015 (in millions). location inference on smartphones without being caught. Privacy
Retrieved March 06, 2016, from and Security in Mobile Systems (PRISMS), 2013 International
http://www.statista.com/statistics/260819/number-of-monthly- Conference on (pp. 1-8). IEEE.
active-whatsapp-users/ [23] Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2013).
[14] TechAdvisor. (2011, September 12). WhatsApp Android app Social Engineering Attacks on the Knowledge Worker. In
review. Retrieved March 06, 2016, from Proceedings of the 6th International Conference on Security of
http://www.pcadvisor.co.uk/review/android-tablet- Information and Networks, 2013 on (pp. 28-35). ACM.
apps/whatsapp-android-app-review-3302802/ [24] Bhavani, A B. (2013, April). Cross-site Scripting Attacks on
[15] The FORGE. (2015). Whatsapp: Overview. Retrieved March Android WebView. International Journal of Computer Science and
06, 2016, from https://theforgecoc.wordpress.com/whatsapp- Network (IJCSN), Vol. 2, Issue 2, April 2013, ISSN: 2277-542
overview/ [25] Assolini, F. (2015, February 2). WhatsApp for Web in the
[16] Wikipedia. (2015). Global Positioning System. sight of cybercriminals. Retrieved March 06, 2016, from
Retrieved March 06, 2016, from https://securelist.com/blog/research/68631/whatsapp-for-web-in-
https://en.wikipedia.org/wiki/Global_Positioning_System the-sight-of-cybercriminals/
[17] Developers. (2015). Location Strategies. Retrieved March [26] Andrici, M. (2012, July 31). A-GPS vulnerability could let
06, 2016, from hackers track your location, take over your phone.
http://developer.android.com/guide/topics/location/strategies.html Retrieved March 06, 2016, from
[18] Wu, X., & Li, X. (2013, October). Hack android application http://www.androidauthority.com/a-gps-vulnerability-could-let-
and defense. In Computer Science and Network Technology hackers-track-your-location-take-over-your-phone-104532/
(ICCSNT), 2013 3rd International Conference on (pp. 676-680).
IEEE.

Vous aimerez peut-être aussi