2022
DOI: 10.14421/ijid.2021.2839
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Remote Access Trojan Attack using Android Debug Bridge

Abstract: The security hole in the android operating system sometimes not realized by users such as malware and exploitation by third parties to remote access. This study conducted to identify the vulnerabilities of android operating system by using Ghost Framework. The vulnerability of the android smartphone are found by using the Android Debug Bridge (ADB) with the exploitation method as well as to analyze the test results and identify remote access Trojan attacks.  The exploitation method with several steps from prep… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…It can be distributed in two different ways: by downloading the Next level of payload installation (malicious apps) [23]. The Anubis Trojan can steal information using overlay attacks from banking apps, ransomware, SMS interception/call forwarding, RATs, and keyloggers [24,25].…”
Section: Anubis Trojanmentioning
confidence: 99%
“…It can be distributed in two different ways: by downloading the Next level of payload installation (malicious apps) [23]. The Anubis Trojan can steal information using overlay attacks from banking apps, ransomware, SMS interception/call forwarding, RATs, and keyloggers [24,25].…”
Section: Anubis Trojanmentioning
confidence: 99%
“…They are frequently employed in a range of cyberattack scenarios, including as information gathering, system assaults, manipulation, surveillance, and taking advantage of security flaws that are already in place. These factors make RAT attack detection and analysis essential to preserving system and data security [8][9][10].…”
Section: Introductionmentioning
confidence: 99%