Windows & Android Exploitation
Ms. Deepika Burte1, Mst. Pratik Gupta2, Ms. Tanvi Humane3, Mst. Harshal Ismulwar4, Mst. Krishna Kounder5
1Ms. Dipika Burte Cyber Security Department Shah & Anchor Kutchhi Engineering College deepika.burte@sakec.ac.in
2Mst. Pratik Gupta Cyber Security Department Shah & Anchor Kutchhi Engineering College pratik.gupta16458@sakec.ac.in
3Ms. Tanvi Cyber Security Department Shah & Anchor Kutchhi Engineering College tanvi.humane16554@sakec.ac.in
4Mst. Harshal Ismulwar Cyber Security Department Shah & Anchor Kutchhi Engineering College Harshal.ismulwar16157@sakec.ac.in
5Mst. Krishna Kounder Cyber Security Department Shah & Anchor Kutchhi Engineering College krishna.kounder16745@sakec.ac.in
Abstract - Exploitation is an under-rated methodology of penetrating into a system shell by performing proposed steps which cast an assault on target. The Ideology behind casting this technology is basically targeting the attacker by binding exploit into the data transmitted. Professional Exploit service is way far expensive make it difficult to fit into primary organisations budget. Initiating this task opens a stream for even script kiddies to execute and do the job done which saves time for experts. The drawback pursued in this Problem statement is to bypass the firewall to achieve the shell access of the system & to bind the Exploit in such the way that the data transmitted should appear legitimate is one of the biggest social engineering drawbacks has been accomplished which led this technique to be adapted in every circumstances. The testing of exploit was performed in a compact environment. The platform used to complete this project was “VirtualBox and VMware”. This platform delivers multiple Operating system in a same machine helps to reduce the economy and make task easier. The Result clearly make it visible that the proposed exploit can penetrate shells of windows 7, windows 10, and up to android 9 operating systems.
Key Words: Exploitation, Metasploit Framework, Payloads, AndroRat, Trojan, Attacker, victim, Target, Vulnerability, Ransomware.