Android Device Hacking Tricks and Countermeasures
Android Device Hacking Tricks and Countermeasures
Countermeasures
Khulood Al Zaabi
College of Technological Innovation
Zayed University
Abu Dhabi, UAE
[email protected]
Abstract -- Cybercrimes have increased against Android targeted by criminal activities. The scope of this
devices due to the increased usage of Instant Messaging, paper is to concentrate on the Android hacking tricks
Global Positioning Systems (GPS) and Webcam and countermeasures. In other words, the research
Applications that are built into the Android device, paper focuses on how criminals utilize the Android’s
resulting in invasion of the victim’s privacy. The
existing studies demonstrate how to utilize the
built-in vulnerabilities, and showcases how they
vulnerabilities of the Android device; however, none overtake the victim’s phone by using diverse hacking
have proposed a comprehensive study highlighting the strategies in order to violate their victim’s personal
hacking tricks and their countermeasures. This study information. The remainder of this paper is organized
demonstrates how to discover and fully control the as follows: Section II presents the “Background and
Android device using existing tools. Furthermore, it Related Work” where I review the previous literature
proposes a novel GPS Tracking Application. The regarding hacking tricks for Android devices. In
purpose of this research is twofold: 1. To demonstrate
section III, I talk about the “Problem and
how to disclose the victim’s sensitive information after
performing diverse hacking tricks; and 2. To implement Motivation”. Section IV illustrates the “Proposed
countermeasures for each Android hacking tricks. The Approach” and the tools and techniques used. This is
author believe that such a scenario is needed for then followed by an overview of my “Experimental
implementing awareness among Android device users. Results” in section V, and the results are discussed in
Also, it shows Android and Instant Messaging the section titled “Experimental Discussion”. In
Application developers to mitigate existing section VII, I conclude my research and propose
vulnerabilities, thereby enhancing security levels. “Future Work”.
Keywords----Android Hacking; GPS Hacking; WhatsApp
II. BACKGROUND & RELATED WORK
Hacking; Android Hacking Tricks; Android Hacking
Tools; Countermeasures The domain of Android hacking is an ever-
evolving area at both the individual and business
I. INTRODUCTION level due to the unique characteristics, features, and
In the Post-PC era, the use of small, portable flexibilty of this device. In the following sections, the
tablets and Smartphones has skyrocketed. They have research paper will introduce: 1. The Android device
become the preferred choice for communication, platform; 2. An overview of the WhatsApp Instant
performing online banking transactions, taking and Messaging Application; and 3. The Global
uploading photos and videos, sending messages via Positioning System.
Instant Messaging Applications (i.e. WhatsApp), A. Android Device Platform
pinpointing locations using the Global Positioning
The Open Handset Alliance (OHA) developed an
System (GPS), and more. The number of Smartphone
open-market Operating System which strives to
users has reached around 7 billion worldwide.
“accelerate innovations in mobiles and offers
Currently, the Android Operating System has gained
consumers a richer, less expensive, and better mobile
significant popularity over the Apple device since
experience” [7]. Gartner Inc. stated that the Android
being released into the mobile industry in 2008 [1, 2,
device embraced 25.5% of the world’s Smartphone
3]. The Smartphone is popular due to significant
sales. According to the IDC Q2 2014 report [8], the
improvements in its functionality, and because it has
Android device occupied 85% of the market as seen
the capacity to store a considerable amount of the
in Fig. 1. However, sophisticated criminal offenders
user’s sensitive data [2, 4]. However, the Smartphone
have become familiar with the Android device’s
has also become more susceptible to cybercrimes that
built-in vulnerabilities and loopholes [1, 9].
violate the victim’s confidentiality, integrity, and
Cybercriminals have made millions of dollars by
availability [1, 5, 6]. As stated by the Norton Report
deceiving Android users by requesting them to
in 2013 [5], 38 percent of Smartphone users are being
download malicious third-party Applications [5]. The
IV. PROPOSED APPROACH Then the attacker downloaded the zANTI.APK file
To conduct the experimental scenarios, the author from Zimperium Mobile Security, and installed it on
configured a Laptop with the required mobile their Android device, allowing her to discover all of
hacking tools, as well as two Samsung Galaxy S3 the connected devices such as Laptops and mobile
devices. The "Rooted" Android device acted as an devices. Fig. 5 illustrates the zANTIL software
attacker to exploit the victim’s device, while the other interface, including all of the active devices that were
one was used as the victim's device featuring various connected to the same network as the attacker. In
types of vulnerabilities for exploitation purposes. The this scenario, the attacker started probing this
devices were used for the purpose of performing Android device with an IP address of “192.168.x.x”
diverse types of Android hacking tricks by using and connected via “port 0”. All logs and Nmap scan
different tools and hacking techniques. By using the outputs were displayed for the targeted Android
Android Studio, NetBeans IDE, and PHP devices. The attacker could then perform advanced
respectively, the author proposed various types of scans against her target, by specifying the scan types
Android hacking tricks against the victim’s device. from the “Operative Actions” option, then connecting
GPS Tracking was the first trick used to identify the to the remote ports to exploit the open ports and
current victim’s geolocation. Moreover, all of the discovering vulnerabilities. This was conducted using
discovered live devices were connected to the same diverse types of attacks such as the Man-in-the-
network as the attacker using the zANTI Application, Middle attack. In addition, it could also check and
as well as the victim’s built-in Webcam, decrypting crack weak passwords, as well as verify the target’s
WhatsApp and the Kali Linux NetHuntertool (i.e. “ShellShock” and “SSL Poodle” vulnerabilities.
Metasploitable Framework). The author’s intention in Moreover, the attacker could perform “Smart
this research was to alert WhatsApp users, as the App Scanning” which enabled her to automatically check
plays a significant role in tracking their geolocation for vulnerabilities. In this scenario, the attacker
and disclosing their privacy, especially after the intended to perform an “Intense Scan”, which is also
author’s success in exploring WhatsApp known as an “Intrusive Scan” against the targeted
vulnerabilities when overtaking the Android device. device. This type of attack permits the attacker to
The main thrust of this research was threefold: 1. To detect versions and scripts of the Operating System.
discover the victim’s active device and its associated
features using the zANTI discovery tool; 2. To track
the victim’s geolocation, device ID, and Timestamp
using the GPS Tracking Application; and 3. To take
control of the victim’s Android device using Kali
Linux and its associated Applications (i.e.
Metasploit). In the following sections, the paper
presents the requirements and the installation
instructions for all of the hacking tricks conducted.
A. Network Map Discovery Fig. 5. zANTI Software Interface
The attacker browsed their Android device using
B. GPS Tracking
Starbucks' Wi-Fi public network for the purpose of
hunting their victim. The zANTI penetration testing In this section, the attacker intended to track her
tool assisted them in achieving their goal. Therefore, victim’s current geolocation with their permission, by
in order to install the zANTI, the attacker rooted her designing two different Applications. These are the
Android device by installing the “KingRoot” Android App “app-release.apk” (Android Application
software, Kingroot.apk file from Play Store. The Package File), using the Android Studio, and the
rooted device was verified by installing the “Root Desktop App “GPS_Tracker.jar", which is designed
Checker Basic” as illustrated in Fig. 4. using the NetBeans IDE. The Android App has three
classes: the GPS.java, the Launcher.java, and the
PostTask.java. The GPS.java is a type of Android
service and it implements the LocationListener which
is triggered when the GPS location is changed. In
addition, the “toString()” method is used to obtain the
location, based on the last updated time. Lastly, the
.java represents the launcher activity in the Android
java, and has a layout called “activity_launcher.xml”,
which consists of a label and a button. Therefore,
whenever the user clicks on the “Get GPS Position”
button, the launcher activity retrieves the current
geolocation from the GPS.java and displays it on that
label. Furthermore, the third class PostTask.java is
used to get the geolocation from the launcher.java,
and posts it onto the attacker’s Webserver. Fig. 6
illustrates the AndroidManifest.xml file.
Fig. 7. My GPS Finder App Permission
V. EXPERIMENTAL RESULT
The author conducted various types of hacking
tricks against the victim’s Android device as was
mentioned in the previous section. The first hacking
trick was performed using scanning from Starbucks’
public network. This was done with the purpose of
discovering all active Android devices connected to
the same network of the attacker using the zANTI
penetration testing toolkit. Fig. 10 illustrates the
Nmap Scan Output of the zANTI. The victim’s
device (IP address) was detected, which
corresponded with all of the open/filtered and closed
Fig. 8. Download .apk File onto the Victim’s Android Device ports that were associated with its service for both
protocols, UDP and TCP. This output displays the
When the victim opened the fake.apk file and existence of the vulnerable ports which were utilized
downloaded it onto their device, the meterpreter to launch an attack against the targeted device.
prompt popped-up. The intention was to hack the Moreover, the attacker received the following
victim's Webcam, so that the attacker could take message after OS fingerprinting for the targeted
control of it by typing “webcam_list” to list all of the device: “Too many fingerprints match this host to
victim’s front and back Webcams. The next step was give specific OS details”. Furthermore, the zANTI
to take a photo without the victim's knowledge using network discovery tool obtained a lot of information:
the “webcam_snap” 1command. Moreover, the traceroute results such as the number of hops (1
attacker performed various activities when she HOP), Round Trip Time (RTT: 13.18ms), the
successfully took control of the victim’s Android targeted IP address (192.168.x.x), the number of
device. These include discovering the Android’s active hosts (1 host up), and all scanned ports were
system information, disclosing the victim’s contacts closed.
list, dumping the victim’s SMS messages, and For the second round of hacking tricks, the attacker
sending SMS messages from the attacker's device gained the current geolocation; latitude and
onto the one of the victim’s contacts list. longitude, the device’s ID, and the Timestamp values
by performing GPS Tracking. These values varied in
1
By default, the webcam_snap command was used to take a photo
accordance with the victim’s current geolocation, and
using the first (Back) camera changed from minute-to-minute whenever the victims
attempted to check their GPS using the customized
Application called “My GPS Finder”.