Thursday, March 21, 2019

data reverse engineering in smart phones Essay --

There argon numerous tools for data reverse engineer in smart phones, specifically android phones. Some wasting diseaseful Android tools be Android Network Toolkit(ANTI), DroidBox, AVD Clone, and Smart Pentest Framework (SPF). The tools that are cover can resist in retrieving significant information and help step up in criminal investigations.The Android Network Toolkit is very useful and effecient occupation tool. According to the website Hackers Online Club, This app is capable of mapping your network, scanning for vulnerable devices or constellation issues. It is for use by the amateur security enthusiast home substance ab exploiter to the professional penetration tester, ANTI provides many other useful features. present are some of the features for Android Network Toolkit (ANTI) it provides an easier connection to visual sniffing, and leave ports. Visual sniffing usually refer to retrieving Cookies and URLs. The ANTI exercise too allows the user to perform MiTM attack s, allows the user to exploit Server and Client Sides. MiTM is normally use in cryptography and computer security. MiTM is basically eavesdropping. The industry also comes with intelligence cracker which determines the security levels in a password. ANTI may also replace an image in Denial of Service attacks and demos. All of these features are parrt of the Android Network Toolkit (ANTI). Another helpful finishing is the DroidBox. This purpose of the DroidBox is perfrom driving analysis of other Android applications. The application generates many useful results. These are the results when the analysis has ended it shows the incoming and outgoing network data. It also shows the hashes for the canvas package, the application does file reads and write operations. It provides inform... ...will also be integrated with subsisting tools. Some of those tools are SET , Metasploit, and mcuh more.Conclusionselective information Reverse technology on smartphone can have postivie and ne gative effect. Many of the applications today were created because of entropy Reverse Engineering. a postive effect is that application developer can use Data Reverse Engineering to create a similar or young app from an existing app. A negative effect would be the creation of an application that is used to retrieve certain data from an individual or application attack other devices. An application may also be created to support criminal investigation and other forensic related subjects. There are numerous amount forensic tools application for all type of devices. Overall, an application that is created to attack other devices is not always bad, it just depence on the who is employ the application.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.