Answer the question
In order to leave comments, you need to log in
How to implement a protective mechanism against penetration on an Android device?
The topic of my graduation project is "Development of a defense mechanism on Android". With the help of metasploit, he discovered several vulnerabilities on his phone, including a hole in the webview with which you can remotely connect to the phone and steal the contact list or clear the flash drive. The question is, is it possible to write a program that will detect remote connections to the phone?
Answer the question
In order to leave comments, you need to log in
In this regard, the phone is a regular Linux. For example, netstat works fine for me. No, I don't have superuser rights.
The question is, is it possible to write a program that will detect remote connections to the phone?
You can both identify and prohibit, this is linux, albeit castrated.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question