![]() On Android, applications can use standard APIs to gather a list of network connections to and from the device.Īdversaries may target user email to collect sensitive information from a target.įound a potential E-Mail address in binary/memoryĪn adversary could use a malicious or exploited application to surreptitiously record activities using the device microphone and/or camera through use of standard operating system APIs. Has the ability to read the device ID (e.g. On Android, device type information is accessible to apps through the android. ![]() Has the ability to access external storage On Android, command line tools or the Java file APIs can be used to enumerate file system contents. ![]() ![]() Has the ability to execute code after rebootĪdversaries may seek to identify all applications installed on the device.Ī malicious application could capture sensitive data sent via SMS, including authentication credentials.įound a reference that may indicate interception of SMS content An Android application can listen for the BOOT_COMPLETED broadcast, ensuring that the app's functionality will be activated every time the device starts up without having to wait for the device user to manually start the app. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |