SlideShare a Scribd company logo
1 of 6
VULNERABILITY
ASSESSMENT
2
Android Vulnerability Assessment:
Android vulnerabilities are most of the vulnerabilities
caused now a days. Applications are most of the
replicants of organizations,industries. The searching of
flaws(loop holes)
Is the main theme of the android vulnerability
assessment.
Tech coach: Chaitanya Emany ,Jonathan
Peters
Team leader: Dattasai
Team members:
V.Ramakrishna
D.Mounika Lakshmi
T.P Nikhil kumar
M.Jagadeesh
3
VULNERABILITY
ASSESSMENT:
Vulnerability assessment means finding the bugs(flaws) in the mobile/pc interface.
During the vulnerability assessment the application is tested in various methods.
 SQL illegal string bypassing
 BRUTE FORCE ATTACK
 DICTIONARY ATTACK
By using these methods we can find/identify the loopholes in the target interface.
how android foot printing takes place4
Bypass the login panels
such as htttp application
sites mostly by sql illegal
strings " , = / '
.
L
I
F
E
C
Y
C
L
E
Search for the
android login
panels with various
login interfaces.
Entering into admin
interface.
Take advantage ,
observe and notice
changes in login
panel.
After using the certain strings
we can get the access of the
applications.
5
6
Thanks!
Any questions?
Find me at @ dattasailucky123@gmail.com

More Related Content

Similar to Vulnerability assessment

Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
Jennifer Campbell
 
Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android Report
Vinoth Kanna
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OS
BRNSSPublicationHubI
 

Similar to Vulnerability assessment (20)

Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
 
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
 
Mobile application development process
Mobile application development processMobile application development process
Mobile application development process
 
Security and privacy in smartphones
Security and privacy in smartphonesSecurity and privacy in smartphones
Security and privacy in smartphones
 
Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android Report
 
Phishing on android
Phishing on androidPhishing on android
Phishing on android
 
Android open-source operating System for mobile devices
Android open-source operating System for mobile devicesAndroid open-source operating System for mobile devices
Android open-source operating System for mobile devices
 
Android security
Android security Android security
Android security
 
Thorsignia - Custom software development services in india
Thorsignia - Custom software development services in indiaThorsignia - Custom software development services in india
Thorsignia - Custom software development services in india
 
COVERT app
COVERT appCOVERT app
COVERT app
 
20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar
 
Cross Site Scripting Attacks and Preventive Measures
Cross Site Scripting Attacks and Preventive MeasuresCross Site Scripting Attacks and Preventive Measures
Cross Site Scripting Attacks and Preventive Measures
 
Android_Nougats_security_issues_and_solutions.pdf
Android_Nougats_security_issues_and_solutions.pdfAndroid_Nougats_security_issues_and_solutions.pdf
Android_Nougats_security_issues_and_solutions.pdf
 
OS-Project-Report-Team-8
OS-Project-Report-Team-8OS-Project-Report-Team-8
OS-Project-Report-Team-8
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OS
 
Exploratory testing and the mobile tester : A presentation by Jon Hagar
Exploratory testing and the mobile tester : A presentation by Jon HagarExploratory testing and the mobile tester : A presentation by Jon Hagar
Exploratory testing and the mobile tester : A presentation by Jon Hagar
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
 
Android malware overview, status and dilemmas
Android malware  overview, status and dilemmasAndroid malware  overview, status and dilemmas
Android malware overview, status and dilemmas
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault Analysis
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 

More from Technical Hub

More from Technical Hub (15)

Traffic sign reading robot
Traffic sign reading robotTraffic sign reading robot
Traffic sign reading robot
 
Suggestion box
Suggestion boxSuggestion box
Suggestion box
 
Smart mirror
Smart mirrorSmart mirror
Smart mirror
 
Result management system
Result management systemResult management system
Result management system
 
Hostel gym
Hostel gymHostel gym
Hostel gym
 
Elastic Load Balancing
Elastic Load Balancing Elastic Load Balancing
Elastic Load Balancing
 
Alexa voice bot
Alexa voice botAlexa voice bot
Alexa voice bot
 
Layer wise network security
Layer wise network securityLayer wise network security
Layer wise network security
 
Resume builder
Resume builderResume builder
Resume builder
 
Result management system
Result management systemResult management system
Result management system
 
Passive footprinting
Passive footprintingPassive footprinting
Passive footprinting
 
Co cubes analysis
Co cubes analysisCo cubes analysis
Co cubes analysis
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Automatic generation of 50 addresses
Automatic generation of 50 addressesAutomatic generation of 50 addresses
Automatic generation of 50 addresses
 
Technical Hub @ Aditya Educational Institutions
Technical Hub @ Aditya Educational InstitutionsTechnical Hub @ Aditya Educational Institutions
Technical Hub @ Aditya Educational Institutions
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Vulnerability assessment

  • 2. 2 Android Vulnerability Assessment: Android vulnerabilities are most of the vulnerabilities caused now a days. Applications are most of the replicants of organizations,industries. The searching of flaws(loop holes) Is the main theme of the android vulnerability assessment. Tech coach: Chaitanya Emany ,Jonathan Peters Team leader: Dattasai Team members: V.Ramakrishna D.Mounika Lakshmi T.P Nikhil kumar M.Jagadeesh
  • 3. 3 VULNERABILITY ASSESSMENT: Vulnerability assessment means finding the bugs(flaws) in the mobile/pc interface. During the vulnerability assessment the application is tested in various methods.  SQL illegal string bypassing  BRUTE FORCE ATTACK  DICTIONARY ATTACK By using these methods we can find/identify the loopholes in the target interface.
  • 4. how android foot printing takes place4 Bypass the login panels such as htttp application sites mostly by sql illegal strings " , = / ' . L I F E C Y C L E Search for the android login panels with various login interfaces. Entering into admin interface. Take advantage , observe and notice changes in login panel.
  • 5. After using the certain strings we can get the access of the applications. 5
  • 6. 6 Thanks! Any questions? Find me at @ dattasailucky123@gmail.com