Mobile Device Safety: Keeping your phone safe from intrusion
You might have heard that the iPhone is almost completely impossible to hack or that Samsung devices have some of the best firewalls in the
drozer (formerly Mercury) is the leading security testing framework for Android.
drozer allows you to search for security vulnerabilities in apps and
devices by assuming the role of an app and interacting with the Dalvik
VM, other apps’ IPC endpoints and the underlying OS.
drozer provides tools to help you use, share and understand public
Android exploits. It helps you to deploy a drozer Agent to a device
through exploitation or social engineering. Using weasel (MWR’s advanced
exploitation payload) drozer is able to maximise the permissions
available to it by installing a full agent, injecting a limited agent
into a running process, or connecting a reverse shell to act as a Remote
Access Tool (RAT).
drozer is open source software, maintained by MWR InfoSecurity, and can be downloaded from:
drozer helps to reduce the time taken for Android security assessments by automating the tedious and time-consuming.
drozer runs both in Android emulators and on real devices. It does not require USB
debugging or other development features to be enabled; so you can
perform assessments on devices in their production state to get better
results.
drozer can be easily extended with additional modules to find, test
and exploit other weaknesses; this, combined with scripting
possibilities, helps you to automate regression testing for security
issues.
drozer provides point-and-go implementations of many public Android
exploits. You can use these to identify vulnerable devices in your
organisation, and to understand the risk that these pose.
drozer is available as both open source software, and a full-featured professional version.
Industrial Cybersecurity
September 28, 2023
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings
You might have heard that the iPhone is almost completely impossible to hack or that Samsung devices have some of the best firewalls in the
If you are tired of the old smartphone, but it can still open Facebook, Instagram, 22Bet, or other platforms, don’t try to buy a new
This article is the part of Android Hacking tutorial; it covers step by step guide to exploit Android ADB to get the persistent connection back
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings