Track Common Adversary Tasks Performed Using AndroRAT

 








To know more about it, you can go through my detailed document by clicking here 












Overview

AndroRAT is a program that permits a third party to steal the sensitive information as well as control your device remotely. Although this tool can allow you connect and control any Android device from a PC, it is still based on an old vulnerability and can serve as a backdoor. 


Feature & Functions

AndroRAT offers following features and functions:
  • It can check the contacts and information.
  • It can easily check the call logs.
  • It will have access to all the messages sent and received.
  • It can view the GPS location.
  • It can perform real-time monitoring of the device's received messages and microphone.
  • It can capture photos from the camera.
  • It can send text messages.
  • The URLs can be opened in the web browser.
  • It can also vibrate the device.

Prevention:

  • Training- As humans tend to make mistakes in an IT industry, a regular social engineering awareness training is recommended, so that, they can become the primary firewall to defend against social engineering attacks.

  • Defense in Depth- An in-depth defense strategy can be applied, that instead of preventing the attack, slows down the progression of the attack just enough, so that the defenders can take action in the meantime. 

  • Intrusion Detection systems- They can be used in order to detect various attacks like buffer overflows, CGI attacks, SMB probes, OS fingerprinting, etc.

  • System Integrity Verifiers (SIV)- Any changes in the system components can be detected while also comparing the snapshots of file systems with the pre-existing baseline snapshots in order to secure against any kind of system intrusion.

  • Multihomed Firewalling- This technique can be used in which firewalls having more than one interfaces to further subdivide the network are required, in order to minimize the amount of damage done by an attacker on a private network.

  • Honeypot- This method is used to attract or trap the attackers trying to gain unauthorized access, in order to learn more about their motives and objectives.

  • Patch Management- The defender must have up-to-date software and firmware patches, so that they can be deployed whenever needed.









To know more about it, you can go through my detailed document by clicking here 











































Comments

Popular posts from this blog

Deployment (Part 3)

Deployment (Part 1)

Project Resourcing (Part 2)