GithubHelp home page GithubHelp logo

android-sec / android-vulnerabilities-overview Goto Github PK

View Code? Open in Web Editor NEW

This project forked from android-leak/android-vulnerabilities-overview

0.0 2.0 0.0 2.14 MB

An small overview of known Android vulnerabilities

License: MIT License

android-vulnerabilities-overview's Introduction

License


Android Vulnerabilities Overview (AVO) is a databse of known security vulnerabilities in Android.

The vulnerabilities database is splitted into seperate .md files to get an better and cleaner overview. The current 2016 list is avaible over here.

The security flaw gives hacker ability to spy on Android smartphone owners, steal login credentials, install malware, and many more, according to the latest research conducted by the researchers at the Pennsylvania State University and FireEye.

Contact

Found something that isn't on the list? - Feel free to submit, maintainers/contributors are always welcome!

Want to communicate secure, feel free - my eMail public key is stored in the 'eMail.txt' file.

Warning

Do not install security updates like CVE-2015-1538.apk from untrusted sources! It's a trap!

Security updates are rolled out by Google Play-services (in background) or as ROM update directly from your provider and never comes as single .APK!

Attacks

Spyware Capabilities

  • Listening in to telephone conversations
  • Accessing the Internet
  • Viewing and copy contacts
  • Installing unwanted apps
  • Asking for location data
  • Taking and copying images
  • Recording conversations using the microphone
  • Sending and reading SMS/MMS
  • Disabling Anti-Virus software
  • Listening in to chats via messaging services (Skype, Viber, WhatsApp, Facebook and Google+)
  • Reading the browser history

Infected apps with Backdoors, Loggers or Ransomware

Generally apps that often bundled with security risks (due popularity and other weaknesses)

Research

Papers

Videos

Online tests

Kernel

'Security' (pentesting) Apps

Forensics analysis software and apps

In most cases Trojans/Malware only sending 'stuff' to there C&C's if you're on wifi (to not getting easier detected by the bandwidth consumptation itself), of course they often drain your battery, so some tools are to detect such cases and identifys them (like Hush) such tools can be used to reveal what exactly going on behind the scenes.

Vulnerability Databases

Known Pre-Installed Backdoors (within firmware)

Backdoor Discussion

‘Stingrays’ Cell Phone Trackers

Stingrays, made by the Harris Corporation, has capabilities to access user's unique IDs and phone numbers, track and record locations, and sometimes even intercept Internet traffic and phone calls, send fake texts and install spyware on phones. The authorities used these tracking tools for years to breach people's privacy and did everything to keep even the existence of these devices out of the public eye. They even avoid telling judges when they used them.

Firewall Leak Tests

android-vulnerabilities-overview's People

Contributors

dicer avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.