Talk: HaxDroid : Empowering Android Handset
Abstract
As already proven by the recent trends the next wave will be the mobile computing wave and so will be the shift of platform for penetration testing. Although android is targeted as next generation computing platform it still lacks the capability to perform VA / PT / ethical hacking on it. If we look at the android market we find it lacking in lots of terms, not much of a tool set available and not much of documentation availability online too. This paper will discuss various options that are available for converting an innocent android handset to a penetration testing platform. This paper will evaluate the current scenario and also present with various options that are available for people. Not just about existing tool set, we will also be exploring ways and means to explore and exploit the android platform to the limits. Along with Resarch paper we will also be publishing a customized android ROM which is a direct attack platform. which will have advance feature set preconfigured and ready to use saving large efforts of security researchers.
AI Generated Summary
This talk at NULLCon 2012 by Anant Shrivastava presents “HaxDroid: Empowering Android Handset” - discussing how to convert an Android handset into a penetration testing platform.
Note: The transcript for this video was not available or was corrupted (appeared to contain Hindi/Devanagari script mixed with English), so a detailed summary cannot be generated from the transcript.
Talk Abstract
As already proven by recent trends, the next wave will be the mobile computing wave and so will be the shift of platform for penetration testing. Although Android is targeted as next generation computing platform, it still lacks the capability to perform VA/PT/ethical hacking on it. If we look at the Android market, we find it lacking in lots of terms - not much of a tool set available and not much of documentation availability online too.
This paper discusses various options available for converting an innocent Android handset to a penetration testing platform. The paper evaluates the current scenario and presents various options available for people. Not just about existing tool set, the talk also explores ways and means to explore and exploit the Android platform to the limits.
Along with the research paper, a customized Android ROM was also published which is a direct attack platform with advanced feature set preconfigured and ready to use, saving large efforts of security researchers.
Key Topics (Based on Abstract)
- Mobile computing wave: Next wave for penetration testing
- Android limitations: Lacks capability to perform VA/PT/ethical hacking
- Android market: Lacking in tool set, documentation availability
- Converting Android handset: Options for converting to penetration testing platform
- Current scenario: Evaluation of current state
- Existing tool set: Discussion of available tools
- Exploring Android platform: Ways and means to explore and exploit to limits
- Customized Android ROM: Direct attack platform with advanced features preconfigured
Note: This appears to be an early presentation (2012) that may have laid groundwork for later Android security projects like the Tamer Platform. If you have access to the video or a corrected transcript, please update this summary with the detailed technical content discussed.