Adil Khan 10 months ago
AdiKhanOfficial #FYP Ideas

Penetration Testing Tool Based On Android

It's difficult to manufacture an answer in the event that you don't have a clue about the necessities. The principal stage is the Information gathering stage that manages the need of building up another framework by examining issues in existing framework. Colleagues depict the degree and impediments

Project Title

Penetration Testing Tool Based On Android

Project Area of Specialization

Cyber Security

Project Summary

It's difficult to manufacture an answer in the event that you don't have a clue about the necessities. The principal stage is the Information gathering stage that manages the need of building up another framework by examining issues in existing framework. Colleagues depict the degree and impediments of proposed framework. At this period of improvement, objective is clear yet the means required to accomplish the objective might be dubious. It is worried about specialized chance of the framework with acquiring hazard related with it. We studied many research papers & use some existing tools to so we can understand flow. We also learned python.

Design In the plan stage, the prerequisites will be separated further to have the option to comprehend the undertaking's necessities all the more explicitly. It is necessary for the proposed proposal to be attempted for implementation and to ensure that it meets the criteria laid down during the data collection process. At the end of the day the key objective of this stage is to turn the recently identified prerequisites into a model that can be used during the improvement process. 

Development: After the systemic stage has been completed, the process proceeds to the next stage i.e. progress. Designers start writing the source code here while at the same time recalling the newly identified pre-requisites. The infiltration test protocol could be simplified to five stages: Observation - The demonstration of the social case offers valuable evidence on the objective framework. These data will be used for the most likely assault of the target. For example, open source online search software may be used to find knowledge that can be used in a social building attack. Checking (web crawler) - Use advanced tools to facilitate knowledge on the process for the aggressor. For example, Nmap may be used to analyse open ports. 

 Obtaining entrance (parser) - Using the information collected during the observation and filtering processes, the aggressor can use the payload to misuse the system. For e.g., Metasploit may be used to mechanize attacks on known vulnerabilities. 

Scanner – A vulnerability scanner is a program that identifies and stores the relative multitude of systems (computers, workspaces, PCs, virtual machines, holders, firewalls, switches, and printers) connected with an entity. In addition, for any gadget it understands, it tries to differentiate between the operating framework it manages and the commodity it launches, as well as the various characteristics, such as open ports and client accounts. 

Report Generator – Various news organisations are creating different subtilities. These specifics are as follows: • Scan the start time, the stop time and the task goal list • Description of the vulnerabilities found in the errand (tally of high, medium, low, logs and bogus positive). 

Project Objectives

Aims and Objectives: The primary objectives of this postulation are:

? Explore and portray the Android design.

? Explore the security components present in the Android OS.

? Identify and assess security issues in the Network pile of the Android OS with the assistance of infiltration testing.

Some others objectives of the project are shown as following: ? To User Logins to the system using ID and Password.

? To help the user in finding vulnerabilities in android application.

? To developed the four modules such as scanning, crawling, and parsing and report generator.

? To provide a secure environment to the user and generate reports of vulnerabilities.

? To help us in order to secure the android applications
 

Project Implementation Method

Tool includes 4 main modules: 1. Web Crawler 2. Parser 3. Scanner 4. Report Generator

In the NIST arranging stage, test objectives are set, strategies are perceived, and the board undertakings are finished and bring about reports. The revelation stage portrays organize port and administration recognizable proof of the objective framework. Finally, assaults are performed and announced. This stream works in a cycle to survey the security of the objective framework. Our entrance testing approach is acted in various stages. The main stage gives a depiction of the Android OS considering present realities dependent on Linux portion, and so on. Second stage shows found shut and open ports, running or incapacitate administrations and last stage depicts the genuine defencelessness’ that exists in the framework by playing out some outstanding assaults.
 

Benefits of the Project

Beneficiaries : i. Software House ii. Google Playstore iii. App Developers iv. Software Tester

Benefits of this app are as follows:

i. Reduce human error that was in manual testing.

ii. Reduce effort i.e. HR & Cost.

iii. App will be more stable.

Technical Details of Final Deliverable

Components in project: Referenced beneath are the all parts we made in the project utilizing Python. 

1 Crawler: In principle, a crawler is like a librarian. It looks for information on the Web, which it assigns to certain categories, and then indexes and catalogues it so that the crawled information is retrievable and can be evaluated. The operations of these computer programs need to be established before a crawl is initiated. Every order is thus defined in advance. The crawler then executes these instructions automatically. An index is created with the results of the crawler, which can be accessed through output software. The information a crawler will gather from the Web depends on the particular instructions.

2. A parser is a software component that takes input data (frequently text) and builds a data structure – often some kind of parse tree, abstract syntax tree or other hierarchical structure, giving a structural representation of the input while checking for correct syntax.

3. Scanner : Vulnerability scanning and penetration testing are two common forms of cybersecurity assessment that are conducted to help organisations evaluate, measure and Mitigate information security risk. Vulnerability scanning is an automated form of cyber-security assessment that uses off-the-shelf software tools to assess the security of devices connected to a network. It is conducted with the aim of discovering as many security vulnerabilities as possible – principally those already disclosed publicly – in a short period of time.

4. Report Generator: Pen test report will typically include an executive summary highlighting key findings. A more detailed description of the technical details and practical implications of each vulnerability should be outlined later in the report. In a pen test report, you should expect to see an explanation of where these deeper vulnerabilities lie, which assets are affected, how they were discovered and what an attacker could do if the vulnerabilities are left unaddressed
 

Final Deliverable of the Project

Software System

Core Industry

IT

Other Industries

Core Technology

Others

Other Technologies

Sustainable Development Goals

Decent Work and Economic Growth, Sustainable Cities and Communities

Required Resources

Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Ssl certificate Equipment170007000
External API’s Equipment3950028500
Live chat service Equipment165006500
Database for android application Equipment170007000
Total in (Rs) 49000
If you need this project, please contact me on contact@adikhanofficial.com
Design and Devise Fully Electrical Powered Two Wheel Vehicle

The project consist of a semi-automatic Electric Motorbike to be made with the aim of cove...

1675638330.png
Adil Khan
10 months ago
Design and control of excitation system for synchronous Genrator

Energy conversion in synchronous generator is possible only, if there exists an excitation...

1675638330.png
Adil Khan
10 months ago
Smart Parking and Charging system for E.bikes

Our idea of implementation of the project is based on development of smart and secure dock...

1675638330.png
Adil Khan
10 months ago
Development of Double Rotation Vertical Axis Generator With Double Rot...

Basically, wind turbines capture wind power and convert it into electricity.  For co...

1675638330.png
Adil Khan
10 months ago
Controlling a Robot Hand in Simulation and Reality

This useful tool is able to perform a lot of different grasps like lifting, holding and sq...

1675638330.png
Adil Khan
10 months ago