Android devices Lab development for Ethical Hacking Course
Aal-sahek, Mustafa (2025)
Aal-sahek, Mustafa
2025
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-2025061923356
https://urn.fi/URN:NBN:fi:amk-2025061923356
Tiivistelmä
This final year project was carried out to outline the development of a hands-on lab environment tailored for an ethical hacking course that will be provided by Metropolia UAS, with a focus on Android devices. The lab was built and the testing was successful using specified tools and software programs, such as VirtualBox and UTM to create virtual machine, Kali Linux as an operating system for the virtual machine, APKTool and JADX for decompiling and recompiling the Android application, Metasploit for performing penetration command, and Virtual Studio Code for building the Android application that will be penetrated.
This lab requires theoretical knowledge and practical skills, and it guides students step by step to explore the vulnerabilities, how to exploit them, and how to carry out exploitation analysis using industry standard tools like Kali Linux, Metasploit, MobSF, and APKTool. By simulating real world attack vectors, the lab helps learners develop practical skills to defend against the growing volume of Android targeted malware. Designed for students with basic Linux and networking knowledge, it is important to emphasis ethical practices within legal frameworks (e.g., GDPR compliance), which is an essential consideration to all ethical hackers.
In conclusion, the laboratory environment was successfully created, and the penetration testing procedures met the anticipated outcomes. A custom malware sample was developed and deployed on a target Android device, allowing for remote access and control via Meterpreter commands. Additionally, a simple Android game was designed to facilitate reverse engineering practice. Using APKTool, the game was decompiled, modified, and recompiled to function as a typical Android application. The reverse engineering process was completed effectively, and all objectives were met, confirming the success of the experimentation.
This lab requires theoretical knowledge and practical skills, and it guides students step by step to explore the vulnerabilities, how to exploit them, and how to carry out exploitation analysis using industry standard tools like Kali Linux, Metasploit, MobSF, and APKTool. By simulating real world attack vectors, the lab helps learners develop practical skills to defend against the growing volume of Android targeted malware. Designed for students with basic Linux and networking knowledge, it is important to emphasis ethical practices within legal frameworks (e.g., GDPR compliance), which is an essential consideration to all ethical hackers.
In conclusion, the laboratory environment was successfully created, and the penetration testing procedures met the anticipated outcomes. A custom malware sample was developed and deployed on a target Android device, allowing for remote access and control via Meterpreter commands. Additionally, a simple Android game was designed to facilitate reverse engineering practice. Using APKTool, the game was decompiled, modified, and recompiled to function as a typical Android application. The reverse engineering process was completed effectively, and all objectives were met, confirming the success of the experimentation.