Code Monkey home page Code Monkey logo

abraham313 / mad-spy Goto Github PK

View Code? Open in Web Editor NEW

This project forked from cristianturetta/mad-spy

0.0 0.0 0.0 10.46 MB

We developed a malware for educational purposes. In particular, our goal is to provide a PoC of what is known as a Repacking attack, a known technique widely used by malware cybercrooks to trojanize android apps. The answer to solve this particular goal boils down in the simplicity of APK decompiling and smali code injection.

License: MIT License

Java 100.00%

mad-spy's Introduction

MAD SPY

Malware Design

Motivation: As a top secret agent for NSA fighting to save the world, your mission is to gather intelligence on a terrorist network that uses a secret chat program for plotting terrorist attacks. We have already identified one of the group members. Your mission is to secretly record the password when the terrorist is logging in and also take screenshots from the terrorists smartphone to figure out other members of the group.

Description: You have to use your skills from the MAD course and inject malicious code into messaging app that will be implanted onto the terrorist’s smartphone and so you can monitor the target right here from HQ. Create a spyware ( a malware with the goal to spy ) that when infects a target, is able to identify when the specific chat program is started, record the keystrokes to get the messages/password, take screenshots and email the collected information to yourself.

Project Implementation: Assume the target smartphone has operating system of your choice (Android/IOS) installed and your program (spyware) is running with required privileges (if required). Choose a target app: Snapchat, Whatsapp, skype, messenger, hangouts. You have to create a malicious app to demonstrate three key behaviors of a mobile spyware:

  • Piggybacking: Decompile the target app. Add malicious modules and recompile to create a piggybacked malware.

  • Spy modules: Once the malicious app is running, you start recording the keystrokes (on a text file). Also, you take 5 snapshots of the screen, one every 30 seconds.

  • Exfiltration: Now that you have all you need, you send the data as an email to yourself. Alternatively, you may choose any other method to send the data collected to a server you can access.

mad-spy's People

Contributors

cristianturetta avatar andrea-perazzoli avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.