Mobile networks and devices are currently in rapid proliferation and
the number of internet-connected users using mobile could surpass the
number of human populations that proves these devices are our daily
life. However, due to this increase in usage of these devices, there is
increasingly targeting attack on them by cyber criminals especially
these devices are relatively small which is vulnerable to physical at tack. As a result, smartphones are full of evidence and found every where in a crime scene and help a lot of digital forensics investigators
to collect and analyze electronic evidence. General countermeasures
to smartphone malware are currently limited to signature-based like
how the antivirus functions to detect known malicious patterns or
anomaly-based like checking behavior activity of the malware. So
this thesis will discuss some detection and prevention techniques. All
these techniques have been limited leaving several problems unsolved.
In this thesis, we will provide a detailed description of the main mo bile malware threats, challenges, and attacks, along with their most
suitable cryptographic/non-cryptographic solutions with their main
limitations. Moreover, a reverse shell TCP payload is applied by us ing two methods (Metasploit and MsfVenom), which is hidden in a
JPEG image as part of Stegomalware to hide the main malware pay load, before creating a basic fake email and website and sending it
as part of the phishing attack. Results will be presented accordingly
along with the advantages and limitations of the presented solution
as part of ethical hacking and raising awareness processes.