fugu Posted December 2, 2014 Share Posted December 2, 2014 Looking to turn it into a honeypot to trap a cybercrook at my work. Any ideas? Needs to keylog/swipelog + .apk capture + general pcap Quote Link to comment Share on other sites More sharing options...
overwraith Posted December 4, 2014 Share Posted December 4, 2014 You can probably get more control by rooting the device, however I haven't tried this, so I don't know what more you get when you do root it. I would probably go about creating a system service via java that I would drop on the android device. http://developer.android.com/guide/components/services.html I would search for functionality such as viewing all files on any SD cards that get plugged into the system: http://www.androidsnippets.com/viewing-all-files-from-sdcard I would also look into transferring files via sockets, but they may call them something different in android. In order to get any of the files you need a server to receive them, so you need to configure your router to port forward to your server on your home network. As with all things, have multiple layers so if one is discovered you still have other layers which are still functional. http://examples.javacodegeeks.com/android/core/socket-core/android-socket-example/ http://stackoverflow.com/questions/8926864/android-socket-file-transfer It would be nice to be able to log the websites the cybercrook visited. This might help. http://stackoverflow.com/questions/16763874/android-get-access-to-browser-history Something like this could get a little bit involved, so good luck. Quote Link to comment Share on other sites More sharing options...
cooper Posted December 4, 2014 Share Posted December 4, 2014 Do you want to know what he's doing with a device he's taken, or do you want to prove he took it without permission? There are things you can install on a phone to prevent theft, where once activated the phone automatically and silently takes a picture from the camera every few minutes and it sends its gps coordinates to a central server so you know where to look. The point is that if it's *his* phone, you rooting it would probably be noticable. If it's *your* phone, simply proving he took it without your permission should suffice. Quote Link to comment Share on other sites More sharing options...
fugu Posted December 4, 2014 Author Share Posted December 4, 2014 (edited) It's probably more along the lines of Him: Oh hey you got a new phone, can I see it for a sec? Me: Oh sure, here you go. (some time later) Me: Why is my phones camera and microphone activated, and someone's placing charges on my credit card? @overwraith: Thanks for the ideas and the links, I'm goning to start looking through them now Edited December 4, 2014 by fugu Quote Link to comment Share on other sites More sharing options...
NotTheBeez Posted February 14, 2015 Share Posted February 14, 2015 The title of this article made me laugh out loud, I don't know why it just sounded funny. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.