With the rapid development of mobile internet, mobile intelligent terminal contains a lot of personal information and important data, its security has increasingly become a common concern. In recent years, as the most popular open source mobile operating system in the market, Android became the main target of attacks.In order to prevent malicious attacks, we should as far as possible find and understand the vulnerabilities of network and system before the attackers, and then put forward the strategy in time. For checking the system vulnerabilities, penetration testing is a pretty good strategy. However, Most the general penetration testing schemes are designed for the traditional network equipment and environment. With the traditional network security problems appeared in the field of mobile internet, the penetration testing scheme designed for mobile intelligent terminals is of great significance.To solve the above problems, this paper implements a penetration testing scheme for Android under the mobile internet environment, that mainly includes the following work:1. This paper analyzed and summarized the security mechanism and system architecture of Android. Through the comparative research of penetration testing schemes and technologies in the world, we combined the features of Android, mobile internet environment and mobile intelligent terminals, designing a new penetration testing scheme by large numbers of experiments, which testing platform building under the actual mobile internet environment.2. In the design of experiment, this paper tested the multiple versions of Android system, which has the general applicability for Android-based mobile intelligent terminals. In addition to this, we added the energy consumption index to the penetration testing, and quantified the effect of CPU usage and energy consumption, which makes the effect of penetration testing more intuitive.3. Based on implementing the penetration testing of Android-based mobile intelligent terminals, we summarized and analyzed the experimental procedure and testing data, pointing out the system vulnerabilities of Android, and then putting forward some strategies accordingly.Through the research in penetration testing of android-based mobile intelligent terminals, this paper built multiple internet penetration models under the mobile internet environment, which could provide relevant experimental data for the feature extraction, detection and defense of internet penetration, and building the basics for the research of mobile intelligent terminals. |