Font Size: a A A

Research And Implementation Of Remote Control System For Android Mobile Phone

Posted on:2016-01-02Degree:MasterType:Thesis
Country:ChinaCandidate:M GuoFull Text:PDF
GTID:2308330461989914Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In 2007, with the advent of the first Android phone, Android mobile phone system on its good user experience, lower overhead costs and higher open source has won numerous handset manufacturers, software developers and mobile users widely recognized, Android market share is growing. IDC statistics show that the global Android smartphone has reached 497.1 million units, a market share of 79.3%, in the first place. Android smartphone market share, but also for the high society and national security departments to combat crime, crime prevention happen, Investigating the case and provides a new breakthrough thinking, covert obtain incriminating evidence of a crime suspect through technical means, timely whereabouts arrest, effectively reducing the cost of reducing social and national arrest harm. In this paper, the above basic needs, develop a precise, covert implants suspects smart phone system, so that the listener can remotely collect call records, evidence of a crime to live messaging, mobile phones and other documents, its effective anti valid arrest to reduce and prevent the occurrence of crime.Because the system is designed to combat and prevent crime and criminal suspects for effective monitoring and forensics require access methods and way of life of the system there are some hidden and long-term so that the system design and implementation also with the general remote control system is fundamentally different. The main use of the system C/S mode, using JAVA language development, integrated forms-1.3.0.jar, JMapViewer.jar, platform-3.4.0.jar and other open source modules are divided into the PC end android development and R & D in two parts. Whole system can be divided into three components, a remote implantable components, tools bundling component, information acquisition assembly. Client into targeted android system, the server is installed in the PC platform, the client collects information manipulation. Remote implant component utilizes android system vulnerabilities implant construct web pages sent to the target phone, when the user triggers implantation links page to start implanting android system vulnerabilities remote control module implanted in the target phone. Bundled module utilizes the unique structural properties of apk files to remote-control programs bundled with legitimate apk file and embed implanted page. Information acquisition module using JAVA language development, through the TCP/ IP protocol for communication between the client and the server, use JMapViewer.jar, ftp and other modules and protocols to achieve the goal of access to information and the location of mobile phone positioning.After the system development can take advantage of social engineering to implant a page sent to the target phone to lure the target user to trigger implanted page, which will be bundled with legitimate apk file implanted remote control program with the target phone, because the remote control program is hidden among legitimate application on the user experience implanting remote control program for mobile phone users remote control program is not visible, not controllable only by the server operating users have operating authority. Restart the target phone to trigger remote control program, service receives information after the program starts startup mode can be set to control the implant procedure, in turn, can continue to obtain information on the target phone.
Keywords/Search Tags:remote control, android system exploits, mobile security
PDF Full Text Request
Related items