Professional Documents
Culture Documents
How To Intrude An Android Phone
How To Intrude An Android Phone
How To Intrude An Android Phone
AN ANDROID PHONE
Group Presentation
GROUP MEMBERS
EMMANUEL AMATI
JUDAH BONNEY
OFORI BRIGHT
JULIAN LAMPTEY
NICHOLAS NARH
• BACKGROUND
• BODY TABLE OF
• CONCLUSION CONTENT
• RECOMMENDATION
Background
• A Trojan horse, or simply a Trojan, is a type of malware that
disguises itself as a legitimate file or software in order to gain
access to a computer system. Unlike viruses and worms,
FEATURES OF RATs
■ Invisible icon on install
■ Light weight apk which runs 24*7 in background
■ App starts automatically on boot up
■ Can record audio, video, take picture from both camera
■ Browse call logs and SMS logs
■ Get current location, sim card details ,ip, mac address of the device
Body
• 888RAT:
This type of RAT is designed to target Android devices,
windows and Linux Operating Systems.
This is a software that allow users to build apk files , hence it
has a graphical user interface.
DEMONSTRATION
Conclusion