so.cl

Rascals are always sociable, and the chief sign that a man has any nobility in his character is the little pleasure he takes in others company. Arthur Schopenhauer


Persistent reverse shell from Android app without visible permissions

This blog will introduce you how it is possible to write a persistent reverse shell app on Android without any user requested and visible permissions. Since such application has no permissions, it shouldn’t be able to perform any task. Well, that isn’t true. We will take a quick look on how Android permissions system works, how it is possible for such permissions-less shell app to execute remote Denial-Of-Service (DoS), list installed apps, reboot device and others. Besides that, I will show you how to identify such established reverse shell connection from your Android device and get rid of it. Get persistent reverse shell from Android app without visible permissions to make device unusable