0% found this document useful (0 votes)
4 views16 pages

Bombe 3 - Phoenix

The document outlines a malicious Android application designed to exploit vulnerabilities for data exfiltration. It includes functionalities such as scanning for sensitive information in files, clipboard, and external storage, as well as methods for evading detection and maintaining persistence. The application uses encryption for data transmission and attempts to gain root access through kernel exploits.

Uploaded by

ulrichtamara461
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
4 views16 pages

Bombe 3 - Phoenix

The document outlines a malicious Android application designed to exploit vulnerabilities for data exfiltration. It includes functionalities such as scanning for sensitive information in files, clipboard, and external storage, as well as methods for evading detection and maintaining persistence. The application uses encryption for data transmission and attempts to gain root access through kernel exploits.

Uploaded by

ulrichtamara461
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 16

You might also like