Preprint has been published in a journal as an article
Preprint / Version 1

Implementing the Metasploit Framework on the Android Platform in a Single Network

Implementasi Metasploit Framework Pada Platform Android Dalam Satu Jaringan

##article.authors##

DOI:

https://doi.org/10.21070/ups.8742

Keywords:

Metasploit, Android, Penetration Testing, Backdoor, Payload

Abstract

This study explores the implementation of the Metasploit Framework on Android platforms within a single
network. The aim is to analyze the vulnerability of Android systems against backdoor-based attacks using penetration
testing tools. The study used msfvenom to generate a malicious APK and tested it within a LAN environment. The
results showed successful exploitation, including access to sensitive data like SMS, call logs, and device location. This
highlights the importance of Android security awareness and proactive prevention strategies

Downloads

Download data is not yet available.

References

N. A. Pandusaputri, R. B. Ramadhan Mokodompit, and E. P. Simangunsong, “KENYAMANAN PENGGUNA

IOS DAN ANDROID DI KALANGAN GENERASI Z.,” J. Syntax Lit., vol. 9, no. 5, 2024, Accessed: Jul. 29,

[Online]. Available:

https://search.ebscohost.com/login.aspx?direct=true&profile=ehost&scope=site&authtype=crawler&jrnl=25410849&AN=177805927&h=uksAeuWpjxLKL48E9O%2Fto7SdL8xkVBLco0X5X%2FEOyRvwH5Jruu%2Buq

gaDJKekD2JdsFvYpsQDvNgIDykjqXhRGg%3D%3D&crl=c.

L. D. Samsumar et al., “Keamanan Sistem Informasi: Perlindungan Data dan Privasi di Era Digital.” Hadla

Media Informasi, 2025. Accessed: Jul. 29, 2025. [Online]. Available:

http://pustakahadla.com/xmlui/handle/123456789/39

R. Vice, N. C. Simaremare, and S. Manalu, “Perkembangan Cybercrime: Dampak Terhadap Keamanan dan

Ketahanan Nasional serta Pencegahannya,” Mimb. KEADILAN J. Ilmu Huk., pp. 71–83, 2024.

A. Ripaldi, “Jenis Serangan Siber Umum,” Portal Jember, 2021. [Online]. Tersedia: https://portaljember.pikiranrakyat.com

Rapid7, “Metasploit Framework Documentation,” 2022. [Online]. Tersedia: https://docs.rapid7.com/metasploit

H. Ayasso and A. Mohammad-Djafari, "Joint NDT Image Restoration and Segmentation Using Gauss–Markov–

Potts Prior Models and Variational Bayesian Computation," IEEE Transactions on Image Processing, vol. 19,

no. 9, pp. 2265-77, 2010. [Online]. Available: IEEE Xplore, http://www.ieee.org. [Accessed Sept. 10, 2010].

A. F. Ramadhan, A. D. Putra, and A. Surahman, “Aplikasi Pengenalan Perangkat Keras Komputer Berbasis

Android Menggunakan Augmented Reality (AR),” J. Teknol. dan Sist. Inf., vol. 2, no. 2, pp. 24–31, 2021,

[Online]. Available: http://jim.teknokrat.ac.id/index.php/JTSI.

N. K. Ceryna Dewi, I. B. G. Anandita, K. J. Atmaja, and P. W. Aditama, “Rancang Bangun Aplikasi Mobile

Siska Berbasis Android,” SINTECH (Science Inf. Technol. J., vol. 1, no. 2, pp. 100–107, 2018, doi:

31598/sintechjournal.v2i1.291.

T. Wijayanto and A. Susilo, “Implementasi Backdoor Scanner Tool Menggunakan Metode Carving File Pada

Server Codepolitan,” I-STATEMENT Inf. Syst. Technol. Manag., vol. 3, no. 2, 2017, [Online]. Available:

http://journal.esqbs.ac.id/index.php/I-STATEMENT/article/view/64/66.

M. R. Akhyari and A. R. Pratama, “Kesadaran akan Ancaman Serangan Berbasis Backdoor di Kalangan

Pengguna Smartphone Android,” Automata, vol. 2, no. 1, p. 7, 2021, [Online]. Available:

https://journal.uii.ac.id/AUTOMATA/article/view/17317

Posted

2025-07-30