Implementing the Metasploit Framework on the Android Platform in a Single Network
Implementasi Metasploit Framework Pada Platform Android Dalam Satu Jaringan
DOI:
https://doi.org/10.21070/ups.8742Keywords:
Metasploit, Android, Penetration Testing, Backdoor, PayloadAbstract
This study explores the implementation of the Metasploit Framework on Android platforms within a single
network. The aim is to analyze the vulnerability of Android systems against backdoor-based attacks using penetration
testing tools. The study used msfvenom to generate a malicious APK and tested it within a LAN environment. The
results showed successful exploitation, including access to sensitive data like SMS, call logs, and device location. This
highlights the importance of Android security awareness and proactive prevention strategies
Downloads
References
N. A. Pandusaputri, R. B. Ramadhan Mokodompit, and E. P. Simangunsong, “KENYAMANAN PENGGUNA
IOS DAN ANDROID DI KALANGAN GENERASI Z.,” J. Syntax Lit., vol. 9, no. 5, 2024, Accessed: Jul. 29,
[Online]. Available:
gaDJKekD2JdsFvYpsQDvNgIDykjqXhRGg%3D%3D&crl=c.
L. D. Samsumar et al., “Keamanan Sistem Informasi: Perlindungan Data dan Privasi di Era Digital.” Hadla
Media Informasi, 2025. Accessed: Jul. 29, 2025. [Online]. Available:
http://pustakahadla.com/xmlui/handle/123456789/39
R. Vice, N. C. Simaremare, and S. Manalu, “Perkembangan Cybercrime: Dampak Terhadap Keamanan dan
Ketahanan Nasional serta Pencegahannya,” Mimb. KEADILAN J. Ilmu Huk., pp. 71–83, 2024.
A. Ripaldi, “Jenis Serangan Siber Umum,” Portal Jember, 2021. [Online]. Tersedia: https://portaljember.pikiranrakyat.com
Rapid7, “Metasploit Framework Documentation,” 2022. [Online]. Tersedia: https://docs.rapid7.com/metasploit
H. Ayasso and A. Mohammad-Djafari, "Joint NDT Image Restoration and Segmentation Using Gauss–Markov–
Potts Prior Models and Variational Bayesian Computation," IEEE Transactions on Image Processing, vol. 19,
no. 9, pp. 2265-77, 2010. [Online]. Available: IEEE Xplore, http://www.ieee.org. [Accessed Sept. 10, 2010].
A. F. Ramadhan, A. D. Putra, and A. Surahman, “Aplikasi Pengenalan Perangkat Keras Komputer Berbasis
Android Menggunakan Augmented Reality (AR),” J. Teknol. dan Sist. Inf., vol. 2, no. 2, pp. 24–31, 2021,
[Online]. Available: http://jim.teknokrat.ac.id/index.php/JTSI.
N. K. Ceryna Dewi, I. B. G. Anandita, K. J. Atmaja, and P. W. Aditama, “Rancang Bangun Aplikasi Mobile
Siska Berbasis Android,” SINTECH (Science Inf. Technol. J., vol. 1, no. 2, pp. 100–107, 2018, doi:
31598/sintechjournal.v2i1.291.
T. Wijayanto and A. Susilo, “Implementasi Backdoor Scanner Tool Menggunakan Metode Carving File Pada
Server Codepolitan,” I-STATEMENT Inf. Syst. Technol. Manag., vol. 3, no. 2, 2017, [Online]. Available:
http://journal.esqbs.ac.id/index.php/I-STATEMENT/article/view/64/66.
M. R. Akhyari and A. R. Pratama, “Kesadaran akan Ancaman Serangan Berbasis Backdoor di Kalangan
Pengguna Smartphone Android,” Automata, vol. 2, no. 1, p. 7, 2021, [Online]. Available:
Downloads
Additional Files
Posted
License
Copyright (c) 2025 UMSIDA Preprints Server

This work is licensed under a Creative Commons Attribution 4.0 International License.
