Dependency Graph
View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0004131 | Kali Linux | New Tool Requests | public | 2017-08-04 09:58 | 2018-01-29 10:27 |
Reporter | hh | Assigned To | g0tmi1k | ||
Priority | normal | Severity | minor | Reproducibility | N/A |
Status | closed | Resolution | duplicate | ||
Summary | 0004131: Drozer 2.4.3 | ||||
Description | Name: Drozer drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoints and the underlying OS. drozer provides tools to help you use, share and understand public Android exploits. It helps you to deploy a drozer Agent to a device through exploitation or social engineering. Using weasel (MWR's advanced exploitation payload) drozer is able to maximise the permissions available to it by installing a full agent, injecting a limited agent into a running process, or connecting a reverse shell to act as a Remote Access Tool (RAT)." There is an existing bug report however I don't know if its been seen: https://bugs.kali.org/view.php?id=1067 | ||||
Date Modified | Username | Field | Change |
---|---|---|---|
2017-08-04 09:58 | hh | New Issue | |
2018-01-26 11:22 | g0tmi1k | Relationship added | has duplicate 0001067 |
2018-01-26 11:22 | g0tmi1k | Relationship added | has duplicate 0003495 |
2018-01-29 10:27 | g0tmi1k | Assigned To | => g0tmi1k |
2018-01-29 10:27 | g0tmi1k | Status | new => closed |
2018-01-29 10:27 | g0tmi1k | Resolution | open => duplicate |
2018-01-29 10:27 | g0tmi1k | Note Added: 0007921 |