Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly

Social engineering techniques are often viewed negatively due to their association with deceptive practices. However, these techniques can also be utilized ethically, as many cybersecurity professionals do, particularly when evaluating vulnerabilities and testing security defenses. This paper presen...

Full description

Saved in:
Bibliographic Details
Main Author: Hussein Abdulkhaleq Saleh alsharya
Format: Article
Language:English
Published: College of Computer and Information Technology – University of Wasit, Iraq 2024-09-01
Series:Wasit Journal of Computer and Mathematics Science
Online Access:http://wjcm.uowasit.edu.iq/index.php/wjcm/article/view/268
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832582105962381312
author Hussein Abdulkhaleq Saleh alsharya
author_facet Hussein Abdulkhaleq Saleh alsharya
author_sort Hussein Abdulkhaleq Saleh alsharya
collection DOAJ
description Social engineering techniques are often viewed negatively due to their association with deceptive practices. However, these techniques can also be utilized ethically, as many cybersecurity professionals do, particularly when evaluating vulnerabilities and testing security defenses. This paper presents EDC (Ethical Data Collector), an Android application that utilizes social engineering techniques to discreetly collect valuable data from an Android device for ethical purposes. EDC employs deception through a simulated UI (fake) to engage the target for a period, while secretly collecting data such as device information, active phone number, and images in the background, then sending them to a designated server via the internet. The researcher argues that EDC could help identify inexperienced cybercriminals or extortionists without complex efforts or significant cost, provided that its capabilities are judiciously utilized and subject to proper controls and oversight. EDC's development methodology emphasizes understanding the target's personality, predilections, and preferences to tailor the app experience as required for attracting the target to install and run the application. The paper describes the core functions and workflows for collecting and sending data. Additionally, permissions handling has been addressed as being critical for enabling EDC to collect the required information. Testing on Android emulators demonstrated that the EDC's APK file size is 4 MB, and data collection and transmission processes functioned as intended across various Android versions. The minimum SDK version required to run EDC is level 16. The total estimated time to complete the fake UI process (cumulative user engagement time) is 57-60 seconds, where each activity takes 8 seconds based on the adopted development approach.
format Article
id doaj-art-85d3ed4d60b74077bbe8ba70dcde283a
institution Kabale University
issn 2788-5879
2788-5887
language English
publishDate 2024-09-01
publisher College of Computer and Information Technology – University of Wasit, Iraq
record_format Article
series Wasit Journal of Computer and Mathematics Science
spelling doaj-art-85d3ed4d60b74077bbe8ba70dcde283a2025-01-30T05:23:46ZengCollege of Computer and Information Technology – University of Wasit, IraqWasit Journal of Computer and Mathematics Science2788-58792788-58872024-09-013310.31185/wjcms.268Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data DiscreetlyHussein Abdulkhaleq Saleh alsharya0Directorate General of Education in Dhi Qar: Nasiriyah, Dhi Qar, IQSocial engineering techniques are often viewed negatively due to their association with deceptive practices. However, these techniques can also be utilized ethically, as many cybersecurity professionals do, particularly when evaluating vulnerabilities and testing security defenses. This paper presents EDC (Ethical Data Collector), an Android application that utilizes social engineering techniques to discreetly collect valuable data from an Android device for ethical purposes. EDC employs deception through a simulated UI (fake) to engage the target for a period, while secretly collecting data such as device information, active phone number, and images in the background, then sending them to a designated server via the internet. The researcher argues that EDC could help identify inexperienced cybercriminals or extortionists without complex efforts or significant cost, provided that its capabilities are judiciously utilized and subject to proper controls and oversight. EDC's development methodology emphasizes understanding the target's personality, predilections, and preferences to tailor the app experience as required for attracting the target to install and run the application. The paper describes the core functions and workflows for collecting and sending data. Additionally, permissions handling has been addressed as being critical for enabling EDC to collect the required information. Testing on Android emulators demonstrated that the EDC's APK file size is 4 MB, and data collection and transmission processes functioned as intended across various Android versions. The minimum SDK version required to run EDC is level 16. The total estimated time to complete the fake UI process (cumulative user engagement time) is 57-60 seconds, where each activity takes 8 seconds based on the adopted development approach. http://wjcm.uowasit.edu.iq/index.php/wjcm/article/view/268
spellingShingle Hussein Abdulkhaleq Saleh alsharya
Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly
Wasit Journal of Computer and Mathematics Science
title Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly
title_full Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly
title_fullStr Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly
title_full_unstemmed Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly
title_short Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly
title_sort leveraging social engineering techniques for ethical purposes an approach to develop fake android app for collecting valuable data discreetly
url http://wjcm.uowasit.edu.iq/index.php/wjcm/article/view/268
work_keys_str_mv AT husseinabdulkhaleqsalehalsharya leveragingsocialengineeringtechniquesforethicalpurposesanapproachtodevelopfakeandroidappforcollectingvaluabledatadiscreetly