From Apk To Golden Ticket Initial Reconaissance
This article describes the potential dangers of using personal smartphones in corporate networks and as a result has been modeled after real events. It has been demonstrated that it is not so difficult for ill-intentioned to deceive an employee installing a malicious app on his smartphone, circumvent network protections, gain access to the corporate network, escalate privileges and access reserved information. Also, it has been shown that it is possible to remain both stealthy and bypass all the countermeasures....