Sei sulla pagina 1di 13

STEALTH APPLICATION

Problem Statement
■ Small application which can be installed copied through
web-link, Bluetooth transfer etc. on any android mobile
phone. Application should be in the mode of invisible
(No icon), hidden from the user. Application should
contact the main server as per the programmed time
and receive the instructions such as sending call logs,
SMS’s, current Lat., Long location co-ordinates.
INTRODUCTION
■ Stealth refers to the act of trying to hide or evade
detection.

■ Stealth application can be a multipurpose


application. For eg. Parents spying on their child.
Same app can be used by police to avoid any criminal
activities.
How it Works
■ It is a small application which can be installed by a web-link or
by sharing it via Bluetooth.
■ The icon of the app is invisible and can be accessed by some
other ways like by typing a specific code on the dial pad.
■ The application at regular time intervals will upload the user’s
recent call logs, text messages and geolocation via Internet.
■ In case, if the internet is unavailable, the application will SMS
the details.
■ You need to get hold of that device only once in order to install
the app, after that – everything works remotely.
Modules Covered
■ ANDROID
■ JAVA
■ COMPUTER NETWORKING
■ DBMS
■ DATA STRUCTURES
IMPLEMENTATION
■ The application will consist of an opening activity with the
app’s logo followed by another activity consisting of buttons
to activate or deactivate the application.
■ Then the application will ask for the time interval at which
the updates will be sent. The moment the application gets
activated, it will start monitoring the call logs, SMS and will
track the user location.
■ At the given time period it will send the collected data to the
server. The app will be invisible in the menu and to access it
will be using a code which can be typed on the dial pad.
Software Used

■ ANDROID STUDIO

■ ANDROID EMULATOR

■ JDK
ADVANTAGES
■ We can track and monitor the client’s mobile phone
activities.
■ It enables the host to spy and track all the activities
including:
– Cell phone calls
– Text messages
– Device location
What did we learn?
■ During the development of this application, we learnt
following things:
– Android App Development
– Android Development using Java
– Use of Data Structures and DBMS in Android
– Establishing wireless connection between two devices
– Extracting information from a remote device
CONCLUSION
■ The ‘Mr. Spy’ app can be used by:
– National Defence Academy (NDA) for spying the
enemy.
– Institutions to track the students’ mails and devices
for academic use.
– Companies to track the devices of employees.
– Parents to track the personal devices of their children.
FUTURE SCOPE
■ This stealth application can be modified to:
– Call Monitoring (Recording)
– Social Media Marketing
– Photo & Video Monitoring
– Gmail Monitoring
– Application Blocking
– LIVE Control Panel
REFERENCE
■ Google
■ Stack Overflow
■ Quora
■ Codelabs
■ Blogspot
THANK YOU

Potrebbero piacerti anche