主权项 |
1. A system for automatically generating an attacker application targeted to a victim application, comprising:
a memory unit that stores a database that comprises a template attacker application, a set of modules and instructions; and a processor which when configured by said instructions executes said set of modules, wherein said set of modules comprise: a victim application permissions reading module, implemented by said processor, that reads a list of permissions associated with a framework of said victim application that are declared in said victim application; a permission obtaining module, implemented by said processor, that obtains said list of permissions to exploit said victim application based on said list of permissions; a configuration file updating module, implemented by said processor, that updates a configuration file of said template attacker application with said list of permissions to generate an attacker application that is specific to said victim application; and a targeted attacker application creation module, implemented by said processor, that creates said attacker application, wherein said attacker application comprises a plurality of attack vectors targeted to attack said victim application based on said list of permissions. |