
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Special Issue | Volume XIV, Issue XIII, September 2025
www.ijltemas.in Page 260
Ethical Hacking Against QR Code-Based Attacks: Simulating
Real-World Scenarios of QR Code Exploitation in Public Spaces
Sammed V. Bukshete
*
, Lina Chaudhari
Department of Computer Science, Dr. D. Y. Patil Arts, Commerce & Science College, Pimpri.411018, Pune, Maharashtra,
India
*
Corresponding Author
DOI: https://doi.org/10.51583/IJLTEMAS.2025.1413SP052
Received: 26 June 2025; Accepted: 30 June 2025; Published: 27 October 2025
Abstract: In public areas, QR codes are being utilized more and more for information sharing, marketing, and payment. But
because of their ease of use and user confidence, they are open to abuse, such as phishing, malware distribution, and illegal data
access. In order to examine the effects and create defenses, this study replicates actual QR code-based attack scenarios in
controlled ethical hacking environments. In order to propose defenses strategies like QR code validation, user awareness, and
embedded link scanning, the paper investigates how to set up safe lab conditions for QR-based social engineering, redirection
attacks, and malicious payload.
Keywords: QR Code Exploitation, Ethical Hacking, Phishing, Malicious Redirection, Public Spaces, QR Code Attacks, Cyber
security Simulation, Social Engineering,
I. Introduction
Quick Response (QR) codes have become an integral part of daily life, offering convenience in contactless transactions, event
check-ins, digital menus, and public advertisements. However, this increasing ubiquity introduces cyber security risks, especially
in public settings where users scan codes without verifying their authenticity. Attackers exploit this trust to perform malicious
redirection, phishing, or malware delivery by tampering with physical or digital QR codes.
This research addresses these vulnerabilities by simulating QR code-based attacks in ethical hacking labs. Through these
simulations, we aim to understand the mechanisms of exploitation, identify common user vulnerabilities, and test the
effectiveness of mitigation strategies. The research also emphasizes public cyber security awareness and proposes technical and
behavioral solutions to combat QR-related threats.
II. Literature Review
Previous research and cyber security incident reports highlight a growing trend in QR code exploitation. A study by the FBI
(2022) warned that cybercriminals have been placing malicious QR codes in high-traffic areas to redirect users to phishing sites.
Other academic studies have demonstrated that QR code scanners often lack embedded URL verification or malware detection
capabilities.
A 2021 survey conducted by MobileIron found that 71% of users could not distinguish a malicious QR code from a legitimate
one. Research by Lin et al. (2020) demonstrated that embedding JavaScript-based exploits in shortened QR URLs can bypass
browser security on unpatched mobile devices. Most existing research focuses on theoretical aspects or surveys. However, this
paper contributes by actively simulating attacks in a controlled ethical hacking environment and evaluating their real-world
effectiveness and countermeasures.
III. Methodology
3.1 Lab Configuration
3.1.1 Compatible Operating Systems: Ubuntu version 22.04 or Microsoft Windows 10
3.1.2 Virtual Lab: VirtualBox running Kali Linux
3.1.3 Test devices: iPhone (optional) and Android phones
3.1.4 Target Environments: QR scanning apps, browsers with link previews turned off
3.2 Equipment Used
3.2.1 Platforms such as GoQR.me, QRTool, and QRCode Monkey are commonly relied upon for producing custom QR codes.
3.2.2 Web services can be hosted using Python's built-in HTTP server or Apache on systems like Kali Linux or Parrot OS
3.2.3 URL shorteners: tinyurl, bit.ly
3.2.4 Payload Delivery: Simulated APKs and fake login pages (no actual malware)