Monday 16 May 2016

Best Android hacking apps and tools of 2016


Hacking, which was once considered the exclusive domain of the “experts” has become very common phenomenon with the rise of technology and advancements in the mobile field. With most people relying on their smartphones and other portable devices to carry out their day to day activities, it is very important to know about the (ethical) hacking tools available on your Android smartphone.

Android smartphones can run penetration testing and security test from hacking Android apps. With the help of a few applications and basic knowledge of the true capabilities of your Android smartphone, you, too, could dig into the world of hacking.

So, here we are sharing a list of 15Android hacking tools and apps that will turn your Android smartphone into a hacking machine.

1. Hackode

Hackode is one of the best applications for people who want to hack their android devices. The hacker’s Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like Google Hacking, Reconnaissance, DNS Dig, Exploits, Security Rss Feed and many more.

2. AndroRAT

AndroRAT, short for Remote Administration Tool for Android, is a client/server application developed in Java Android for the client side and in Java/Swing for the Server, which is used to control a system without having physical access to the system.

3. SpoofApp

SpoofApp is definitely used for fun over functionality. It allow you to spoof (Place) calls with any caller ID number. Basically you can manipulate what number shows up on your friend’s phone when you call. Some other features includes voice changer using which we can change our voice and can even record the entire conversation. To spoof calls, you need to buy SpoofCards which are sold separately.

4. WhatsApp Sniffer

WhatsApp Sniffer is a great android hacking app, which works in tandem with the WhatsApp application. Using this app, you can hack private WhatsApp chats, pictures, audios and videos of your friends who are using your WiFi Hotspot. You can manipulate pictures, videos, account info at your pleasure. It is detected by antivirus so disable your antivirus before using this app.

5. APK Inspector

APK Inspector is a great tool that any general app user will love. It’s main purpose is to reverse engineer any android application. This means that you can get the source code of any android application and edit it in order to remove licence and credits. However, most analysts use it as a powerful GUI tool to see the workings of an Android app as well as understand the coding behind it.

6. Eviloperator

This app automatically connects two person in a phone call making them feel that they called each other. Eviloperator’s biggest merit would probably have to be that you can record and save the conversation.

7. Kill Wi-Fi

his open source ethical hacking app is one of the most popular ones in this field. Similar to the net cut app in Windows, this app is capable of cutting off anyone’s WiFi over your network. Kill Wifi is extremely useful when you have an open WiFi not protected by a strong password. You can cut off the WiFi of the intruder by just a few clicks on your device. This app is easy to use owing to its lucid and interactive interface and easy-to-use tools.

8. DroidSheep

DroidSheep is a fantastic hacking app for beginners and anyone else who wants to dabble into the hacking world. This app can be easily used by anybody who has an Android device and only the provider of the web service can protect the users. So, anyone can test the security of his account by himself and can decide whether to continue using the web service.

9. Burp Suite

Burp Suite is kind of like a proofreader or fail safe. It is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and evaluation of potential security threats.

10. dSploit

dSploit is an Android network analysis and penetration suite to perform network security assessments on mobile phones. It is a complete toolkit so that you can perform various attacks like password sniffing, real time traffic manipulation, etc.

11. Zanti

ZAnti is one of the best android app related to hacking from android phone. It has almost all security tools related to hacking any Wi-Fi networks.

12. Shark for Root

Shark for Root is a traffic sniffer app for Android device. By using this, tools you can sniff any network and gather lots of data from any Wi-Fi network. It works fine on 3G and Wi-Fi also in Froyo tethered mode.

13. AnDOSid

AnDOSid is a tool designed only for security professionals to let them carry out DOS attack. It is used to perform a DOS attack on websites or web servers using the android device.

14. FaceNiff

FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the Wi-Fi that your mobile is connected to. It also finds password of Facebook, Blogger, Twitter, Amazon, Tumblr, and more online accounts.

If you are using the same network as your victim is using and if your FaceNiff is turned on, then it will capture all Facebook ID and password which is logged in from the same Network. It comes with paid version but also there are many cracked versions on the internet.

15) Nmap for Android

Nmap is a popular network security scanner, which is also available for android devices. It is used by professionals for network exploration. It works on both non-rooted and rooted phones. However, if your device is rooted then you have access to some more features. You can download this app for your Android device. This app allows you to scan networks for finding ports and system details.

VPN over DNS

Overview

For some time now, we've been usingDNSCat as a means to covertly transmit data during engagements where clients IDS's or Firewalls might otherwise block us.  The DNS protocol is often overlooked by system's administrators and as a result this tool has been immensely useful.

And while there are a other DNS tunneling solutions out there, this is the only one, to our knowledge, that supports 1) encryption 2) a centralized server for simple management 3) Command queuing.  4) Is free.

The one thing it does not support, is the ability to tunnel network traffic, from the client to the server.  

The Goal

What if we could setup a bi-directional vpn across dns that would allow all protocols, not just TCP?  This sort of thing is great for situation where you're at an Airport, Hotel, or some other captive portal situation where DNS resolves, but everything else is blocked.  This is also great for penetration testers who want to route/tunnel traffic through system that has been compromised.  And while DNSCat does support tunneling of TCP traffic, its unidirectional. i.e. From the server to the client only (Similar to SSH -L)

The Work Around

Ron (Primary author of DNScat) has mentioned that he intends to build in this feature at some point but for now, lets see if we can hack our way into getting what we want.  To do this we need the following:

Domain

For this setup, you will need to register a domain to use. As an example we use mooo.com from freedns.afraid.org. Note that we only care about the NS record which points to our server running the DNScat server software.

Server

On the server side we need to setup a few things. First is to setup ssh keys:

ssh-keygen

Next, we enable routing on the server:

echo 1 > /proc/sys/net/ipv4/ip_forward

Next we run we run the DNSCat Server.  Lets go through some of the switches we used:

 The -c switch is the preshared crypto key we want to use between the client and the server. This is optional, since we're going to be running a vpn across this, but why not add the extra layer of encryption. The -u switch tells the server to automatically attach to each inbound dnscat client session. The -a switch tells the server that we want to automatically run the following command on each new session.  As per the documentation, the 'listen' command will establish a tunnel between the server and the client where on the server a listening socket is created on port 2222 and all connections are forwarded to the client to 127.0.0.1:22.  This could easily be changed to forward browser traffic to www.google.com by changing it to read 'listen 127.0.0.1:8080 www.google.com:80'.

After the server is started, we switch to the client.

Client

We wont go into to details on how to compile the client, you can find those instructions on the github/readme page.  However for this to work, we compile the client and run it locally as root. But before we do that we need to make some modifications to the sshd config. Three changes need to be made to the standard sshd_config

Comment out 'PermitRootLogin without-password'Add 'PermitRootLogin yes'Add 'PermitTunnel yes'

Next restart the service and enable IP routing

# /etc/init.d/ssh restart # echo 1 > /proc/sys/net/ipv4/ip_forward

Once forwarding is enabled, we can connect our client to the server.

We can see that the session has been established, and on the server we see the following:

Next step is to push our keys from the server to the client. To do this, on the server run the following command:

scp /root/.ssh/id_rsa.pub root@127.0.0.1:/root/.ssh/authorized_keys -P 2222

Note, when being prompted for creds, this is the root password on the client machine.

Once the server ssh key has been pushed to the client. Now establish a SSH based vpn tunnel (-w) from the server to the client.

ssh -i /root/.ssh/id_rsa root@127.0.0.1 -p 2222 -w 1:1 -o TCPKeepAlive=yes -o ServerAliveInterval=50 &

If successful, you should now have an interface tun1 on both the client and the server. On both machines you'll need to provision IP's, Routes and IPTables for natting.

On Server

ifconfig tun1 address 172.16.254.2 netmask 255.255.255.252 ifconfig tun1 up route add [client network]/[netmask] via 172.16.254.1 dev tun1 iptables -t nat -A POSTROUTING -o tun1 -j MASQUERADE

On client (via SSH):

ssh -i /root/.ssh/id_rsa root@127.0.0.1 -p 2222 'ifconfig tun1 address 172.16.254.1 netmask 255.255.255.252' ssh -i /root/.ssh/id_rsa root@127.0.0.1 -p 2222 'ifconfig tun1 up' ssh -i /root/.ssh/id_rsa root@127.0.0.1 -p 2222 'route add [server network]/[netmask] via 172.16.254.2 dev tun1' ssh -i /root/.ssh/id_rsa root@127.0.0.1 -p 2222 'iptables -t nat -A POSTROUTING -o tun1 -j MASQUERADE'

So now, traffic from the server or the client should be able to reach either sides network. If you want to forward all traffic out, you could even put in a default route.

Final Thoughts

This solution, while effective, is slow. Not to mention, this will only work on *nix systems. But on the plus side, all TCP, UDP and ICMP traffic is properly routed across the tunnel allowing for such things as full port scans and streaming Netflix.

Sunday 13 March 2016

Quick and Easy Way to Create a Printable List of Google Contacts


All your contacts in Gmail can be downloaded to your PC to keep them with you offline. However, the downloaded file is in .csv format which is just a big mess. You will need at least an hour to line up all the contacts, and if you are thinking of printing them, you are going to have a difficult time. Thankfully, there is a software available for this that can save you hours of work.
GoogleTel is a tiny freeware software that will automatically arrange your downloaded Google contacts in .html format so you can easily print them. In this post we will show you how to create a printable list of Google contacts using GoogleTel.
Note: GoogleTel will only arrange contacts that have a dedicated number, unlike the .csv file that may even contain names and emails of people who you may have interacted with. GoogleTel is for Windows only.
Before you arrange Google contacts for printing, you need to download them first. To do so, go to Gmail and click on the “Gmail” drop-down menu button above the “Compose” button. From the menu, click on “Contacts,” and all your contacts will be shown.
Printable-Google-Contacts-Gmail-Contacts
Now click on the “More” button, and select “Export” from the menu. A dialog will open where you can select which contacts to download; you can either specify a specific type of contacts – like Friends or Family – or just download all the contacts. When you are done selecting contacts, click on “Export” and the .csv file will be downloaded to your Downloads folder.
Printable-Google-Contacts-Export
Printable-Google-Contacts-Select-Contacts
After downloading GoogleTel you will have to extract it to your desired location as it will be in .zip format. Once extracted, you will see two main files: GoogleTel.css and GoogleTel.exe. GoogleTel.css contains formatting options such as font style, size and margins, etc., but you will have to edit them manually, so be careful. GoogleTel.exe will be used for converting the .csv file.
Printable-Google-Contacts-GoogleTel
To convert, the .csv file must be located inside the GoogleTel folder which you just extracted. Copy the Google contacts .csv file and paste it into the GoogleTel folder just like in the image below.
Printable-Google-Contacts-.csv-file
Once the file is copied, launch the “GoogleTel.exe” file, and an .html file will be immediately created in the same folder.
Printable-Google-Contacts-.html-file
All you need to do is open the new .html file, and your default browser will open all your contacts in a new tab. The contacts will be arranged in numerical order by name, phone number and email address (if available) with a complete white background perfect for printing.
Printable-Google-Contacts-GoogleTel-Contacts
Right-click anywhere in the window and select “Print” from the context menu (or directly press “Ctrl + P”). You will see the options to make your print perfect, such as change layout, paper size, margins and quality, etc. Just click on the “Print” option below when you are done customizing to print the Google contacts.
Printable-Google-Contacts-Print
Printable-Google-Contacts-Print-options
Tip: You cannot edit the .html file when it is opened in the browser. If you need to make any edits before printing, right-click on the .html file and select “Edit” from the context menu. Your contacts will load in your default editor, such asMicrosoft Word.
GoogleTel is a great little application that should come in very handy if you need to manage your Google contacts. The default options work fine, and you should have no problem using the software. You can check out the official GoogleTel website for more details or comment below if you need any clarification.

Saturday 5 March 2016

How to Steal Secret Encryption Keys from Android and iOS SmartPhones


encryption-keys-android
Unlike desktops, your mobile devices carry all sorts of information from your personal emails to your sensitive financial details. And due to this, the hackers have shifted their interest to the mobile platform.

Every week new exploits are discovered for iOS and Android platform, most of the times separately, but the recently discovered exploit targets both Android as well as iOS devices.

A team of security researchers from Tel Aviv University, Technion and The University of Adelaide has devised an attack to steal cryptographic keys used to protect Bitcoin wallets, Apple Pay accounts, and other highly sensitive services from Android and iOS devices.

The team is the same group of researchers who had experimented a number of different hacks to extract data from computers. Last month, the team demonstrated how to steal sensitive data from a target air-gapped computer located in another room.

Past years, the team also demonstrated how to extract secret decryption keys from computers using just a radio receiver and a piece of pita bread, and how to extract the cryptographic key just by solely touching the chassis of the computer.

Side-Channel Attacks


According to the researchers, the recent exploit is a non-invasive Side-Channel Attack: Attack that extracts the secret crypto key from a system by analyzing the pattern of memory utilization or the electromagnetic outputs of the device that are emitted during the decryption process.

The exploit works against the Elliptic Curve Digital Signature Algorithm (ECDSA), a standard digital signature algorithm that is most widely used in many applications like Bitcoin wallets and Apple Pay and is faster than several other cryptosystems.

How to Steal Secret Encryption Keys?

how-to-hack-android-story
During the experimental hack, the researchers placed a $2 magnetic probe near an iPhone 4 when the phone was performing cryptographic operations.

While performing cryptographic operations, the security researchers measured enough electromagnetic emanations and were able to fully extract the secret key used to authenticate the end user's sensitive data and financial transactions.

The same hack can be performed using an improvised USB adapter connected to the phone's USB cable, and a USB sound card to capture the signal.
"Using such measurements, we were able to fully extract secret signing keys from OpenSSL and CoreBitcoin running on iOS devices," the researchers wrote in a blog post published Wednesday. "We also showed partial key leakage from OpenSSL running on Android and from iOS's CommonCrypto."
The researchers also experimented their exploit on a Sony-Ericsson Xperia X10 Phone running Android and said they believe such an attack is feasible.

The security researchers also cited a recent independent research by a separate team of security researchers that discovered a similar Side-Channel flaw in Android's version of the BouncyCastle crypto library, making the device vulnerable to intrusive electromagnetic key extraction attacks.

Currently, the hack requires an attacker to have physical control of, or, at least, a probe or cable in proximity to, a vulnerable mobile device as long as it performed enough tasks to measure a few thousand of ECDSA signatures.

Affected Devices


Older iOS versions 7.1.2 through 8.3 are vulnerable to the side-channel attack. The current iOS 9.x version includes defenses against side-channel attacks, so are unaffected.

However, nothing can save iPhone and iPad users even running current iOS versions if they are using vulnerable apps. One such vulnerable iOS app is CoreBitcoin that is used to protect Bitcoin wallets on iPhones and iPads.

Developers of CoreBitcoin told the security researchers that they are planning to replace their current crypto library with one that is not susceptible to the key extraction attack. Meanwhile, the recent version of Bitcoin Core is not vulnerable.

Both OpenSSL versions 1.0.x and 1.1.x are vulnerable except when compiled for x86-64 processors with the non-default option enabled or when running a special option available for ARM CPUs.

The team has already reported the vulnerability to the maintainers of OpenSSL, who said that hardware side-channel attacks are not a part of their threat model
- See more at: http://thehackernews.com/2016/03/encryption-keys-android.html?m=1#sthash.MkYd8vvz.dpuf

What Is SSD And How SSDs Work — All You Need To Know About SSDs

Short Bytes: SSD (Solid State Drive) is the new talk of the town and its popularity is escalating every day. It would be interesting to know what is SSD, what is inside these non-mechanical storage devices, how SSDs work, and what’s the difference between SSD and HDD.

Modern-age SSDs are a great option over the traditional rotating hard drives that have been used as the primary means of storage since the last 50-60 years. The magnetic tape based storage option have found themselves short-handed when it comes to matching speed with that of a computer processor, they still lag behind when it comes to offering reduced latency while accessing the data.
On the other hand, SSD (Solid State Drive) has made a considerable attempt to compete with the latency offered by processors, yet they fall behind, but they are an advantage over the circular rotating disks. The conventional HDDs are rotating magnetic disks used to store data like OS files, movies, music, games, etc. They are a cheap option but their biggest disadvantage is that they’re slow.
Talking about their origin, their ancestors have been there since the time when we used to work on vacuum tube-based computers. Charged Capacitor Read-Only Storage (CCROS) and Magnetic Core Memory were two similar technologies in the 1950s.

What is SSD?

An SSD (solid-state drive or solid-state disk) is a nonvolatile storage device that stores persistent data on solid-state flash memory.

What is Inside SSD?

SSD (solid state drives) is an integrated circuit under the hood which is used to store data. Their electronic interface is compatible with the block input/output interface used by HDD. You can just swap your old hard drive with a new SSD in a matter of a few minutes, provided, you are skilled enough to successfully open your computer hardware. And with no moving parts, they are way faster and strong enough to take shocks. They won’t mind even if you are careless enough to drop them from your table.

Memory:

Early versions of SSDs were based on DRAM volatile memory which furnished faster access and low latency but the only problem was that the data couldn’t be retained in the memory in the absence of power supply. It was in 2009 when SSDs based on NAND flash non-volatile memory were introduced which propelled their widespread adoption. Although, they are slower than the ones based on DRAM but they can still outrun conventional HDDs. And the biggest advantage is that the data remains intact even if you cut off the power supply.
NAND memory is made up of floating gate transistor cells which retain their charge states in the absence of power supply. Floating gate contains the electrons and the charged state is represented by binary bit 0 and discharged state by 1. Binary bit 0 represents data is stored in the NAND flash. The cells are arranged in a grid fashion and the grid is known as a block. An individual row in a block is called Page with sizes 2K, 4K, 8K, or 16K. Each block contains 128-256 pages, so the approximate size of the block varies between 256KB to 4MB.
NAND Flash is either Single Level Cell (SLC) which stores only one binary bit in one floating gate transistor and Multi-Level Cell (MLC) which stores two bits. Clearly, the latter one has more storage capacity but it comes at a price, they wear out faster. MLC type NAND flash memories are cheaper than SLC and are used in industry grade solid state drives (after making some modifications) which require more storage capacity but it degrades more quickly.

Controller:

It’s responsible for how data gets stored in a flash memory. It is designed for various requirements and could be loosely clubbed into two groups, one for low duty-cycle environments like flash drives, SD cards, camera, etc. in which constant read/write operations are not required. The other environment is high duty-cycle which requires constant read/write operations to be performed on the memory, like Solid State Drives.
Flash Controller acts as the middle man between the storage media and the computer. It is an embedded processor that is responsible for the performance of an SSD. Each time a computer wants to access the flash memory to perform a read/write operation, the flash controller comes into action.
The controller also manages the flash memory cells. Efficient handling of the storage cells is must as SSDs support a limited number of read/write cycles, about 10 thousand, and it would be wise enough to deploy something which makes sure that all the cells used equally in order to preserve the lifespan of the flash media, otherwise, some cells will become inoperable and some will be left unused throughout the lifetime of the SSD. Manufacturers use a technique known as wear-leveling to make sure that the degradation of the flash memory happens uniformly over time by programming the controller to utilize all the cells efficiently.
Another task the controller is assigned is known as Garbage Collection. In this process, when the write operation has been performed on every memory block for one time, the controller checks the initial blocks for the pages that will be required by the computer. It then copies those pages to a new block and leaves the existing block (known as a Stale block) to be erased and filled with new data.
The controller manages other important operations like introducing error-correcting code (ECC) which is the bit sequence of data stored and helps in data recovery in case it gets corrupted. Controller also maps bad sectors in the flash memory which are caused due damage occurred to the SSD. These can be logical bad sectors which can be repaired or physical bad sectors which represent permanently damaged parts of the flash memory and cannot be repaired. Controller uses the ECC to perform Memory Scrubbing operation which involves scan and repair of corrupt data in different locations of the memory.

Cache:

A small amount of DRAM volatile memory is used as a cache to store wear leveling data and to maintain a block placement directory. It improves the performance of the SSD but at the same time it increases the power consumption.

How SSDs work?

Image: WikipediaIf we talk at the basic level, inside a solid state drive, transistors are in a sequential fashion. Initially, all the transistors are set to value 1 (not charged). When saving operation begins, the current starts flowing through the chain of transistors and the value for some transistors becomes 0 as data is saved in them. In the grid, each intersection of the rows and columns is called cell which comprises of two transistors, one as the control gate and the other one as floating gate. The current flows into the floating gate and the electrons flow into the control gate. So, a net positive charge is created which interrupts a current flow. Similarly, we can have a unique pattern of 1s and 0s by applying precise voltage values.

Difference between SSD and HDD:

Advantage of SSD over HDD:

Fast Booting Time: Solid State Drives can tap their back over the speediness they offer when there is a need for  lightning fast OS boot-up. A typical consumer-grade SSD can boot your Windows OS in almost half the time it takes for spinning disk.
Quick Read/Write: Around 500 megabytes per second for an average SSD in comparison to 150 megabytes per second by a hard drive. SSDs can be beneficial to you if you’re a graphic designer who uses heavy video editing software or some hard-core gamer on a spy mission.
Low power consumption: These flash storage devices are designed to use less in comparison to their traditional alternatives. So, your laptop’s battery will last longer and you’ll be able to save some cash on your electricity bill.
Reduced noise pollution: Rotating hard drives are known to make sounds which are sometimes annoying when you are in the middle of something that requires a lot of concentration power. SSDs can make a great difference on that note, you won’t even notice these silence loving drives in action.
Shape and Size: Their integrated circuit can be fitted in a compact casing, but they’re designed to fit in the pants of the conventional HDDs. They can be installed right out of the box in the same slot where your old hard drive sits.

Disadvantages of SSD over HDD:

Pocket burning price: Over the years, there has been a drop in the price of SSDs, but still, their magnetic disk grandpas are way cheaper. The most probable reason is that they’re not much popular like the hard drives and the technology needs to become more mature. Maybe in the coming years, we could see NAND flash replaced by some other memory type providing more affordable solid state drives in the market.
Data loss due to power-cut: Although, they’re more reliable than their spinning counterparts. Their sensitive nature is reflected when there is a power cut. Aborted write operations and even complete loss of data may be observed in the case of power interruption.
Limited life span: The biggest disadvantage of having an SSD is that it loses its writing abilities over time. This is because it is not possible to change a single bit value in an SSD. For that purpose, a large block of data needs to be erased and rewritten. When an erase cycle is performed for a cell, some charge is left in it. This charge increases the resistance of the cell and eventually, no current is able to pass through it. Thus, it becomes of no use.
I told you about wear leveling technique which is implemented to address this issue. But that’s not a full-proof solution, it only slows down the degradation process by making the SSD wear out evenly. It involves complex algorithms which are difficult to test exhaustively and may lead to the loss of data caused due to firmware bugs. One important thing to be noted is that this problem doesn’t affect the reading abilities of the SSD as no charge value is altered during a read operation.
One game-changing approach used by the manufacturers is a hybrid drive which is based on a method known as SSD Caching, not to be confused with cache memory inside SSD. In this, frequently used data and applications are copied to the SSD which acts as the cache memory. The HDD acts as the main storage device which keeps all the data. So, we have a lightning fast storage media along with gigs of space to store our music, movies, and games.
These non-mechanical drives may have the advantage of speediness over the spinning hard drives but the old horses are still cheaper these modern sports cars. New technologies like HAMR (Heat Assisted Magnetic Recording) are being developed for hard drives which will help them in retaining their throne in the market. Hard Drives have done a tremendous job in revolutionizing the computing world. With the pace of time and increased demand for high-speed storage media, SSDs pose themselves a potential candidate for the future of storage. Recently, Samsung has launched PM1633a 15TB SSD which could be seen as the initial steps to the bright future of these solid state media.