Break open any Master Combo Lock in 8 tries or less! [Video]

by zitstif on Apr.29, 2015, under Videos

Leave a Comment :, , , , , more...

Android Lollipop 5.1 and Kali.nogui.armel.zitstif.chroot. 482013

by zitstif on Apr.20, 2015, under Posts

http://zitstif.no-ip.org/KaliPost.png

I have just installed the Android 5.1 OTA update on my Nexus 4 and can confirm my chroot image still works, all you need to do is install busybox again and you’ll be back up and running. So for those of you who are having issues with NetHunter and need a chroot environment that is Kali based, my solution will work for you.

Speaking of NetHunter, apparently NetHunter 1.2 has been released and it supposedly works on Lollipop:

https://www.offensive-security.com/kali-nethunter/nethunter-android-lollipop-nexus6/

This post IS from April 1 2015 of this year, so I hope this isn’t a joke. ;-)

Hats off to the off-sec guys! They can do wonders.

Leave a Comment :, , , , , , , , , more...

Stuff to throw in your C:\Windows\System32 directory and %PATH% variable

by zitstif on Feb.27, 2015, under Posts

Ah… WINKEY+R and cmd.exe, two awesome means of launching programs and commands within a Windows environment. In my humble opinion, WINKEY+R is probably one of the best keyboard shortcuts to know,  especially if you work in the tech industry. I mention this because I find myself using this keyboard shortcut a lot and it’s nice just to call out the name of a program rather than hunting around for it in a GUI. Need to see trace route for google.com? WINKEY+R then tracert www.google.com. Need to do a force shutdown? WINKEY+R then shutdown -s -t 0 -f . The list goes on but today we will be adding to this list because we all know that there are a myriad of utilities out there that don’t come with Windows installations by default and it’s nice to have them sitting in your System32 directory or in your %PATH% variable to quickly execute. I will warn you that some of the utilities I will recommend may make it easier for your system to be used as a pivot point if your system gets compromised. Additionally some of these tools may be detected as ‘viruses’ by anti-virus programs. Lastly, this article isn’t a comprehensive list of ALL the utilities that could be added or desired. It’s merely a means of getting you started. With that being said, let’s continue.

Cygwin:

For those of you who want to give your Windows system more a UNIX/Linux feel, I strongly recommend installing Cygwin and customizing your install to have all the Unix based goodies that your little heart desires. Once you’ve done this, add the /bin/ directory to your %PATH% variable. Now you can use egrep instead of findstr. Also you can now use wget, curl, ssh utilities suite, netcat, perl and other powerful scripting languages from cmd.exe! (Provided you have selected to install these during the customization part of your Cygwin install.)

https://www.cygwin.com/

Sysinternals Tools:

Mark Russinovich deserves a medal of some sort. Practically every tool he makes for Windows is a must have if you work on Windows systems. So feel free to download and copy all of these .exe files to your System32 directory:

https://technet.microsoft.com/en-us/sysinternals/bb842062.aspx

I personally use autoruns.exe all the time as a much greater alternative to msconfig and hijackthis.

Putty software suite:

If you forgot to install the ssh utilities under Cygwin, don’t worry and put these in your System32 directory:

http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html


Other useful tools to have:

Here’s a list of some other tools that are very useful to have in your System32 directory:

Bluescreenview – great utility for getting information on BSODs

coretemp - (pretty self explanatory)

cpuz- very useful tool for getting information about your CPU, Motherboard, and RAM

fciv – Microsoft’s hash checksum utility

gpuz – like cpuz but for graphics cards

p95 -useful tool to benchmark your system

rufus -Create bootable USB drives with picky distros (not all work with YUMI)

Speccy -great alternative to msinfo32 that is better in some departments

usbdeview -useful for getting information about usb devices that have been plugged into your system

vncviewer

YUMI – create multi linux distro and OS bootable flash drives (see: http://zitstif.no-ip.org/?p=973 )

Of course this list isn’t complete but I strongly feel that this is a good start. If you feel inclined to suggest some tools/utilities to add to the list feel free to leave a comment or send me an email.

Leave a Comment :, , , , , , , , , , , , , , , , , , , more...

Kali Linux NetHunter

by zitstif on Dec.22, 2014, under Posts, Videos

It looks like my Kali Linux chroot environment has been superseded per se. I am very excited about Kali Linux NetHunter (http://nethunter.com/), and this may drive me to purchase a Nexus 5 so I can have OTG support and perform wireless attacks more easily versus having to use a Y USB cable with my current Nexus 4.

I had a HID attack idea for the Nokia N900, but it appears the folks over at offensive-security have put something together for the Android/Nexus platform. Please have a look at this video:

Kali Linux NetHunter HID Attack from Offensive Security on Vimeo.

One caveat I have noticed is that NetHunter currently only supports Nexus series devices:

(From nethunter.com ):

Supported Devices:

The Kali NetHunter image is currently compatible with the following Nexus devices:

  • Nexus 4 (GSM) – “mako” – EXPERIMENTAL SUPPORT
  • Nexus 5 (GSM/LTE) – “hammerhead”
  • Nexus 7 [2012] (Wi-Fi) – “nakasi”
  • Nexus 7 [2012] (Mobile) – “nakasig”
  • Nexus 7 [2013] (Wi-Fi) – “razor”
  • Nexus 7 [2013] (Mobile) – “razorg”
  • Nexus 10 – “mantaray”

With that being said, my article on weaponizing the android platform may still be of use to a lot of you who don’t own Nexus series devices: http://zitstif.no-ip.org/?p=811

4 Comments :, , , , , , , , more...

Android Lollipop breaks Kali chroot [UPDATE]

by zitstif on Nov.28, 2014, under Posts

http://www.memegasms.com/media/created/vhyfxm.jpg

Chainfire, who I’m sure you know of if you’re into rooting Android devices, has pushed out an update 11/26/2014 and now the Kali chroot environment works! Keep in mind, I still have this installed: http://forum.xda-developers.com/google-nexus-5/development/fix-bypassing-pie-security-check-t2797731.

However, the chroot environment is not quite perfect yet (nor has it necessarily been). I am receiving this error when issuing commands in the environment: ERROR: ld.so: object ‘/system/lib/libsigchain.so’ from LD_PRELOAD cannot be preloaded: ignored. I have added this following line to the kali shell script located at /sdcard/kali/kali, ‘export LD_PRELOAD=/system/lib/libsigchain.so‘, however this does not fix the issue. I would appreciate any words of wisdom/solutions if anyone has any.

#Update 11/30/2014

To not see the LD_PRELOAD error, all you need to do is add this to your .bashrc file:

unset LD_PRELOAD;

Leave a Comment :, , , , , more...

]

Searching for something?

Use the form below to search the site:

Still not finding what you're looking for? Leave a comment or contact me if you wish.

Archives

All entries, chronologically...