Kali Linux NetHunter

by zitstif on Dec.22, 2014, under Posts, Videos

It looks like my Kali Linux chroot environment has been superseded per se. I am very excited about Kali Linux NetHunter (http://nethunter.com/), and this may drive me to purchase a Nexus 5 so I can have OTG support and perform wireless attacks more easily versus having to use a Y USB cable with my current Nexus 4.

I had a HID attack idea for the Nokia N900, but it appears the folks over at offensive-security have put something together for the Android/Nexus platform. Please have a look at this video:

Kali Linux NetHunter HID Attack from Offensive Security on Vimeo.

One caveat I have noticed is that NetHunter currently only supports Nexus series devices:

(From nethunter.com ):

Supported Devices:

The Kali NetHunter image is currently compatible with the following Nexus devices:

  • Nexus 4 (GSM) – “mako” – EXPERIMENTAL SUPPORT
  • Nexus 5 (GSM/LTE) – “hammerhead”
  • Nexus 7 [2012] (Wi-Fi) – “nakasi”
  • Nexus 7 [2012] (Mobile) – “nakasig”
  • Nexus 7 [2013] (Wi-Fi) – “razor”
  • Nexus 7 [2013] (Mobile) – “razorg”
  • Nexus 10 – “mantaray”

With that being said, my article on weaponizing the android platform may still be of use to a lot of you who don’t own Nexus series devices: http://zitstif.no-ip.org/?p=811

2 Comments :, , , , , , , , more...

Android Lollipop breaks Kali chroot [UPDATE]

by zitstif on Nov.28, 2014, under Posts


Chainfire, who I’m sure you know of if you’re into rooting Android devices, has pushed out an update 11/26/2014 and now the Kali chroot environment works! Keep in mind, I still have this installed: http://forum.xda-developers.com/google-nexus-5/development/fix-bypassing-pie-security-check-t2797731.

However, the chroot environment is not quite perfect yet (nor has it necessarily been). I am receiving this error when issuing commands in the environment: ERROR: ld.so: object ‘/system/lib/libsigchain.so’ from LD_PRELOAD cannot be preloaded: ignored. I have added this following line to the kali shell script located at /sdcard/kali/kali, ‘export LD_PRELOAD=/system/lib/libsigchain.so‘, however this does not fix the issue. I would appreciate any words of wisdom/solutions if anyone has any.

#Update 11/30/2014

To not see the LD_PRELOAD error, all you need to do is add this to your .bashrc file:


Leave a Comment :, , , , , more...

Android Lollipop breaks Kali chroot

by zitstif on Nov.17, 2014, under Posts

For those of you who are looking to update your Android version to Lollipop and wish to continue using the chroot environment I have shown how to setup here, please hold off! You can do so but at your own risk. Currently my chroot environment is not functional because I get ‘permission denied’ when I try to run the same script as I’ve always done before with my rooted Nexus 4 with previous versions of Android (up to 4.4.4). I’m highly confident that the issue is related to Android Lollipop’s PIE system, though I could be wrong. Over at the XDA forums, it appears that there is a workaround, but it still doesn’t fix the ‘permission denied’ issue that I’m experiencing. However it may help you with other apps:


This bypass method did fix SSHDroid, but caused some issues with other apps.

1 Comment :, , , , , , , more...

Creating Your Own USB Katana Sword

by zitstif on Sep.20, 2014, under Posts

JP Dunning (https://twitter.com/r0wnin) is the creator of the Katana: Portable Multi-Boot Security Suite. Upon visiting www.hackfromacave.com, it appears that this projects have come to a halt. It is true that you can still obtain the Katana toolkit via torrents (http://securityiskey.blogspot.com/2012/08/katana-3-beta-torrent.html for those are interested). However, I can’t recommend downloading this toolkit as of now because a lot the Linux distributions within the Katana toolkit have been superseded by newer distributions. Another issue with Katana is that it’s kind of a pain to customize and add and remove distributions.

With that being said, this post’s objective is to inform those who how to create a multi-booting USB flash drive toolkit that is easily customizable for end user’s specific needs. For this we will be heavily relying on YUMI (http://www.pendrivelinux.com/yumi-multiboot-usb-creator/). Using YUMI is pretty straight forward and I don’t believe there is a strong need for myself to create a tutorial (https://www.google.com/#q=YUMI+tutorial).

To create our “Home Made Katana”, you will need:

-32GB Flash drive (smaller may work but I recommend 32GB or larger)
-YUMI ( http://www.pendrivelinux.com/yumi-multiboot-usb-creator/ )
-HomeMadeKatana.zip ( https://ia601401.us.archive.org/15/items/HomeMadeKatana/HomeMadeKatana.zip )

HomeMadeKatana.zip file hash
MD5: dc5b97133c9e6ca9a848b26b234f2210
SHA-1: 8a13ce78c380a05f60602a40790bf77021d52de9


The root directory of this zip file contains:

Disk Investigator

I pulled the PortableApps directory and the KatanaToolKit.exe from the Katana:
Portable Multi-Boot Security Suite. I meant to add herdProtect portable scanner but forgot to. Feel free to add this if you want: http://www.herdprotect.com/installers/herdProtectScan_Portable.exe .

To create our “Home Made Katana”, do as follows:

1.) Backup any data you want on your flash drive
2.) Wipe the flash drive
3.) Download YUMI
4.) I recommend the following distributions/bootable tools:

Clonezilla (Backup + Clone Tool)
Deft (Forensics)
Hiren’s Boot CD
Kon-Boot Floppy Image
Mint Linux
Offline NT Password & Registry Editor
Ophcrack Vista/7
Ophcrack XP
Ultimate Boot CD
Windows 7
Windows 8
Windows Defender Offline

5.) Download and extract HomeMadeKatana.zip to the root of the flash drive.

You may ask yourself why would I recommend putting Windows 8 on your flash drive? I recommend this because newer systems are now using UEFI and a lot of systems are shipping without optical drives. For instance if you need to reset a Windows 8 local account password ( http://pcsupport.about.com/od/windows-8/a/reset-password-windows-8.htm ), having Windows 8 on your “Home Made Katana” would be of great use.

An additional note that should be taken into consideration when dealing with newer UEFI computers. To boot into Linux distros or even to boot from USB or optical drives with software that doesn’t necessarily support secure booting you will need to turn the secure boot option off and/or enable legacy booting and/or enable compatibility support module (CSM).

In retrospect, what we have done is create a mutlibootable and powerful flash drive with utilities for penetration testers, IT gurus and network administrators. In addition, I would also recommend getting a USB Rubber Ducky (https://hakshop.myshopify.com/collections/usb-rubber-ducky) especially if you’re into penetration testing. If you have any questions, comments or input feel free to post a comment below.

Leave a Comment :, , , , , , , , , , , , , , more...

zitstif.no-ip.org is still alive…

by zitstif on Jul.03, 2014, under Posts

Thanks to Microsoft, no-ip.com domains and subdomains experienced outages due to Microsoft hijacking no-ip domains to capture traffic from infected hosts. Their intention was to only affect the websites that were malicious but instead they affected malicious and non-malicious websites as well (like zitstif.no-ip.org).



I want to thank Microsoft for their recent mistake and I also want to thank them for the wonderful user interface Metro on Windows 8 that is alienating desktop computer users. All Microsoft needs to do now is cut off support for Windows 7…

Leave a Comment :, , , , , , , more...


Searching for something?

Use the form below to search the site:

Still not finding what you're looking for? Leave a comment or contact me if you wish.


All entries, chronologically...