{"id":811,"date":"2013-05-11T20:55:15","date_gmt":"2013-05-12T01:55:15","guid":{"rendered":"http:\/\/zitstif.no-ip.org\/?p=811"},"modified":"2015-04-16T21:27:32","modified_gmt":"2015-04-17T02:27:32","slug":"steps-toward-weaponizing-the-android-platform","status":"publish","type":"post","link":"http:\/\/zitstif.no-ip.org\/?p=811","title":{"rendered":"Steps Toward Weaponizing the Android Platform"},"content":{"rendered":"<p><strong>(4\/16\/2015) &#8211; NOTE: THIS SOLUTION HAS BEEN KIND OF SUPERSEDED BY https:\/\/www.kali.org\/kali-linux-nethunter\/ , if nethunter doesn&#8217;t work for you then continue on with this post:<\/strong><\/p>\n<p>The mobile and tablet market have been flooded by millions upon millions of Android based devices. I wonder if <a title=\"http:\/\/en.wikipedia.org\/wiki\/Unix\" href=\"http:\/\/en.wikipedia.org\/wiki\/Unix\" target=\"_blank\">Ken Thompson or Dennis Ritchie<\/a> would have ever imagined that their invention from\u00a0nearly\u00a044 years ago would have influenced the likes of the Linux kernel, \u00a0Google, Apple, and beyond. We are now in a sea of Unix-like devices that now can easily fit in individuals pockets, which have multiple core processing power and can easily access <a title=\"http:\/\/en.wikipedia.org\/wiki\/SCADA\" href=\"http:\/\/en.wikipedia.org\/wiki\/SCADA\" target=\"_blank\">SCADA<\/a> systems with a few keystrokes. \u00a0It has never been a better time for pocket sized penetration testing devices.<\/p>\n<p>In this article I will be covering ways that one can turn their Android based device into a powerful pocket sized penetration testing tool. If you&#8217;re looking to do wireless sniffing or packet injection with your Android based device, this article will be of little help. (If interested please see <a title=\"http:\/\/it.slashdot.org\/story\/13\/02\/28\/2012211\/rsa-the-pwn-pad-is-an-android-tablet-based-penetration-tester-video\" href=\"http:\/\/it.slashdot.org\/story\/13\/02\/28\/2012211\/rsa-the-pwn-pad-is-an-android-tablet-based-penetration-tester-video\" target=\"_blank\">this<\/a>, <a title=\"http:\/\/forum.xda-developers.com\/showthread.php?p=18713483\" href=\"http:\/\/forum.xda-developers.com\/showthread.php?p=18713483\" target=\"_blank\">this<\/a>, <a title=\"http:\/\/www.kismetwireless.net\/android-pcap\/\" href=\"http:\/\/www.kismetwireless.net\/android-pcap\/\" target=\"_blank\">this<\/a>, <a title=\"http:\/\/www.maxters.net\/2013\/02\/aircrack-suite-for-galaxy-note-2\/\" href=\"http:\/\/www.maxters.net\/2013\/02\/aircrack-suite-for-galaxy-note-2\/\" target=\"_blank\">this<\/a>, and <a title=\"http:\/\/forum.xda-developers.com\/showthread.php?t=1650817\" href=\"http:\/\/forum.xda-developers.com\/showthread.php?t=1650817\" target=\"_blank\">this<\/a>.) To do so, one needs a specific Android device that supports OTG, with a custom ROM, and you&#8217;ll most likely need an external USB wireless adapter. (Honestly, if you&#8217;re looking for a device for cracking WEP keys without any external USB wireless adapters, then I highly still recommend the Nokia N900.)<\/p>\n<p>(NOTE: If you&#8217;re strictly looking to do wireless sniffing, \u00a0there is <a title=\"https:\/\/play.google.com\/store\/apps\/details?id=net.kismetwireless.android.pcapcapture&amp;feature=search_result#?t=W251bGwsMSwyLDEsIm5ldC5raXNtZXR3aXJlbGVzcy5hbmRyb2lkLnBjYXBjYXB0dXJlIl0.\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=net.kismetwireless.android.pcapcapture&amp;feature=search_result#?t=W251bGwsMSwyLDEsIm5ldC5raXNtZXR3aXJlbGVzcy5hbmRyb2lkLnBjYXBjYXB0dXJlIl0.\" target=\"_blank\">AndroidPCAP<\/a> which I have tested with my Nexus 7 and a RTL8187 based wireless USB adapter.)<\/p>\n<p>Firstly, before progressing on towards the weaponizing of your Android device, please take the time to back up any vital information. Have a look at <a title=\"http:\/\/arstechnica.com\/gadgets\/2013\/04\/better-safe-than-sorry-five-backup-apps-to-consider-for-your-android-device\/\" href=\"http:\/\/arstechnica.com\/gadgets\/2013\/04\/better-safe-than-sorry-five-backup-apps-to-consider-for-your-android-device\/\" target=\"_blank\">this<\/a>. \u00a0Reason being, is that you&#8217;ll need to root your Android based device. Depending on your device and the method of rooting, rooting your device and unlocking the bootloader can wipe your device.<\/p>\n<p><strong><em>Setting up Kali Linux ARM Chroot on your rooted Android based device that has about 6GB of free space<\/em><\/strong><\/p>\n<p>1.) Install <a title=\"https:\/\/play.google.com\/store\/apps\/details?id=stericson.busybox&amp;feature=search_result#?t=W251bGwsMSwyLDEsInN0ZXJpY3Nvbi5idXN5Ym94Il0.\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=stericson.busybox&amp;feature=search_result#?t=W251bGwsMSwyLDEsInN0ZXJpY3Nvbi5idXN5Ym94Il0.\" target=\"_blank\">BusyBox<\/a><br \/>\n2.) Install <a title=\"https:\/\/play.google.com\/store\/apps\/details?id=jackpal.androidterm&amp;feature=search_result#?t=W251bGwsMSwxLDEsImphY2twYWwuYW5kcm9pZHRlcm0iXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=jackpal.androidterm&amp;feature=search_result#?t=W251bGwsMSwxLDEsImphY2twYWwuYW5kcm9pZHRlcm0iXQ..\" target=\"_blank\">Terminal Emulator<\/a><br \/>\n3.) I created a Kali Linux ARM IMG that one can easily mount and it can be downloaded here:<br \/>\n<a title=\"http:\/\/goo.gl\/qmGle\" href=\"http:\/\/goo.gl\/qmGle\" target=\"_blank\">http:\/\/goo.gl\/qmGle<\/a><br \/>\n<a title=\"https:\/\/archive.org\/details\/Kali.nogui.armel.zitstif.chroot.482013\" href=\"https:\/\/archive.org\/details\/Kali.nogui.armel.zitstif.chroot.482013\" target=\"_blank\">https:\/\/archive.org\/details\/Kali.nogui.armel.zitstif.chroot.482013<\/a><\/p>\n<p><a href=\"https:\/\/archive.org\/details\/Kali.nogui.armel.zitstif.chroot.482013\"><\/a><strong>kali.nogui.armel.zitstif.chroot.482013.7z<\/strong><\/p>\n<p>md5: d60c5a52bcea35834daecb860bd8a5c7<br \/>\nsha1: f62c2633d214de9edad1842c9209f443bcea385d<\/p>\n<p><strong>kali.img<\/strong><\/p>\n<p>MD5: be61799f8eb2d98ff8874daaf572a1d5<br \/>\nSHA-1: f9c6a820349530350bbb902d17ae6b4a5173937c<\/p>\n<p><em>NOTE: This image gives you about 2GB of free space in the environment to play with so use with care.<\/em><\/p>\n<p>4.) Extract the 7z file and make sure that there&#8217;s a folder in this following location: \/sdcard\/kali<br \/>\n5.) In this folder you should have shell script named &#8216;kali&#8217; and the &#8216;kali.img&#8217; image file.<br \/>\n6.) To mount the kali.img file as root do this: <em>sh \/sdcard\/kali\/kali<br \/>\n<\/em><em><br \/>\nOptional:<\/em> If you want Terminal Emulator to open up and go directly to the chroot environment do as follows:<br \/>\n1.) Open up Terminal Emulator<br \/>\n2.) Go to preferences<br \/>\n3.) Tap on Initial Command<br \/>\n4.) Enter this: <em>su -c &#8220;cd \/sdcard\/kali &amp;&amp; sh kali&#8221;<\/em><\/p>\n<p>Now if you tap on Terminal Emulator, you&#8217;ll go directly to your Kali chroot environment. If you want to leave the environment and back to the Android command line, simply type <em>exit.<\/em><\/p>\n<p><em>Optional: <\/em>If you want to access files from \/sdcard\/ from your Kali chroot envrionment, one way is to have an Openssh server on your Android device that listens on all interfaces. Then under your chroot envrionment do: <em>mkdir \/media\/sdcard\/ <\/em>and then connect to your ssh server on your loopback interface to store the ssh key. Then you could use a script like this in your chroot environment (or even edit your .bashrc file to run it automatically):<\/p>\n<p><a title=\"http:\/\/zitstif.no-ip.org\/mountsdcard.py\" href=\"http:\/\/zitstif.no-ip.org\/mountsdcard.py\" target=\"_blank\">http:\/\/zitstif.no-ip.org\/mountsdcard.py<\/a> #You&#8217;ll need to edit the username and password appropriately for your situation.<\/p>\n<p>I should warn you that this Kali image is not setup with the idea of using a window manager or really any GUI tools. In my humble opinion to take advantage of Kali Linux, you don&#8217;t need a GUI. Using the terminal to access tools like <em>nmap<\/em>, <em>netcat<\/em>, <em>w3af_console<\/em>, <em>sqlmap, xsser,<\/em> and <em>metasploit<\/em> will be sufficient to get one started on their penetration test.<\/p>\n<p>Once you&#8217;re in the Kali Linux chroot environment, please do the following:<\/p>\n<p><em>apt-get update &amp;&amp; apt-get upgrade<\/em> <em>&amp;&amp; msfupdate<\/em><\/p>\n<p>In addition to setting up the Kali Linux chroot environment, here are a list of other tools and a quick description of each that I recommend you to install:<\/p>\n<p><a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.tux.client&amp;hl=en\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.tux.client&amp;hl=en\" target=\"_blank\">2X Client<\/a> &#8211; Remote desktop client<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=lysesoft.andftp&amp;feature=search_result#?t=W251bGwsMSwyLDEsImx5c2Vzb2Z0LmFuZGZ0cCJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=lysesoft.andftp&amp;feature=search_result#?t=W251bGwsMSwyLDEsImx5c2Vzb2Z0LmFuZGZ0cCJd\" target=\"_blank\">AndFTP<\/a> &#8211; ftp\/sftp client<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=android.androidVNC&amp;feature=search_result#?t=W251bGwsMSwyLDEsImFuZHJvaWQuYW5kcm9pZFZOQyJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=android.androidVNC&amp;feature=search_result#?t=W251bGwsMSwyLDEsImFuZHJvaWQuYW5kcm9pZFZOQyJd\" target=\"_blank\">androidVNC<\/a> &#8211; vnc viewer client<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=lysesoft.andsmb&amp;feature=search_result#?t=W251bGwsMSwxLDEsImx5c2Vzb2Z0LmFuZHNtYiJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=lysesoft.andsmb&amp;feature=search_result#?t=W251bGwsMSwxLDEsImx5c2Vzb2Z0LmFuZHNtYiJd\" target=\"_blank\">AndSMB<\/a> &#8211; Android Samba client<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.anytag.android&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5hbnl0YWcuYW5kcm9pZCJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.anytag.android&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5hbnl0YWcuYW5kcm9pZCJd\" target=\"_blank\">AnyTAG NFC Launcher<\/a> &#8211; Automate your phone by scanning NFC tags<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=org.thialfihar.android.apg&amp;feature=nav_result#?t=W251bGwsMSwyLDNd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.thialfihar.android.apg&amp;feature=nav_result#?t=W251bGwsMSwyLDNd\" target=\"_blank\">APG<\/a> &#8211; OpenGPG for Android<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.samj.CardTest&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5zYW1qLkNhcmRUZXN0Il0.\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.samj.CardTest&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5zYW1qLkNhcmRUZXN0Il0.\" target=\"_blank\">CardTest<\/a> &#8211; \u00a0Test your NFC enabled credit cards<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.o3tech.tools&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5vM3RlY2gudG9vbHMiXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.o3tech.tools&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5vM3RlY2gudG9vbHMiXQ..\" target=\"_blank\">Checksum<\/a> &#8211; \u00a0basically a GUI tool for md5sum and shasum tools<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=org.connectbot&amp;feature=nav_result#?t=W251bGwsMSwyLDNd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.connectbot&amp;feature=nav_result#?t=W251bGwsMSwyLDNd\" target=\"_blank\">ConnectBot<\/a> &#8211; powerful ssh client<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.kodholken.dnslookup&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5rb2Rob2xrZW4uZG5zbG9va3VwIl0.\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.kodholken.dnslookup&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5rb2Rob2xrZW4uZG5zbG9va3VwIl0.\" target=\"_blank\">DNS Lookup<\/a> &#8211; perform DNS and WHOIS lookups<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=mobi.mgeek.TunnyBrowser&amp;feature=search_result#?t=W251bGwsMSwxLDEsIm1vYmkubWdlZWsuVHVubnlCcm93c2VyIl0.\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=mobi.mgeek.TunnyBrowser&amp;feature=search_result#?t=W251bGwsMSwxLDEsIm1vYmkubWdlZWsuVHVubnlCcm93c2VyIl0.\" target=\"_blank\">Dolphin Browser<\/a> &#8211; a browser that easily allows you to change your UserAgent<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=net.edgard.droidsqli&amp;feature=search_result#?t=W251bGwsMSwyLDEsIm5ldC5lZGdhcmQuZHJvaWRzcWxpIl0.\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=net.edgard.droidsqli&amp;feature=search_result#?t=W251bGwsMSwyLDEsIm5ldC5lZGdhcmQuZHJvaWRzcWxpIl0.\" target=\"_blank\">DroidSQLi<\/a> &#8211; automated MySQL injection tool<br \/>\n<a title=\"http:\/\/www.dsploit.net\/\" href=\"http:\/\/www.dsploit.net\/\" target=\"_blank\">dSploit<\/a> &#8211; Android Network Penetration Suite<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.idstronghold.CCReaderMkt&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5pZHN0cm9uZ2hvbGQuQ0NSZWFkZXJNa3QiXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.idstronghold.CCReaderMkt&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5pZHN0cm9uZ2hvbGQuQ0NSZWFkZXJNa3QiXQ..\" target=\"_blank\">Electronic Pickpocket<\/a> &#8211; \u00a0wirelessly read NFC enabled cards<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.mikufu_works.exifviewer&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5taWt1ZnVfd29ya3MuZXhpZnZpZXdlciJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.mikufu_works.exifviewer&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5taWt1ZnVfd29ya3MuZXhpZnZpZXdlciJd\" target=\"_blank\">Exif Viewer<\/a> &#8211; shows exif data from photos and can remove this information<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.taxaly.noteme&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS50YXhhbHkubm90ZW1lIl0.\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.taxaly.noteme&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS50YXhhbHkubm90ZW1lIl0.\" target=\"_blank\">Fast notepad<\/a> &#8211; simple but useful notepad application<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.ahadjittofis.routerinspect&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5haGFkaml0dG9maXMucm91dGVyaW5zcGVjdCJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.ahadjittofis.routerinspect&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5haGFkaml0dG9maXMucm91dGVyaW5zcGVjdCJd\" target=\"_blank\">Find My Router&#8217;s Password<\/a> &#8211; title explains it all (mostly for default passwords)<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.overlook.android.fing&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5vdmVybG9vay5hbmRyb2lkLmZpbmciXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.overlook.android.fing&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5vdmVybG9vay5hbmRyb2lkLmZpbmciXQ..\" target=\"_blank\">Fing<\/a> &#8211; very similar to Look@LAN tool for Windows<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.s0up.goomanager&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5zMHVwLmdvb21hbmFnZXIiXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.s0up.goomanager&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5zMHVwLmdvb21hbmFnZXIiXQ..\" target=\"_blank\">Goomanager<\/a> &#8211; \u00a0see link for more information<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=org.pocketworkstation.pckeyboard&amp;feature=search_result#?t=W251bGwsMSwxLDEsIm9yZy5wb2NrZXR3b3Jrc3RhdGlvbi5wY2tleWJvYXJkIl0.\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.pocketworkstation.pckeyboard&amp;feature=search_result#?t=W251bGwsMSwxLDEsIm9yZy5wb2NrZXR3b3Jrc3RhdGlvbi5wY2tleWJvYXJkIl0.\" target=\"_blank\">Hacker&#8217;s Keyboard<\/a> &#8211; \u00a0Miss the easily accessible CTRL key? This app is for you<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=byrne.utilities.hashpass&amp;feature=search_result#?t=W251bGwsMSwyLDEsImJ5cm5lLnV0aWxpdGllcy5oYXNocGFzcyJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=byrne.utilities.hashpass&amp;feature=search_result#?t=W251bGwsMSwyLDEsImJ5cm5lLnV0aWxpdGllcy5oYXNocGFzcyJd\" target=\"_blank\">HashPass<\/a> &#8211; translate text into hashes<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=tuba.tools&amp;feature=search_result#?t=W251bGwsMSwyLDEsInR1YmEudG9vbHMiXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=tuba.tools&amp;feature=search_result#?t=W251bGwsMSwyLDEsInR1YmEudG9vbHMiXQ..\" target=\"_blank\">Hex Editor<\/a> &#8211; \u00a0a very usable hex editor for Android<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=net.metageek&amp;feature=search_result#?t=W251bGwsMSwxLDEsIm5ldC5tZXRhZ2VlayJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=net.metageek&amp;feature=search_result#?t=W251bGwsMSwxLDEsIm5ldC5tZXRhZ2VlayJd\" target=\"_blank\">inSSIDer<\/a> &#8211; wireless network scanner<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=su.sniff.cepter&amp;feature=search_result#?t=W251bGwsMSwyLDEsInN1LnNuaWZmLmNlcHRlciJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=su.sniff.cepter&amp;feature=search_result#?t=W251bGwsMSwyLDEsInN1LnNuaWZmLmNlcHRlciJd\" target=\"_blank\">intercepter-NG<\/a> &#8211; multi-function network tool, sniffer, cookie intercepter, arp poisoner<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.rsoftr.android.ipinfodetective&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5yc29mdHIuYW5kcm9pZC5pcGluZm9kZXRlY3RpdmUiXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.rsoftr.android.ipinfodetective&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5yc29mdHIuYW5kcm9pZC5pcGluZm9kZXRlY3RpdmUiXQ..\" target=\"_blank\">IP info Detective <\/a>&#8211; find out all sorts of info on an IP address<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.pas.webcam&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5wYXMud2ViY2FtIl0.\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.pas.webcam&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5wYXMud2ViY2FtIl0.\" target=\"_blank\">IP Webcam<\/a> &#8211; turn your Android device into an IP security camera<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=de.android.telnet&amp;feature=search_result#?t=W251bGwsMSwxLDEsImRlLmFuZHJvaWQudGVsbmV0Il0.\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=de.android.telnet&amp;feature=search_result#?t=W251bGwsMSwxLDEsImRlLmFuZHJvaWQudGVsbmV0Il0.\" target=\"_blank\">Network Signal Info<\/a> &#8211; basically a graphical tool for iwconfig<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=se.anyro.nfc_reader&amp;feature=search_result#?t=W251bGwsMSwxLDEsInNlLmFueXJvLm5mY19yZWFkZXIiXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=se.anyro.nfc_reader&amp;feature=search_result#?t=W251bGwsMSwxLDEsInNlLmFueXJvLm5mY19yZWFkZXIiXQ..\" target=\"_blank\">NFC Reader<\/a> &#8211; used for reading various NFC technologies including some keycards<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.widgapp.NFC_ReTAG_FREE&amp;feature=nav_result#?t=W251bGwsMSwyLDNd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.widgapp.NFC_ReTAG_FREE&amp;feature=nav_result#?t=W251bGwsMSwyLDNd\" target=\"_blank\">NFC ReTAG<\/a> &#8211; Re-use\/recycle write protected NFC Tags such as hotel key-cards, access badges, etc<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=at.mroland.android.apps.nfctaginfo&amp;feature=search_result#?t=W251bGwsMSwyLDEsImF0Lm1yb2xhbmQuYW5kcm9pZC5hcHBzLm5mY3RhZ2luZm8iXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=at.mroland.android.apps.nfctaginfo&amp;feature=search_result#?t=W251bGwsMSwyLDEsImF0Lm1yb2xhbmQuYW5kcm9pZC5hcHBzLm5mY3RhZ2luZm8iXQ..\" target=\"_blank\">NFC TagInfo<\/a> -another NFC reader<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=net.openvpn.openvpn&amp;feature=search_result#?t=W251bGwsMSwyLDEsIm5ldC5vcGVudnBuLm9wZW52cG4iXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=net.openvpn.openvpn&amp;feature=search_result#?t=W251bGwsMSwyLDEsIm5ldC5vcGVudnBuLm9wZW52cG4iXQ..\" target=\"_blank\">OpenVPN Connect<\/a> &#8211; open vpn client<br \/>\n<a title=\"https:\/\/play.google.com\/store\/search?q=Orbot&amp;c=apps\" href=\"https:\/\/play.google.com\/store\/search?q=Orbot&amp;c=apps\" target=\"_blank\">Orbot<\/a> &#8211; tor on Android<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=ot.semba.packetinjection&amp;feature=search_result#?t=W251bGwsMSwxLDEsIm90LnNlbWJhLnBhY2tldGluamVjdGlvbiJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ot.semba.packetinjection&amp;feature=search_result#?t=W251bGwsMSwxLDEsIm90LnNlbWJhLnBhY2tldGluamVjdGlvbiJd\" target=\"_blank\">Packet Injection<\/a> &#8211; poorman&#8217;s GUI version of <a title=\"http:\/\/www.secdev.org\/projects\/scapy\/\" href=\"http:\/\/www.secdev.org\/projects\/scapy\/\" target=\"_blank\">scapy<br \/>\n<\/a><a title=\"https:\/\/play.google.com\/store\/apps\/details?id=org.proxydroid&amp;feature=search_result#?t=W251bGwsMSwxLDEsIm9yZy5wcm94eWRyb2lkIl0.\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.proxydroid&amp;feature=search_result#?t=W251bGwsMSwxLDEsIm9yZy5wcm94eWRyb2lkIl0.\" target=\"_blank\">ProxyDroid<\/a> &#8211; use your socks5 proxy with this application<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.jrummy.root.browserfree&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5qcnVtbXkucm9vdC5icm93c2VyZnJlZSJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.jrummy.root.browserfree&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5qcnVtbXkucm9vdC5icm93c2VyZnJlZSJd\" target=\"_blank\">Root Browser<\/a> &#8211; great file manager for Android<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=websec.routerpwn&amp;feature=search_result#?t=W251bGwsMSwyLDEsIndlYnNlYy5yb3V0ZXJwd24iXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=websec.routerpwn&amp;feature=search_result#?t=W251bGwsMSwyLDEsIndlYnNlYy5yb3V0ZXJwd24iXQ..\" target=\"_blank\">Routerpwn<\/a> &#8211; test how secure your router is<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=org.sandroproxy&amp;feature=search_result#?t=W251bGwsMSwyLDEsIm9yZy5zYW5kcm9wcm94eSJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.sandroproxy&amp;feature=search_result#?t=W251bGwsMSwyLDEsIm9yZy5zYW5kcm9wcm94eSJd\" target=\"_blank\">SandroProxy<\/a> &#8211; kind of like Webscarab<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=steganodroid.iu&amp;feature=search_result#?t=W251bGwsMSwxLDEsInN0ZWdhbm9kcm9pZC5pdSJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=steganodroid.iu&amp;feature=search_result#?t=W251bGwsMSwxLDEsInN0ZWdhbm9kcm9pZC5pdSJd\" target=\"_blank\">Secret Letter<\/a> &#8211; a \u00a0poorman&#8217;s stegonagraphy tool<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=berserker.android.apps.sshdroid&amp;feature=search_result#?t=W251bGwsMSwxLDEsImJlcnNlcmtlci5hbmRyb2lkLmFwcHMuc3NoZHJvaWQiXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=berserker.android.apps.sshdroid&amp;feature=search_result#?t=W251bGwsMSwxLDEsImJlcnNlcmtlci5hbmRyb2lkLmFwcHMuc3NoZHJvaWQiXQ..\" target=\"_blank\">SSHDroid<\/a> &#8211; openssh server for android<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=eu.chainfire.supersu&amp;feature=search_result#?t=W251bGwsMSwxLDEsImV1LmNoYWluZmlyZS5zdXBlcnN1Il0.\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=eu.chainfire.supersu&amp;feature=search_result#?t=W251bGwsMSwxLDEsImV1LmNoYWluZmlyZS5zdXBlcnN1Il0.\" target=\"_blank\">Supersu<\/a> &#8211; manage what programs access root functions<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.teamviewer.teamviewer.market.mobile&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS50ZWFtdmlld2VyLnRlYW12aWV3ZXIubWFya2V0Lm1vYmlsZSJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.teamviewer.teamviewer.market.mobile&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS50ZWFtdmlld2VyLnRlYW12aWV3ZXIubWFya2V0Lm1vYmlsZSJd\" target=\"_blank\">Teamviewer<\/a> &#8211; remotely control Windows, OSX, and Linux based systems<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=jackpal.androidterm&amp;feature=search_result#?t=W251bGwsMSwxLDEsImphY2twYWwuYW5kcm9pZHRlcm0iXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=jackpal.androidterm&amp;feature=search_result#?t=W251bGwsMSwxLDEsImphY2twYWwuYW5kcm9pZHRlcm0iXQ..\" target=\"_blank\">Terminal Emulator<\/a> &#8211; no explanation needed<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=jp.co.taosoftware.android.packetcapture&amp;feature=search_result#?t=W251bGwsMSwxLDEsImpwLmNvLnRhb3NvZnR3YXJlLmFuZHJvaWQucGFja2V0Y2FwdHVyZSJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=jp.co.taosoftware.android.packetcapture&amp;feature=search_result#?t=W251bGwsMSwxLDEsImpwLmNvLnRhb3NvZnR3YXJlLmFuZHJvaWQucGFja2V0Y2FwdHVyZSJd\" target=\"_blank\">tPacketCapture <\/a>&#8211; packet sniffer that doesn&#8217;t require root<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=by.nvs.vtuploader&amp;feature=search_result#?t=W251bGwsMSwxLDEsImJ5Lm52cy52dHVwbG9hZGVyIl0.\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=by.nvs.vtuploader&amp;feature=search_result#?t=W251bGwsMSwxLDEsImJ5Lm52cy52dHVwbG9hZGVyIl0.\" target=\"_blank\">VirusTotal Uploader<\/a> &#8211; test your malicious payloads<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=org.projectvoodoo.otarootkeeper&amp;feature=search_result#?t=W251bGwsMSwyLDEsIm9yZy5wcm9qZWN0dm9vZG9vLm90YXJvb3RrZWVwZXIiXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.projectvoodoo.otarootkeeper&amp;feature=search_result#?t=W251bGwsMSwyLDEsIm9yZy5wcm9qZWN0dm9vZG9vLm90YXJvb3RrZWVwZXIiXQ..\" target=\"_blank\">Voodoo OTA RootKeeper<\/a> &#8211; maintain root access even after updates<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.smarterdroid.wififiletransfer&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5zbWFydGVyZHJvaWQud2lmaWZpbGV0cmFuc2ZlciJd\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.smarterdroid.wififiletransfer&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5zbWFydGVyZHJvaWQud2lmaWZpbGV0cmFuc2ZlciJd\" target=\"_blank\"> Wifi File Transfer<\/a> &#8211; access files on your phone from a web browser via an http server<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=com.jiwire.android.finder&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5qaXdpcmUuYW5kcm9pZC5maW5kZXIiXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.jiwire.android.finder&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5qaXdpcmUuYW5kcm9pZC5maW5kZXIiXQ..\" target=\"_blank\"> WifiFinder<\/a> &#8211; simple wireless scanner<br \/>\n<a title=\"https:\/\/play.google.com\/store\/apps\/details?id=net.wigle.wigleandroid&amp;feature=search_result#?t=W251bGwsMSwyLDEsIm5ldC53aWdsZS53aWdsZWFuZHJvaWQiXQ..\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=net.wigle.wigleandroid&amp;feature=search_result#?t=W251bGwsMSwyLDEsIm5ldC53aWdsZS53aWdsZWFuZHJvaWQiXQ..\" target=\"_blank\"> WiGLE Wifi wardriving <\/a>&#8211; wardriving\/warwalking application<\/p>\n<p>Of course this is probably not complete, but I believe this is a very good suite of tools to get one started. If you can think of any more tools or if you have any suggestions, please feel free to leave a comment below.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>(4\/16\/2015) &#8211; NOTE: THIS SOLUTION HAS BEEN KIND OF SUPERSEDED BY https:\/\/www.kali.org\/kali-linux-nethunter\/ , if nethunter doesn&#8217;t work for you then continue on with this post: The mobile and tablet market have been flooded by millions upon millions of Android based devices. I wonder if Ken Thompson or Dennis Ritchie would have ever imagined that their &hellip; <a href=\"http:\/\/zitstif.no-ip.org\/?p=811\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Steps Toward Weaponizing the Android Platform<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[653,601,654,649,85,646,652,9,604,645,643,644,642,650,41,656,26,640,391,254,651,232,657,647,648,655],"class_list":["post-811","post","type-post","status-publish","format-standard","hentry","category-posts","tag-android-monitor-mode","tag-android-packet-injection","tag-android-wireless-sniffing","tag-androidpcap","tag-apple","tag-backtrack-6","tag-dennis-ritchie","tag-google","tag-google-play","tag-kali-arm","tag-kali-chroot","tag-kali-chroot-on-android","tag-kali-on-android","tag-ken","tag-linux","tag-metasploit-on-android","tag-netcat","tag-nexus-7","tag-nmap","tag-scada","tag-thompson","tag-usb","tag-w3af_onsole-on-android","tag-weaponizing-android","tag-weaponizing-the-android-platform","tag-xsser-on-android"],"_links":{"self":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=811"}],"version-history":[{"count":59,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/811\/revisions"}],"predecessor-version":[{"id":861,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/811\/revisions\/861"}],"wp:attachment":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=811"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}