Converting Your Android Smartphone into Penetration Testing Device

https://gbhackers.com/use-android-penetration-testing/

Huge corporations attempting to enhance the user experience by making whatever around streamline, increasing performance and connections with “IoTs”. Today with the Android os installed on the most robust mobile phones, we have their weaknesses and strengths.

A Linux system, have their approvals and limitations. The user that makes the “Root” on the mobile device, will have complete access to the system from view, modify and delete files and folders from the Android system and even install tools of various functions.

In this short article, I will introduce to you how simple it is to have a smart device with pentest tools and carrying out network scan, wireless scan, sniffer, Vulnerability Scanner and others.

Preparing Android Smartphone for Penetration Testing

As soon as the application sets up, we will have to do the “Root” mode to have full access to the Android system. We can install the pentest and monitoring tools.

Let us start preparing your smartphone to carry out the invasion test. By Google Play itself, we have 2 apps (paid and totally free) to have the Android system bash terminal.

Apt-get is an effective bundle management system that is utilized to work with Ubuntus APT (Advanced Packaging Tool) library to perform the installation of brand-new software application plans, eliminating existing software plans, updating of existing software plans.

Placing the Kali Linux repository link and updating the list

Apt-get is a powerful bundle management system that is used to work with Ubuntus APT (Advanced Packaging Tool) library to carry out the installation of brand-new software bundles, getting rid of existing software packages, upgrading of existing software plans.

We will use Linux repositories circulations for pentest, in this example, I am utilizing the Kali Linux distro. As soon as we do the “apt-get upgrade” command, we will have reliable fonts tools.

Likewise Read Android Application pentest Checklist

Tools that we Get after Updating List

NMAP: Security Scanner, Port Scanner, & & Network Exploration Tool.

Bettercap: Powerful tool to carry out MITM Attacks

Fake page after the apache tests.

All the Content of this Article Belongs to above Original Author. The abuse of the information in this site can result in criminal charges brought against the persons in concern.

Place Command Insert Command # service apache2 start && & &/ usr/share/setoolkit/ setoolkit.

Capture login of Router.

We got the Gmail login.

With the weakest link of info security being the USER, he will constantly undergo attacks and even without understanding that the Web Site digital certificate will be altered to that of the enemy doing the MITM attack.

We verify that the apache service is working correctly.

Command # nmap 192.168.0.0/ 24.

In addition to HTTP, we likewise obtain the HTTPS however will not be covered in this short article.

Once the victim inserts their credentials on the fake page, he will be redirected to the Google page without realizing it was “hacked.” In this, his credentials were captured and inserted into a plain text file for much better viewing. Resulting in the loss of login, the cracker can access your e-mails and files silently.

BORBOLLA, Renato Basante Born in São Paulo, Brazil. He is A Network Administrator, Pen Tester, Security and Computer Forensics consultant.

We will test the “NMAP” tool initially on the network where the smartphone is linked.

Insert Command # bettercap– sniffer.

Lets begin the “sniffer” at the network to find crucial credentials at applications that are not using encryption to interact. Let us do a test with the “bettercap” tool.

The experiment described in this short article has a study purpose. Evaluated on any smartphone with Android system and no attack was performed on external sites. Weve looked at the common vulnerabilities associated with hacking.

Disclaimer.

Connecting C&C Cloud.

Setoolkit.

Original Source & & Credits.

All the Content of this Article Belongs to above Original Author. Tested on any smartphone with Android system and no attack was carried out on external sites.

References.

Inspecting Apache and fake page.

https://www.kali.orghttps://nmap.orghttps://www.bettercap.orghttps://github.com/trustedsec/social-engineer-toolkithttps://docs.kali.org/general-use/kali-linux-sources-list-repositorieshttps://play.google.com/store/apps/details?id=com.termux.

We might not utilize the smartphone 100% like a laptop computer with thousands of intrusion tools; of course, we will have numerous restrictions because it is a smartphone. Nevertheless, naturally, we can utilize the mobile in bridge mode, as called “Pivoting”.

We got the login qualifications at gain access to router.

You can use a VPS as a command control and utilize rotating on android to perform pentest.

NMAP

As quickly as we change the test page from apache and leave the phony Google page for this test, we will insert the email and password to ensure that the attack works.

bettercap.

Checking if the apache server is Running on another smart device.

Another Spoofing approach, utilizing tools to perform this strategy and getting Apache2 on Android, we can place a malicious page so that the user can place their login credentials on the page and thus get to it.

Once the victim inserts their credentials on the fake page, he will be rerouted to the Google page without understanding it was “hacked.” In this, his qualifications were captured and inserted into a plain text file for much better viewing. Resulting in the loss of login, the cracker can access your files and emails silently.

With NMAP set up, we have several ways to scan the network and test some services that are on servers. At this simple laboratory, we performed a network scan and identified two network assets (however with no vulnerable service to attack).

Sniffer Network.

Setoolkit: Allows to carry out many Social Engineering Activities.

The “Author” and “www.gbhackers.com” will not be called to account in case any criminal charges be brought versus any individuals misusing the details in this website to break the law. Reproduce This Content Without Permission is Strictly Prohibited.