Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ideas #229

Closed
ETeissonniere opened this issue Sep 4, 2015 · 85 comments
Closed

Ideas #229

ETeissonniere opened this issue Sep 4, 2015 · 85 comments

Comments

@ETeissonniere
Copy link
Member

Hello guys, I opened that issue so you will be able to share some ideas concerning cSploit.
Here is mine (working on it if @tux-mind thinks it clan be good):

  • bluetooth hacking
  • geo traceroute
  • social engineering menu
    ... And a lot more
@Rubenoo
Copy link
Contributor

Rubenoo commented Sep 4, 2015

Dayum if that could be in csploit. ... dayum

@tajnymag
Copy link
Contributor

tajnymag commented Sep 4, 2015

  • wifi cracking using USB card (workaround for any driver issue)
  • on-device compiling of the newest cSploit code
  • Router Keygen integration (the same range of supported routers)
  • quick test for default credentials used in selected router's administration page
  • automatic reporting of crashes and errors (combined with some simple on-server averiging)
  • slightly more material design, colored navbar and staturbar, maybe use of a side-panel
  • tabbed interface -> multiple attacks/scans at once

@ETeissonniere
Copy link
Member Author

I can enable wifi cracking but it will need a patched android kernel..
To compile you can use the AIDE app.
I do not know what dayum is
Le 4 sept. 2015 17:26, "Tajnymag" notifications@github.com a écrit :

  • wifi cracking using USB card (workaround for any driver issue)
  • on-device compiling of the newest cSploit code
  • Router Keygen integration (the same range of supported routers)
  • quick test for default credentials used in selected router's
    administration page
  • automatic reporting of crashes and errors (combined with some simple
    on-server averiging)


Reply to this email directly or view it on GitHub
#229 (comment).

@DomenlDruga
Copy link

By patching the android kernel you mean the mac80211 injection patch? Because Kali NetHunter has a guide on doing just that, so that everyone can patch and configure their own kernels.
Integration wit Router Keygen seems kind of pointless, as modern devices have enough resources to switch between two apps. Some automation could be implemented, but will only cause issues in the long run.
The default credentials and tabbed interface would be very usefull.
"Dayum" is the over-pronounciation of "Damn".

@ETeissonniere
Copy link
Member Author

@DomenlDruga, yeah, I was speaking about that patch, then thanks for the
translation 😄
Le 5 sept. 2015 10:13, "DomenlDruga" notifications@github.com a écrit :

By patching the android kernel you mean the mac80211 injection patch?
Because Kali NetHunter has a guide
https://github.com/offensive-security/kali-nethunter/wiki/Modifying-the-Kernel
on doing just that, so that everyone can patch and configure their own
kernels.
Integration wit Router Keygen seems kind of pointless, as modern devices
have enough resources to switch between two apps. Some automation could be
implemented, but will only cause issues in the long run.
The default credentials and tabbed interface would be very usefull.
"Dayum" is the over-pronounciation of "Damn".


Reply to this email directly or view it on GitHub
#229 (comment).

@MuradMathematics
Copy link

Metasploit Extra Console for Testing MSF Features, that arent currently included in the app. This could help to use exploits before they are even implented, and would help in research to make csploit features bigger.

But this is just optional. The main thing I want to get with this is: More features

Of course.

@gustavo-iniguez-goya
Copy link
Contributor

Hi,

  • I´d like to have a complete suite for domain/subdomain analysis/discovery. Using dnsmap, dnsenum, fierce, whois, google (well, search.disconnect.me), etc... I think it would be easy to implement.
  • dns spoofing using ettercap: I have it already implemented and working.

Anyway, I´m not sure if it happens only on my mobile (htc bravo 4.4.4), but there are a lot of problems with the latest apk/sources.

For name a few:

  • login cracker not working (hydra segfault). This binary works fine: http://forum.xda-developers.com/showthread.php?t=2064605 but someone should compile the binary from the sources.
  • passwordSniffer not intercepting SSL traffic (disabled by code: I´ve enabled it but the HTTPSredirector throws several SSLException when intercepting connections). Does anyone know why is it disabled? We could just use the ettercap plugin sslstrip, but it throws and error complaining about a cookie regex.
  • network subnet does not always appear on the network list
  • if when stopping the sniffer it exits with signal 11, cSploit displays an error and exits. I think it should not exit from cSploit, since the sniffer has already died and you can launch it again.

Has anyone seen these problems? I think I could fix some of them.

@ETeissonniere
Copy link
Member Author

@ga, I think we could try something like an OSINT tool.
Now some news: I found android pcap, an app which allow you to have a
kismet like tool with an external wifi card (without root), I will try to
use the sources for wifi cracking functionnality
Le 8 sept. 2015 12:04, "ga" notifications@github.com a écrit :

Hi,

  • I´d like to have a complete suite for domain/subdomain
    analysis/discovery. Using dnsmap, dnsenum, fierce, whois, google (well,
    search.disconnect.me), etc... I think it would be easy to implement.
  • dns spoofing using ettercap: I have it already implemented and
    working.

Anyway, I´m not sure if it happens only on my mobile (htc bravo 4.4.4),
but there are a lot of problems with the latest apk/sources.

For name a few:

  • login cracker not working (hydra segfault). This binary works fine:
    http://forum.xda-developers.com/showthread.php?t=2064605 but someone
    should compile the binary from the sources.
  • passwordSniffer not intercepting SSL traffic (disabled by code: I´ve
    enabled it but the HTTPSredirector throws several SSLException when
    intercepting connections). Does anyone know why is it disabled? We could
    just use the ettercap plugin sslstrip, but it throws and error complaining
    about a cookie regex.
  • network subnet does not always appear on the network list
  • if when stopping the sniffer it exits with signal 11, cSploit
    displays an error and exits. I think it should not exit from cSploit, since
    the sniffer has already died and you can launch it again.

Has anyone seen these problems? I think I could fix some of them.


Reply to this email directly or view it on GitHub
#229 (comment).

@fat-tire
Copy link
Contributor

fat-tire commented Sep 8, 2015

Funny you should mention android-pcap. I was just playing with it yesterday, got it building w/gradle + the new tools in Android Studio. FWIW, the play store listing says that it's GPL, but I didn't see a notice about what version in the actual source code.

Anyway, right now it only supports a few usb network adapters specifically the rtl8187 card. More specifically:

  • Alfa AWUS036H, LevelOne WNC-0301USB v5, LevelOne WNC-0305USB (0x0bda:0x8187)
  • AirLive WL-1600USB (0x1b75:0x8187)
  • NETGEAR WG111v2 (0x0846:0x6a00)
  • NETGEAR WG111v3 (0x0846:0x4260)

Unfortunately I don't have one of these :/ But anyway, to build with android studio and the newest SDK, you just need to change a few things:

  1. in src/net/kismetwireless/android/pcapcapture/PcapService.java use a NotificationCompat.Builder instead of the deprecated notification.setLatestEventInfo().
  2. use this build.gradle. I cleaned it up (took out signingConfigs section just because I didn't have a key to point to) slightly from what I was using to build, but it should work w/o much effort.
  3. remove libs/android-support-v4.jar
  4. remove the versionCode/versionName and uses-sdk lines in AndroidManifest.xml

It would be nice to see support for other chipsets in there, but would have to create more UsbSource.java-type classes for each one, and they're not small. But I haven't looked into it or more than 3 minutes.

If anyone can get Kismet Wireless to post which version of the GPL this uses, that would be great. Their other tools, particularly the cloudshark uploader, look interesting too.

ft

@ETeissonniere
Copy link
Member Author

@Fattire thanks, will have a look.
@tux-mind I will start working on all of that if you agree.
Le 8 sept. 2015 17:47, "Fattire" notifications@github.com a écrit :

Funny you should mention android-pcap
https://kismetwireless.net/gitweb/?p=android-pcap.git;a=summary. I was
just playing with it yesterday, got it building w/gradle + the new tools in
Android Studio. FWIW, the play store listing
https://play.google.com/store/apps/details?id=net.kismetwireless.android.pcapcapture
says that it's GPL, but I didn't see a notice about what version in the
actual source code.

Anyway, right now it only supports a few usb network adapters
https://kismetwireless.net/gitweb/?p=android-pcap.git;a=blob;f=src/net/kismetwireless/android/pcapcapture/Rtl8187Card.java;h=b8e1a44bb3a32376876ae1ff169634d1355ad568;hb=HEAD
specifically the rtl8187 card. More specifically:

  • Alfa AWUS036H, LevelOne WNC-0301USB v5, LevelOne WNC-0305USB
    (0x0bda:0x8187)
  • AirLive WL-1600USB (0x1b75:0x8187)
  • NETGEAR WG111v2 (0x0846:0x6a00)
  • NETGEAR WG111v3 (0x0846:0x4260)

Unfortunately I don't have one of these :/ But anyway, to build with
android studio and the newest SDK, you just need to change a few things:

in src/net/kismetwireless/android/pcapcapture/PcapService.java
https://kismetwireless.net/gitweb/?p=android-pcap.git;a=blob;f=src/net/kismetwireless/android/pcapcapture/PcapService.java;h=9416200b7a087c4422587e1e21489152ca8a6ce8;hb=HEAD
use a NotificationCompat.Builder instead of the deprecated
notification.setLatestEventInfo().
2.

use this build.gradle
https://gist.github.com/fat-tire/8f2546e623e019c7513d. I cleaned it
up (took out signingConfigs section just because I didn't have a key to
point to) slightly from what I was using to build, but it should work w/o
much effort.
3.

remove libs/android-support-v4.jar
4.

remove the versionCode/versionName and uses-sdk lines in
AndroidManifest.xml

It would be nice to see support for other chipsets in there, but would
have to create more UsbSource.java-type classes for each one, and they're
not small. But I haven't looked into it or more than 3 minutes.

If anyone can get Kismet Wireless to post which version of the GPL this
uses, that would be great. Their other tools
https://play.google.com/store/apps/developer?id=Kismet+Wireless,
particularly the cloudshark uploader, look interesting too.

ft


Reply to this email directly or view it on GitHub
#229 (comment).

@sorano
Copy link

sorano commented Sep 9, 2015

My idea is to have cSploit able to run also on a LAN interface.
For example on my nethunter pad I have USB OTG cable connected to an USB LAN interface. Currently I can only use csploit with WLAN.

@onelouder6
Copy link

Is it possible to implement a WPA2-PSK hash sniffer?
The script would forcefully disconnect clients and then monitor the traffic for the handshake (which can later be cracked using PC). Thoughts ?

@ETeissonniere
Copy link
Member Author

I might try...
For the moment, I am trying to add wifi external cards functionnality, and
optimize the app.
Le 10 sept. 2015 18:49, "NoBody112" notifications@github.com a écrit :

Is it possible to implement a WPA2-PSK hash sniffer?
The script would forcefully disconnect clients and then monitor the
traffic for the handshake (which can later be cracked using PC). Thoughts ?


Reply to this email directly or view it on GitHub
#229 (comment).

@gustavo-iniguez-goya
Copy link
Contributor

@sorano, would you mind to add a new issue with your suggestion? I've got a patch which allows you to select a configured network interface, in case of no wireless interface available. I've tested it with just the mobile gms interface, and works fine.

Right now cSploit relies a lot on the wireless dhcp information to work properly, so for example, if you configure the mobile to work as hostspot, the dhcp information is not available and we can not use cSploit. From the command line ettercap works perfectly on this case.

@sorano
Copy link

sorano commented Sep 13, 2015

@gainan Done. #240

I love the idea of running cSploit on the GSM interface.

@ETeissonniere
Copy link
Member Author

@gainan, good, maybe you can do a pull request....

@Duartebm
Copy link

There should really be a HID (human interface device) attack so you could connect your cellphone on a pc and it would be detected as a keyboard and start typing programmed commands, just like Net Hunter (kali linux for android) and USB Rubber Ducky from Hak5.
But I guess it would need to be able to do kernel changes for that... but anyways I think it would be possible to make some kind of automatic hack for when the cellphone is connected to a computer via USB (I remember there was an app that if I'm not wrong would automatically extract all saved passwords in a computer).
Anyways, you understand my point, something that would work on USB :D .

@tajnymag
Copy link
Contributor

How about quicker merging of pull requests? There are even some from February :D

@ETeissonniere
Copy link
Member Author

Just to say that I am working on:

  • a modern ui
  • a lighter app (less lib), so it will be easier to compile
  • adding RouterKeygen because it really impressed me
    Will pull something as soon as possible.
    Le 15 sept. 2015 18:19, "Tajnymag" notifications@github.com a écrit :

How about quicker merging of pull requests? There are even some from
February :D


Reply to this email directly or view it on GitHub
#229 (comment).

@tajnymag
Copy link
Contributor

Thanks @developpsoft. Really looking forward to it :-)

@gustavo-iniguez-goya
Copy link
Contributor

Another idea:

  • MAC randomization when the app starts and prior to scan wireless networks.

@tajnymag
Copy link
Contributor

OK, I understand, it's a very low priority, but wouldn't it be cool to have a wearable support?

@ETeissonniere
Copy link
Member Author

Yeah, maybe.
Le 19 sept. 2015 11:05, "Tajnymag" notifications@github.com a écrit :

OK, I understand, it's a very low priority, but wouldn't it be cool to
have a wearable support?


Reply to this email directly or view it on GitHub
#229 (comment).

@gustavo-iniguez-goya
Copy link
Contributor

I've added a new wiki page with all the ideas we have contributed:
https://github.com/cSploit/android/wiki/Ideas

If someone is working on any of these ideas, update the wiki with something like: WIP/, or something alike.

@fat-tire
Copy link
Contributor

I'm not quite sure what "on-device compiling of the newest cSploit code" -- that sounds like the app compiles itself (?)

@tajnymag what would wearable support look-like exactly?
@developpsoft I saw you stopped by IRC... come back! Wondering what you mean by 'changing the cSploit architecture"

@tajnymag
Copy link
Contributor

@fat-tire I thought something like that. cSPloit would download latest code, compile a new apk, then prompt to install it. Tadaa, problem with nightly server is solved 😄

On a wearable could be displayed a list of devices on ŮAN or available exploits. With RouterKeygen added, wearable could inform you about "crackable" network. As I said, it's a very low priority :-)

@Systemad
Copy link

With nightly releases you have the option to test new features etc and might be less stable therefore I think nightly should be hosted on website and not downloaded directly in the app.
Only stable releases should be (which it already does)

@gustavo-iniguez-goya
Copy link
Contributor

new idea:
extend the session hijacker module functionality for:

  • allow to detect users/pass fields on the URL.
  • save not only the root domain of a cookie, but also all the pages the user is visiting within a URL.
  • intercept not only web sites with cookies, but also without them
  • allow to select which SSL cert to use.

@ETeissonniere
Copy link
Member Author

@Fattire, I leave IRC because I was using my Wiko OZZY which was closing
the page each time I was opening a new one.
By "changing the code architecture" I mean:
Have a cSploit android lib so the app is just the ui, it could be easier to
use (one repo for the lib, an other for the app).
Finally, I think time have come to launch cSploit 2.0 with a new ui and all
the new functionnalities, but maybe I am wrong.
Will come soon in IRC.
Le 21 sept. 2015 00:27, "ga" notifications@github.com a écrit :

new idea:
extend the session hijacker module functionality for:

  • allow to detect users/pass fields on the URL.
  • save not only the root domain of a cookie, but also all the pages
    the user is visiting within a URL.
  • intercept not only web sites with cookies, but also without them
  • allow to select which SSL cert to use.


Reply to this email directly or view it on GitHub
#229 (comment).

@gustavo-iniguez-goya
Copy link
Contributor

new idea:

  • allow to use the port scanner and service inspector modules when selecting the whole network as target.

@evertking
Copy link

@tux-mind I know this is a bit off topic ;) but where would you suggest as a starting point for a noob to start learning so one could jump in here and contribute? All I have is a laptop.

@evertking
Copy link

Just one more noob request ;) maybe a cSploit scripts add on like dsploit but more geared toward pentesting? Can that even be used for testing or is that more like pranks? Where can I donate at to help ya out in anyway.
Again thanks for all your hard work, everyone. This app has peaked my interest and find my self spending a lot of time checking for updates and trying to learn. Its shocking how easy it is to take data and to spy and this app opened my eyes to that. And with mobiles being such a large part of everyday life its a must, I think. Test and secure it or risk it. I'm very thankful to you and to have found this!
OK I with end my rant and get busy taking windows off my laptop and throwing on linux

@tux-mind
Copy link
Member

tux-mind commented Oct 5, 2015

@evertking first step to become an adavanced user ( aka uber ) it's to install Linux 😉

probably learning a new sexy OS will require some weeks or more.
as start point I suggest you to use Ubuntu, an easy to use linux distibution.
once you learned quite well how to play with a terminal you can more forward to ArchLinux, one of the most used distro by advanced users.
if you get crazy and want to really understand how every part of your pc works give a try to Gentoo linux.

btw those are my suggestions for became a linux expert, not a contributor.

for contribute to cSploit you can also use a windows PC, installing android studio on it.
you need to learn Java and some basic of the Android SDK.
anyway contributions can be made in many forms.

once you installed AndroidStudio you can also open the translation editor to help us translate the application into your language.

For donations give a look to the donate page.
I have to switch to another donation system thus to give you a way to see how much we raised.

about your idea of "sending" an apk to other phones: using the MSF we will be able to infect downloaded objects.

a cool feature that require some cool work 😉

and thanks for your impressions, will post them on the official website if yo agree 😊

@ghost
Copy link

ghost commented Oct 8, 2015

I like how in the latest nightly it added port scan at startup like zanti and I think we should add to that by automatically doing service inspector and exploit finder at startup and putting the exploits found next to the ports found open. I would do this myself but I'm just now learning java in order to use android studio so I can help.

@tux-mind
Copy link
Member

tux-mind commented Oct 8, 2015

@uranium-waffles service inspection is too deep and heavy IMHO.

we already encountered some performance issues with the stealth syn scan ( aka fast scan ).
furthermore using the Inspector will make any IDS detect you.

I think that it can be a bad idea.
you can scan all the hosts using the multiple selection from the main screen.

it can be acceptable if we can scan networks with the service inspector, this will use a single process but will not solve the IDS problem.

however if you are using cSploit you really don't care about IDS...

so maybe will do, unsure right now

@ghost
Copy link

ghost commented Oct 8, 2015

@tux-mind how about an intrusive scan option? In zanti2 if you press the refresh button for a rescan a drop down menu appears and allows for selection of an intrusive scan that scans for vulns. That way we could switch between the two. (Non intrusive and intrusive)

@fat-tire
Copy link
Contributor

fat-tire commented Oct 8, 2015

I think this could be done, but it's my understanding that the longer, slower scan takes a ton of resources, both generating a lot of network activity and taking up cpu/battery/memory. I was reminded today that thre are local networks with thousands of hosts...

That said, I don't see any obvious reason not to make it an option-- either from a drop down menu or a toggle in the settings to use regular vs. extra-crispy port scanning by default. The latter would give you the vuln count...

If there is a lot of enthusiasm for this, it could be an option. @tux-mind I imagine this isn't something like the nmap network portscan that could be done "in bulk"... you'd have to inspect each host independently... wonder how many hosts a typical device could do simultaneously before choking....

@gustavo-iniguez-goya
Copy link
Contributor

In my (personal) opinion, I think that these options belong to the subnet card/window, and adding them to the app start up is redundant. On the other hand it has no many sense to have these options on the main window, and not on the subnet card/window.

I guess this is about how each of us understand how cSploit should work :) The initial arp scan is just fine for me, to give you an overview of the subnet you are on, and for select targets. Successive actions should be perform on demand.
It's also true that the initial port scan allows you to select targets, and having an option to allow it on the app start up is ok for me (default to on would be a bit annoying).

@ghost
Copy link

ghost commented Oct 13, 2015

3 suggestions I found very interestong that are not on the todo list are Stagefright Aware Media, Geo-Traceroute, and HID attacks where you plug into a computer and you can execute commands.

@ghost
Copy link

ghost commented Oct 21, 2015

Also how about bettercap integration? http://www.bettercap.org/ made by evilsocket It is like ettercap but better hence the name bettercap.

@tux-mind
Copy link
Member

@uranium-waffles I think that bettercap is a great project, but is in it's early days let check up together why is not a good choice right now:

  • ruby is slower then C
  • ettercap has more dissectors ATM
  • both bettercap and etttercap does not have a callback
  • ettercap stores credentials in a shared point, where we can found them

I'm not talking about parsing their output, we've scheduled ( from a lot of time ) to move all the MITM stuff into the core, it will be stupid to rewrite all protocol dissectors, just reuse what has been already wrote and tested from years, use libettercap. actually bettercap does not provide any library.

sorry for the short answer but I've to go right now 😁

@Tosible
Copy link

Tosible commented Oct 28, 2015

Advertisement Button

An idea I have was a button in the cSploit settings where you can turn it on and off.

If you turn it on, you enable ads in cSploit and the ads will support the devs.

If you turn it off, you remove the ads and cSploit is like back to normal. IMO this will help out the devs a lot.

@ghost
Copy link

ghost commented Oct 28, 2015

@up This is a nice idea .

@fat-tire
Copy link
Contributor

I kinda like the idea, except speaking only for myself-- i don't want any money.

I think @tux-mind could use some revenue to offset his expenses (domain name registration, web site + bandwidth, beer?). So if he wants to set up an Admob account or something, it would be very simple to incorporate ads.

A license concern though-- Admob in particular would involve a dependency on a Google library (play-services-ads), which is closed source. Not sure how that would be compatible, license-wise, with the GPLv3, cSploit's license.

Distributing the cSploit code itself on github may fall under the Linking exception -- the source code only refers to the closed library. But the app binary itself? Not sure. But the FAQ seems to suggest you could distribute the app only without the library, which would be pointless for an .apk...

@Rubenoo
Copy link
Contributor

Rubenoo commented Oct 28, 2015

Why can't you just make a standalone simple app with like a calculator or something and then advertising's everywhere to support csploit?

@BoBeR182
Copy link

BoBeR182 commented Nov 5, 2015

-1 for ads. All you need is a bitcoin address in the about page or paypal set up. If you really wanna make more money set up a script that replaces adsense ads with your own ads for MiTM networks.

@Tosible
Copy link

Tosible commented Nov 7, 2015

MitM script that replaces their regular ads with your ads...dirty, but awesome.

high fives

@tux-mind
Copy link
Member

thanks for the suggestions guys.

@fat-tire thank you for pointing out the license problem.
I'm quite away of all that law stuff, I just want to worry about writing code 😁

lemme known what is the best way to raise some money and I'll start working on it ASAP.
I recently started a campaign on pledgie to buy a new notebook.

I'll try to make every incoming donation and outcoming purchase public, thus to allow you to see where your moneys goes.

yours, tux_mind.

@Vinesh123
Copy link

user new tool in csploit
DOS attack

@BoBeR182
Copy link

@tux-mind maybe start something on BountySource and see if anyone wants to fund bugfixes and thus pays for your time.

@Somebodyhura
Copy link

Hi
I saw one of your goals is to crack wifi passwords.
There are many ways as you know and wps is the fastest.
I suggest wps connect:

http://www.pfrox.site40.net/

As it's a free app I think the dev will agree for its source code to be added to csploit by mentioning the credits of that section is for them OR the androdumpper:

https://www.linkedin.com/profile/view?id=AAMAAAVKhNMBg5PU0s4M01AIF3H_5uFfn7lLrHg

Just like wps connect but can brute force wps too.

You may ask why implement such a thing when there it is available...but I say all-in-one is always different.

And there is something else called WIBR+ that does brute force on the router(not wps...the real password)
It's like hydra... Or dictionary attack and it supports masks too...like sometimes I hear they say 110043XX so I go WIBR and as the other 2 digits are numbers so it tries and bingo it finds it...

http://forum.xda-developers.com/showthread.php?t=2398114

@ETeissonniere
Copy link
Member Author

ETeissonniere commented Apr 22, 2016

Hey @Somebodyhura, I am taking a look, thanks !

@pahapoika
Copy link
Member

Maybe something like https://github.com/jackgu1988/dSploit-scripts

Maybe graphical gui where you can add those scripts to script injection. No need for writing those could be good for noobs. :)

@pahapoika
Copy link
Member

And https://github.com/n1nj4sec/pupy could be very useful too. It would be added to exploiting module.

Also i think automated msf payload generator would be cool. (See #579 )

@Somebodyhura
Copy link

Somebodyhura commented Apr 23, 2016

And for the other goal ( install backdoor for later access)...

How about androrat?
http://forum.xda-developers.com/android/apps-games/androrat-remote-administration-tool-t2734932

Well I just heard of it...I haven't tested it but as its a rat...it should do remote administration and can make installing a backdoor possible

( somehow using the packet editor and replace the apk with Androrat so the victim will install it and its done but mostly as I see users check the apk icon...and see its not matching to what they want...somehow not going to work)

( and I think of an very difficult way to bind apk editor to csploit so apk will be downloaded to attackers phone, extract icon, replace with androrat icon, and maybe add useless bites to make same size...this should better work...permission are never problem cuz...even me don't check them :D)

@ghost
Copy link

ghost commented Aug 12, 2016

New easy-to-add but powerfuel idea to add at the main menu attack. This is a special type of DOS attack directed on a special LAN node or IP address. It can be used to exec massive attacks on a single device, and to crash it.

The way to implement this feauture is follow these steps:

  1. Add a new contestual-menu card named DOS attack in the main menu
  2. Create an activity to SetUp the attack details, such as victim IPv4 and IPv6 address, MAC adddress, OS type, and other tech data. At the end of page, a button who will start attack
  3. Implement in daemon the basic DOS C++ files and headers
  4. Create a function called first to launch the attack who change your NET configuration faking your spech and making your device unreachable by network inspections tools.
  5. Try to send an abnormal quantity of ping data using thread's engine same as LOIC

@BoBeR182
Copy link

@xmashine Mass amount of pings will not crash a machine these days, just slow down their internet connection. Your better bet to create a DOS would be to use the ARP injection attack and just drop all packets from the machine, this is already implemented.

@ETeissonniere
Copy link
Member Author

Outdated

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests