MobSF (Mobile Security Framework) v1.0 – Mobile (Android/iOS) Automated Pen-Testing Framework

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing framework capable of performing static, dynamic and malware analysis. It can be used for effective and fast security analysis of Android, iOS and Windows mobile applications and support both binaries (APK, IPA & APPX ) and zipped source code. MobSF can do dynamic application testing at runtime for Android apps and has Web API fuzzing capabilities powered by CapFuzz, a Web API specific security scanner. MobSF is designed to make your CI/CD or DevSecOps pipeline integration seamless.MobSF is also bundled with Android Tamer and BlackArchDocumentationSee MobSF DocumentationMobSF Static Analyzer Docker ImageAutomated prebuilt docker image of MobSF Static Analyzer is available from DockerHubdocker pull opensecurity/mobile-security-framework-mobsfdocker run -it -p 8000:8000 opensecurity/mobile-security-framework-mobsf:latestOther docker options: MobSF Docker OptionsCollaboratorsAjin AbrahamDominik SchlechtMatan DobrushinVincent NadalPresentationsOWASP APPSEC EU 2016 – Slides, VideoNULLCON 2016 – Slidesc0c0n 2015 – SlidesOWASP AppSec EU 2016 – VideoG4H Webcast 2015 – VideoVideo CourseAutomated Mobile Application Security Assessment with MobSFAndroid Security Tools ExpertWhat’s New?See ChangelogScreenshotsStatic Analysis – Android APKStatic Analysis – iOS IPAStatic Analysis – Windows APPXDynamic Analysis – Android APKWeb API FuzzerCreditsAbhinav Sejpal (@Abhinav_Sejpal) – For poking me with bugs, feature requests, and UI & UX suggestions.Amrutha VC (@amruthavc) – For the new MobSF logoAnant Srivastava (@anantshri) – For Activity Tester IdeaAnto Joseph (@antojosep007) – For the help with SuperSU.Bharadwaj Machiraju (@tunnelshade_) – For writing pyWebProxy from scratchDominik Schlecht – For the awesome work on adding Windows Phone App Static Analysis to MobSFEsteban – Better Android Manifest Analysis and Static Analysis Improvement.Matan Dobrushin – For adding Android ARM Emulator support to MobSF – Special thanks goes for cuckoo-droid, I got inspierd by their code and idea for this implementation.MindMac – For writing Android Blue PillRahul (@c0dist) – Kali SupportShuxin – Android Binary AnalysisThomas Abraham – For JS Hacks on UI.Tim Brown (@timb_machine) – For the iOS Binary Analysis Ruleset.Oscar Alfonso Diaz – (@OscarAkaElvis) – For Dockerfile contributionsDownload MobSF

Link: http://feedproxy.google.com/~r/PentestTools/~3/k5pgjKUGpDQ/mobsf-mobile-security-framework-v10.html

How to Enable Dark Mode on YouTube Android App

Few months back, YouTube added a Dark mode for web. Later it was rolled out for iOS users. Now, YouTube has finally rolled out the dark mode for Android app users as well. You can enable the dark…
The post How to Enable Dark Mode on YouTube Android App appeared first on UseThisTip.

Link: http://feedproxy.google.com/~r/blogspot/csAFg/~3/TJeQJgUqReI/how-to-enable-dark-mode-on-youtube-android-app.html

Scrounger – Mobile Application Testing Toolkit

Scrounger – a person who borrows from or lives off others.There is no better description for this tool for two main reasons, the first is because this tool takes inspiration from many other tools that have already been published, the second reason is because it lives off mobile application’s vulnerabilities.WhyEven though several other mobile application analysis tools have been developed, there is no one tool that can be used for both android and ios and can be called a “standard" must use on every mobile application assessment.The idea behind Scrounger is to make a metasploit-like tool that will not do a pentesters work but help the pentester on his assessment by executing mundane tasks that need to be performed on all assessments.The DifferenceThe main features Scrounger offers that others don’t:Works with Android and iOSMetasploit-like console and modulesOffers a variaty of modules that can be run to give the pentester a starting pointEasily extendableInspiration / ThanksScrounger was inspired by other tools, a huge thanks to the developers of:Drozer (https://github.com/mwrlabs/drozer);Needle (https://github.com/mwrlabs/needle); andiOS Application Analysis (https://github.com/timb-machine/ios-application-analyser).TechnicalAs a disclaimer, all identified findings by Scrounger should always be manually double checked.When using modules that need an Android or iOS device, Scrounger needs a Rooted or Jailbroken device respectivelyInstallgit pull https://github.com/nettitude/scrounger.gitcd scroungerbash setup.shpip install -r requirements.txtpython setup.py installDevelopmentgit pull https://github.com/nettitude/scrounger.gitcd scroungerbash setup.shpip install -r requirements.txtpython setup.py developUpdatecd scroungergit pullpython setup.py install –upgradeRequired BinariesFor Android Modulesjava (http://www.oracle.com/technetwork/java/javase/downloads/index.html)jd-cli (https://github.com/kwart/jd-cmd)apktool (https://ibotpeaches.github.io/Apktool/)d2j-dex2jar (https://github.com/pxb1988/dex2jar)adb (https://developer.android.com/studio/releases/platform-tools)Other (Optional):avdmanager (https://developer.android.com/studio/#downloads)For iOS Modulesjtool (Linux) (http://www.newosxbook.com/tools/jtool.html)otool (MacOS) (https://developer.apple.com/xcode/)ldid (https://github.com/daeken/ldid.git)iproxy (Package: libimobiledevice)lsusb (Package: usbutils)unzipiOS BinariesBundled Binaries:clutchdump_backup_flagdump_file_protectiondump_keychaindump_loglistappsCydia Karen’s Repository (https://cydia.angelxwind.net) (Optional):AppSync Unified (Package: net.angelxwind.appsyncunified)appinst (Package: com.linusyang.appinst)Other (Optional):ldidotoolInstall ScriptsLinux# install iproxy lsusbsudo apt-get install libimobiledevice usbutils# install jd-cliif [ ! -x "$(which jd-cli)" ]; then curl -L -o /tmp/jdcli.zip https://github.com/kwart/jd-cmd/releases/download/jd-cmd-0.9.2.Final/jd-cli-0.9.2-dist.zip unzip /tmp/jdcli.zip /usr/local/share/jd-cli ln -s /usr/local/share/jd-cli/jd-cli /usr/local/bin/jd-cli ln -s /usr/local/share/jd-cli/jd-cli.jar /usr/local/bin/jd-cli.jar rm -rf /tmp/jdcli.zipfi# install apktoolif [ ! -x "$(which apktool)" ]; then mkdir /usr/local/share/apktool curl -L -o /usr/local/share/apktool/apktool https://raw.githubusercontent.com/iBotPeaches/Apktool/master/scripts/osx/apktool curl -L -o /usr/local/share/apktool/apktool.jar https://bitbucket.org/iBotPeaches/apktool/downloads/apktool_2.3.3.jar chmod +x /usr/local/share/apktool /usr/local/share/apktool/apktool.jar ln -s /usr/local/share/apktool /usr/local/bin/apktool ln -s /usr/local/share/apktool.jar /usr/local/bin/apktool.jarfi# install dex2jarif [ ! -x "$(which d2j-dex2jar)" ]; then curl -L -o /tmp/d2j.zip https://github.com/pxb1988/dex2jar/files/1867564/dex-tools-2.1-SNAPSHOT.zip unzip /tmp/d2j.zip -d /tmp/d2j dirname=$(ls –color=none /tmp/d2j) mv /tmp/d2j/$dirname /usr/local/share/d2j-dex2jar ln -s /usr/local/share/d2j-dex2jar/d2j-dex2jar.sh /usr/local/bin/d2j-dex2jar.sh ln -s /usr/local/share/d2j-dex2jar/d2j-apk-sign.sh /usr/local/bin/d2j-apk-sign.sh rm -rf /tmp/d2j.zipfiif [ ! -x "$(which d2j-dex2jar)" ]; then ln -s /usr/local/bin/d2j-dex2jar.sh /usr/local/bin/d2j-dex2jarfi# install adbif [ ! -x "$(which adb)" ]; then curl -L -o /tmp/platform-tools.zip https://dl.google.com/android/repository/platform-tools-latest-linux.zip unzip /tmp/platform-tools.zip -d /tmp/pt mv /tmp/pt/platform-tools /usr/local/share/ ln -s /usr/local/share/platform-tools/adb /usr/local/bin/adb ln -s /usr/local/share/platform-tools/fastboot /usr/local/bin/fastbootfi# install ldidif [ ! -x "$(which ldid)" ]; then git clone https://github.com/daeken/ldid.git /tmp/ldid cd /tmp/ldid ./make.sh mv ldid /usr/local/bin/ cd /tmp rm -rf /tmp/ldidfi# install jtoolif [ ! -x "$(which jtool)" ]; then curl -L -o /tmp/jtool.tar http://www.newosxbook.com/tools/jtool.tar mkdir /tmp/jtool tar xvf /tmp/jtool.tar -C /tmp/jtool mv /tmp/jtool/jtool.ELF64 /usr/local/bin/jtool rm -rf /tmp/jtool.tar /tmp/jtoolfi# install scroungergit clone [email protected]:nettitude/scrounger.gitcd scroungerpip install -r requirements.txtpython setup.py installMacOS# install iproxy ldid lsusbbrew tap jlhonora/lsusb && brew install lsusb libimobiledevice ldid# install jd-cliif [ ! -x "$(which jd-cli)" ]; then curl -L -o /tmp/jdcli.zip https://github.com/kwart/jd-cmd/releases/download/jd-cmd-0.9.2.Final/jd-cli-0.9.2-dist.zip unzip /tmp/jdcli.zip /usr/local/share/jd-cli ln -s /usr/local/share/jd-cli/jd-cli /usr/local/bin/jd-cli ln -s /usr/local/share/jd-cli/jd-cli.jar /usr/local/bin/jd-cli.jar rm -rf /tmp/jdcli.zipfi# install apktoolif [ ! -x "$(which apktool)" ]; then mkdir /usr/local/share/apktool curl -L -o /usr/local/share/apktool/apktool https://raw.githubusercontent.com/iBotPeaches/Apktool/master/scripts/osx/apktool curl -L -o /usr/local/share/apktool/apktool.jar https://bitbucket.org/iBotPeaches/apktool/downloads/apktool_2.3.3.jar chmod +x /usr/local/share/apktool /usr/local/share/apktool/apktool.jar ln -s /usr/local/share/apktool /usr/local/bin/apktool ln -s /usr/local/share/apktool.jar /usr/local/bin/apktool.jarfi# install dex2jarif [ ! -x "$(which d2j-dex2jar)" ]; then curl -L -o /tmp/d2j.zip https://github.com/pxb1988/dex2jar/files/1867564/dex-tools-2.1-SNAPSHOT.zip unzip /tmp/d2j.zip -d /tmp/d2j dirname=$(ls –color=none /tmp/d2j) mv /tmp/d2j/$dirname /usr/local/share/d2j-dex2jar ln -s /usr/local/share/d2j-dex2jar/d2j-dex2jar.sh /usr/local/bin/d2j-dex2jar.sh ln -s /usr/local/share/d2j-dex2jar/d2j-apk-sign.sh /usr/local/bin/d2j-apk-sign.sh rm -rf /tmp/d2j.zipfiif [ ! -x "$(which d2j-dex2jar)" ]; then ln -s /usr/local/bin/d2j-dex2jar.sh /usr/local/bin/d2j-dex2jarfi# install adbif [ ! -x "$(which adb)" ]; then curl -L -o /tmp/platform-tools.zip https://dl.google.com/android/repository/platform-tools-latest-darwin.zip unzip /tmp/platform-tools.zip -d /tmp/pt mv /tmp/pt/platform-tools /usr/local/share/ ln -s /usr/local/share/platform-tools/adb /usr/local/bin/adb ln -s /usr/local/share/platform-tools/fastboot /usr/local/bin/fastbootfi# install Xcode / command line toolsxcode-select –install# install scroungergit clone [email protected]:nettitude/scrounger.gitcd scroungerpip install -r requirements.txtpython setup.py installAdding Custom ModulesWhen installing the application a folder ~/.scrounger will be created. Inside ~/.scrounger will be a folder called modules/custom with the same structure as the default scrounger modules, e.g., analysis/android/module_name.To create a new custom module just add a new file with the module name you want and it will be included the next time you launch scrounger.ExampleAdded the following module (~/.scrounger/modules/custom/misc/test.py):from scrounger.core.module import BaseModuleclass Module(BaseModule): meta = { "author": "RDC", "description": """Just a Test module""", "certainty": 100 } options = [ { "name": "output", "description": "local output directory", "required": False, "default": None }, ] def run(self): print("This is a print from the custom module") return { "print": "This will be print by scrounger’s console." }Execution$ scrounger-consoleStarting Scrounger console…scrounger > list custom/miscModule Certainty Author Description—— ——— —— ———–custom/misc/test 100% RDC Just a Test modulescrounger > use custom/misc/testscrounger custom/misc/test > optionsGlobal Options: Name Value —- —– device output /tmp/scrounger-appModule Options (custom/misc/test): Name Required Description Current Setting —- ——– ———– ————— output False local output directory /tmp/scrounger-appscrounger custom/misc/test > runThis is a print from the custom module[+] This will be print by scrounger’s console.scrounger custom/misc/test >ExamplesListing / Searching modules$ scrounger-consoleStarting Scrounger console…> helpDocumented commands (type help ):========================================add_device devices list print results set unsetback help options quit run show use> help listLists all available modules> list iosModule Certainty Author Description—— ——— —— ———–analysis/ios/app_transport_security 90% RDC Checks if there are any Application Transport Security misconfigurationsanalysis/ios/arc_support 90% RDC Checks if a binary was compiled with ARC supportanalysis/ios/backups 90% RDC Checks the application’s files have the backup flag onanalysis/ios/clipboard_access 75% RDC Checks if the application disables clipboard accessanalysis/ios/debugger_detection 75% RDC Checks if the application detects debuggersanalysis/ios/excessive_permissions 90% RDC Checks if the application uses excessive permissionsanalysis/ios/file_protection 90% RDC Checks the application’s files specific protection flagsanalysis/ios/full_analysis 100% RDC Runs all modules in analysis and writes a report into the output directoryanalysis/ios/insecure_channels 50% RDC Checks if the application uses insecure channelsanalysis/ios/insecure_function_calls 75% RDC Checks if the application uses insecure function callsanalysis/ios/jailbreak_detection 60% RDC Checks if the application implements jailbreak detectionanalysis/ios/logs 60% RDC Checks if the application logs to sysloganalysis/ios/passcode_detection 60% RDC Checks if the application checks for passcode being setanalysis/ios/pie_support 100% RDC Checks if the application was compiled with PIE supportanalysis/ios/prepared_statements 60% RDC Checks if the application uses sqlite calls and if so checks if it also uses prepared statementsanalysis/ios/ssl_pinning 60% RDC Checks if the application implements SSL pinninganalysis/ios/stack_smashing 90% RDC Checks if a binary was compiled stack smashing protectionsanalysis/ios/third_party_keyboard 65% RDC Checks if an application checks of third party keyboardsanalysis/ios/unencrypted_communications 80% RDC Checks if the application implements communicates over unencrypted channelsanalysis/ios/unencrypted_keychain_data 70% RDC Checks if the application saves unencrypted data in the keychainanalysis/ios/weak_crypto 60% RDC Checks if the application uses weak cryptoanalysis/ios/weak_random 50% RDC Checks if a binary uses weak random functionsanalysis/ios/weak_ssl_ciphers 50% RDC Checks if a binary uses weak SSL ciphersmisc/ios/app/archs 100% RDC Gets the application’s available architecturesmisc/ios/app/data 100% RDC Gets the application’s data from the remote devicemisc/ios/app/entitlements 100% RDC Gets the application’s entitlementsmisc/ios/app/flags 100% RDC Gets the application’s compilation flagsmisc/ios/app/info 100% RDC Pulls the Info.plist info from the devicemisc/ios/app/start 100% RDC Launches an application on the remote devicemisc/ios/app/symbols 100% RDC Gets the application’s symbols out of an installed application on the devicemisc/ios/class_dump 100% RDC Dumps the classes out of a decrypted binarymisc/ios/decrypt_bin 100% RDC Decrypts and pulls a binary applicationmisc/ios/install_binaries 100% RDC Installs iOS binaries required to run some checksmisc/ios/keychain_dump 100% RDC Dumps contents from the connected device’s keychainmisc/ios/local/app/archs 100% RDC Gets the application’s available architecturesmisc/ios/local/app/entitlements 100% RDC Gets the application’s entitlements from a local binary and saves them to filemisc/ios/local/app/flags 100% RDC Gets the application’s compilation flags using local tools. Will look for otool and jtool in the PATH.misc/ios/local/app/info 100% RDC Pulls the Info.plist info from the unzipped IPA file and saves an XML file with it’s contents to the output foldermisc/ios/local/app/symbols 100% RDC Gets the application’s symbols out of an installed application on the devicemisc/ios/local/class_dump 100% RDC Dumps the classes out of a decrypted binarymisc/ios/pull_ipa 100% RDC Pulls the IPA file from a remote devicemisc/ios/unzip_ipa 100% RDC Unzips the IPA file into the output directoryUsing Misc Module$ scrounger-consoleStarting Scrounger console…> use misc/android/decompile_apkmisc/android/decompile_apk > optionsGlobal Options: Name Value —- —– device output /tmp/scrounger-appModule Options (misc/android/decompile_apk): Name Required Description Current Setting —- ——– ———– ————— output True local output directory /tmp/scrounger-app apk True local path to the APK filemisc/android/decompile_apk > set output scrounger-demo-outputmisc/android/decompile_apk > set apk ./a.apkmisc/android/decompile_apk > optionsGlobal Options: Name Value —- —– device output /tmp/scrounger-appModule Options (misc/android/decompile_apk): Name Required Description Current Setting —- ——– ———– ————— output True local output directory scrounger-demo-output apk True local path to the APK file ./a.apkmisc/android/decompile_apk > run2018-05-01 10:29:53 – decompile_apk : Creating decompilation directory2018-05-01 10:29:53 – decompile_apk : Decompiling application2018-05-01 10:29:59 – manifest : Checking for AndroidManifest.xml file2018-05-01 10:29:59 – manifest : Creating manifest object[+] Application decompiled to scrounger-demo-output/com.eg.challengeapp.decompiledUsing results from other modulesmisc/android/decompile_apk > show resultsResults: Name Value —- —– com.eg.challengeapp_decompiled scrounger-demo-output/com.eg.challengeapp.decompiledmisc/android/decompile_apk > use analysis/android/permissionsanalysis/android/permissions > optionsGlobal Options: Name Value —- —– device output /tmp/scrounger-appModule Options (analysis/android/permissions): Name Required Description Current Setting —- ——– ———– ————— decompiled_apk True local folder containing the decompiled apk file permissions True dangerous permissions to check for, seperated by ; android.permission.GET_TASKS;android.permission.BIND_DEVICE_ADMIN;android.permission.USE_CREDENTIALS;com.android.browser.permission.READ_HISTORY_BOOKMARKS;android.permission.PROCESS_OUTGOING_CAanalysis/android/permissions > print option permissionsOption Name: permissionsValue: android.permission.GET_TASKS;android.permission.BIND_DEVICE_ADMIN;android.permission.USE_CREDENTIALS;com.android.browser.permission.READ_HISTORY_BOOKMARKS;android.permission.PROCESS_OUTGOING_CALLS;android.permission.READ_LOGS;android.permission.READ_SMS;android.permission.READ_CALL_LOG;android.permission.RECORD_AUDIO;android.permission.MANAGE_ACCOUNTS;android.permission.RECEIVE_SMS;android.permission.RECEIVE_MMS;android.permission.WRITE_CONTACTS;android.permission.DISABLE_KEYGUARD;android.permission.WRITE_SETTINGS;android.permission.WRITE_SOCIAL_STREAM;android.permission.WAKE_LOCKanalysis/android/permissions > set decompiled_apk result:com.eg.challengeapp_decompiledanalysis/android/permissions > optionsGlobal Options: Name Value —- —– device output /tmp/scrounger-appModule Options (analysis/android/permissions): Name Required Description Current Setting —- ——– ———– ————— decompiled_apk True local folder containing the decompiled apk file result:com.eg.challengeapp_decompiled permissions True dangerous permissions to check for, seperated by ; android.permission.GET_TASKS;android.permission.BIND_DEVICE_ADMIN;android.permission.USE_CREDENTIALS;com.android.browser.permission.READ_HISTORY_BOOKMARKS;android.permission.PROCESS_OUTGOING_CAanalysis/android/permissions > run2018-05-01 10:54:58 – manifest : Checking for AndroidManifest.xml file2018-05-01 10:54:58 – manifest : Creating manifest object2018-05-01 10:54:58 – permissions : Analysing application’s manifest permissions[+] Analysis result:The Application Has Inadequate Permissions Report: True Details:* android.permission.READ_SMSUsing devices$ scrounger-consoleStarting Scrounger console…> show devicesAdded Devices: Scrounger ID Device OS Identifier ———— ——— ———-> add_deviceandroid ios> add_device android 00cd7e67ec57c127> show devicesAdded Devices: Scrounger ID Device OS Identifier ———— ——— ———- 1 android 00cd7e67ec57c127> set global device 1> optionsGlobal Options: Name Value —- —– device 1 output /tmp/scrounger-app> use misc/list_appsmisc/list_apps > optionsGlobal Options: Name Value —- —– device 1 output /tmp/scrounger-appModule Options (misc/list_apps): Name Required Description Current Setting —- ——– ———– ————— output False local output directory /tmp/scrounger-app device True the remote device 1misc/list_apps > unset outputmisc/list_apps > optionsGlobal Options: Name Value —- —– device 1 output /tmp/scrounger-appModule Options (misc/list_apps): Name Required Description Current Setting —- ——– ———– ————— output False local output directory device True the remote device 1misc/list_apps > run[+] Applications installed on 00cd7e67ec57c127:com.android.sharedstoragebackupcom.android.providers.partnerbookmarkscom.google.android.apps.mapscom.google.android.partnersetupde.codenauts.hockeyapp…Command Line Help$ scrounger –helpusage: scrounger [-h] [-m analysis/ios/module1;analysis/ios/module2] [-a argument1=value1;argument1=value2;] [-f /path/to/the/app.[apk|ipa]] [-d device_id] [-l] [-o] [-p /path/to/full-analysis.json] [-V] [-D] _____ / ____| | (___ ___ _ __ ___ _ _ _ __ __ _ ___ _ __ \___ \ / __| ‘__/ _ \| | | | ‘_ \ / _` |/ _ \ ‘__| ____) | (__| | | (_) | |_| | | | | (_| | __/ | |_____/ \___|_| \___/ \__,_|_| |_|\__, |\___|_| __/ | |___/optional arguments: -h, –help show this help message and exit -m analysis/ios/module1;analysis/ios/module2, –modules analysis/ios/module1;analysis/ios/module2 modules to be run – seperated by ; – will be run in order -a argument1=value1;argument1=value2;, –arguments argument1=value1;argument1=value2; arguments for the modules to be run -f /path/to/the/app.[apk|ipa], –full-analysis /path/to/the/app.[apk|ipa] runs a full analysis on the application -d device_id, –device device_id device to be used by the modules -l, –list list available devices and modules -o, –options prints the required options for the selected modules -p /path/to/full-analysis.json, –print-results /path/to/full-analysis.json prints the results of a full analysis json file -V, –verbose prints more information when running the modules -D, –debug prints more information when running scroungerUsing the command line$ scrounger -o -m "misc/android/decompile_apk"Module Options (misc.android.decompile_apk): Name Required Description Default —- ——– ———– ——- output True local output directory None apk True local path to the APK file None$ scrounger -m "misc/android/decompile_apk" -a "apk=./a.apk;output=./cli-demo"Excuting Module 02018-05-01 11:17:42 – decompile_apk : Creating decompilation directory2018-05-01 11:17:42 – decompile_apk : Decompiling application2018-05-01 11:17:46 – manifest : Checking for AndroidManifest.xml file2018-05-01 11:17:46 – manifest : Creating manifest object[+] Application decompiled to ./cli-demo/com.eg.challengeapp.decompiledDownload Scrounger

Link: http://feedproxy.google.com/~r/PentestTools/~3/nVWoMmn0qYg/scrounger-mobile-application-testing.html

7 Best Ringtone Maker or Ringtone Cutter Apps for Android

Android phones come with pre-install sound clips to use as ringtone. Every brand has its unique ringtones that identifies it. How can we forget the iconic Nokia tune. But Android phones also give you flexibility to use any…
The post 7 Best Ringtone Maker or Ringtone Cutter Apps for Android appeared first on UseThisTip.

Link: http://feedproxy.google.com/~r/blogspot/csAFg/~3/B_7Qn5658GE/best-ringtone-maker-or-ringtone-cutter-apps-for-android.html

Intercepter-NG – Android App For Hacking

Intercepter-NG is a multi functional network toolkit including an Android app for hacking, the main purpose is to recover interesting data from the network stream and perform different kinds of MiTM attacks.

Specifically referring to Intercepter-NG Console Edition which works on a range of systems including NT, Linux, BSD, MacOSX, IOS and Android.
The Windows version is the one with the most powerful feature-set, but the Android app is fairly handy too.
Read the rest of Intercepter-NG – Android App For Hacking now! Only available at Darknet.

Link: https://www.darknet.org.uk/2018/08/intercepter-ng-android-app-for-hacking/

AT Command Hitch Leaves Android Phones Open to Attack

Researchers used AT commands to rewrite device firmware, bypass Android security mechanisms, exfiltrate sensitive device information, and unlock screens.

Link: https://threatpost.com/at-command-hitch-leaves-android-phones-open-to-attack/136938/

How to Send Confidential Emails on Gmail

With new design, Google also rolled out confidential emails option that aims to protect sensitive information from unauthorized access. You can use confidential mode for sending confidential information. The email will have an expiration date decided by you…
The post How to Send Confidential Emails on Gmail appeared first on UseThisTip.

Link: http://feedproxy.google.com/~r/blogspot/csAFg/~3/ZPXkgy2TuGM/how-to-send-confidential-emails-on-gmail.html