Thessaloniki 28-30 November 2014. Penetration Testing with Android Devices Hacking with our pocket device, made easy! Thomas Sermpinis a.k.a. Cr0wTom.

Slides:



Advertisements
Similar presentations
Brute Force Attack Against Wi-Fi Protected Setup
Advertisements

Wireless Cracking By: Christopher Zacky.
Crack WPA Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
Omni Introduction Page All About Omni and our Products.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Computer Security and Penetration Testing
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
Extend Your UFT for Mobile Testing & Monitoring Mobile Add-on For UFT Nov 2014.
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
UFCFX5-15-3Mobile Device Development Android Development Environments and Windows.
Deployment and Configuration Management Solution
Understanding and Managing WebSphere V5
Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
Linux Deploy This application is open source software for quick and easy installation of the operating system (OS) GNU/Linux on your Android device. The.
MASNET GroupXiuzhen ChengFeb 8, 2006 CSCI388 Project 1 Crack the WEP key Liran Ma Department of Computer Science The George Washington University
SeeTestCloud. End-to-End Suite of Tools for iOS, Android, BlackBerry & Windows Phone Automation tools for 24/7 testing and monitoring Productivity tools.
What is PaperCut MF? What is PaperCut MF? What is PaperCut MF?
Pen testing to ensure your security
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Honeypot and Intrusion Detection System
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Ethical Hacking of Wireless Routers Faizan Zahid CS-340 Nida Noor CS-378.
Hands-On Ethical Hacking and Network Defense Lecture 14 Cracking WEP Last modified
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
 Installation of Android Development Environment  Creating the App with OpenGL ES API  Running the App on Emulator Android App Development.
Wireless and Mobile Security
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
Jeff Alexander & Andrew McMurray Runtime Provisioning in Windows 10 WIN327.
{ Kali Linux Pen testing to ensure your security.
Introducing the Smartphone Pentesting Framework Georgia Weidman Bulb Security LLC Approved for Public Release, Distribution Unlimited.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
WIRELESS NETWORK SECURITY By Mohammad Khairul Hazwan Bin Sarihan.
WPA Cracking with Rainbow Tables For Educational Purposes Only Kurt Wondra November 18 th, 2010  1) Scanning for Vulnerable Networks  2) Capturing Usable.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Twesige Richard.  Advanced RISC Machines.  Set of instruction set architectures related to programing registers, CPU’s also I/O devices.  RISC acronym.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
Mobile Packet Sniffer Ofer Borosh Vadim Lanzman Dr. Chen Avin
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Android. Android An Open Handset Alliance Project A software platform and operating system for mobile devices Based on the Linux kernel Developed by Google.
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
[blank page for bug work-around]
CLOUDENTIFY.
Penetration Testing: Concepts,Attacks and Defence Stratagies
ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya
OSA vs WEP WPA and WPA II Tools for hacking
Wireless Attacks: WEP Module Type: Basic Method Module Number: 0x00
Presented By: Rohit Maurya
Chris D Hicks Director of IT MCSE, MCP + Internet Security
Advanced Penetration testing
Week 1 – Taster Session dmuhackers DMU Hackers.
Common Operating System Exploits
Wireless Hacking.
OPERATING SYSTEMS.
Advanced Penetration testing
Advanced Penetration testing
Advanced Penetration testing
Presentation transcript:

Thessaloniki November 2014

Penetration Testing with Android Devices Hacking with our pocket device, made easy! Thomas Sermpinis a.k.a. Cr0wTom Cr0w’s Place, DeltaHacker Magazine 1

Introduction : Powerful Android devices are our daily companion. They are helping us with every type of task. Why not help us with Penetration Testing and everyday ethical hacking.

Why Android? Open Platform Root Access Hardware Reachability Top Specs

Prerequisites: Android Device ( duh? ) Root Privileges Full BusyBox Install Some Hardware Knowledge Some Programming Knowledge

Disclaimer!

Enterprise Solutions Professional-grade applications 2222

Zimperium - Introduction Founded on 2010 Mobile Security zANTI Kevin Mitnick joins in 2012 Simone Margaritelli joins in 2014 zANTI 2 + zIPS + zConsole

Zimperium – zANTI 2 Penetration testing suite Free community edition Innovative capabilities Sync with Zimperiums cloud service

Demo Let’s see what is all about!

Zimperium – zIPS Cloud based service Device specific attacks Network attacks Human based attacks Pop-Up windows

Zimperium - zConsole A window into advanced mobile threats Cloud based Online service zANTI and zIPS result demonstration

Offensive Security Founded 2006 Backtrack Linux Kali linux in 2013 Kali Linux NetHunter ROM for Android

Offensive Security - Kali Linux NetHunter Penetration Testing Custom ROM Nexus Devices Wireless Injection USB HID Keyboard attacks - BadUSB MITM attacks

Offensive Security - Kali Linux NetHunter

Offensive Security – Kali Linux ARM Installation with Linux Deploy app Complete Linux distribution Hardware enchantments SSH or VNC connectivity Build for ARM devices

Applications Quality hacking applications from random developers 2222

dSploit – Penetration Testing Suite Development stop in 2014 Simone Margaritelli Extensive network scanning MITM attacks Exploitation with Metasploit Framework

DroidSheep – DroidSheep Guard Simplicity Session hijacking fast and easy Safety from session hijacking with DroidSheep Guard Android ARP-Table monitoring

Demo Let’s see what is all about!

Shark for Android (Shark for Root) Network traffic sniffer Works on 3G and WiFi Based on tcpdump tool Dump file can be viewed in Wireshark

WiFi Protocol Cracking WEP, WPA/WPA2, WPS Cracking 2222

Monitor Mode Hardware bcm4329/4330 internal wifi chipset Many external cards over OTG cable (RTL8187 chipset) Kernel Integration

Aircrack-NG Suite WEP and WPA-PSK key recovery Cross-Platform Variety of attacks GPU implementation Internal or external chipset support Runs in terminal emulators

Reaver-GUI for Android Graphic User Interface WPA(2) Key recovery via WPS vulnerability Wide range of chipset support 2-10 hours key recovery Bcmon = companion app

Questions?

Thank you for listening! cr0wsplace1993 [at] gmail [dot] com YouTube Channel: DeltaHacker.gr