Installing Debian with GNURoot!!

GNURoot is an android app which helps you to run a terminal emulator of some select distributions on android on an android phone without rooting it.

How to


  1. Download the GNURoot app from the play store.
  2. Open the app and select Create New Rootfs.
  3. Now download and install the other part of  the app, I am installing wheezy which is a form of debian.
  4. Now launch the by selecting the Launch Rootfs (make sure the checked box is checked).                                                               
Now if you only need only debian you can try the other trick.
  1. Download the GNURoot debian form the play store.
  2. Click on install/reinstall to install the distro.
  3. Now hit launch to start the terminal emulator.
  4. And you are done.                                                   

Note:-
This is better than debian noroot as it is more convenient to type commands but lacks a GUI interface of the distro. 

Mini,light & regular: What's different?

Now we all know that there are three types of Kali Linux ISO, the difference between these ISOs are that:-
Regular:-
The regular version is the fully fledged Kali Linux with the cool GUI and has all the tools, this version can be installed as a bootable media.

Light:-
The light version is a stripped up version of Kali Linux,it only has some main tools like sqlmap, nmap, etc. It looks more like CentOS.
And can be installed on bootable media.


Mini:- The mini is the a version which is the smallest one of all which can be used to install it with internet access.This one cannot be installed on bootable media and you can only be access it  after the distro is installed. This only consist of the core packages. And you might have to do a lot of apt-gets to get it to a full fledged environment. 





Hide it!!(basics of steganography)

Steganography is a technique of hiding data in a audio or a image file. Originally designed for spies, this technique is often used by malicious elements and government officials. But now a days all sorts of people use it to hide their data even if its sensitive or not.
There are a bunch of tools that are available on the internet that you can download and use. All these tools have simple wizards which can be used to hide your data. 
For example I can use any random software to explain it but I would prefer using DeepSound to explain it.

How to? 

  1. Download and install Deepsound on your computer.
  2. Now open Deepsound, you will see a window like this.
  3. First of all select the carrier file in which you want hide the data.                            
  4. Now add the files which you want to hide.
  5. Hit encode to start the encoding.
  6. Now you will you can check the check-box under encrypt to set a password if you want to make it even more secure else just hit OK.                         
  7.  To extract the data just open the file under the  carrier file tab and hit extract secret file.

Hum I have see this somewhere.......



Debian on android without rooting.

Now we have seen people installing Linux on their android phones after rooting it, lately I was wondering if this could be done without the root access. There are may ways to do this but the easiest way I could find was this.

How to?

  1. Download the Debian noroot app from play store.
  2. Now open the app and wait till it downloads the required files

    .
  3. Now the app will boot Debian.
  4. And that's it we have Debian.
Note:-
  • Now you can install Kali packages on top of it, when installed it only consist of the core packages only.
  • If you have OTG support then it will make your life a lot easy. My Setup was something like this:-

Packet capturing without proxy!

The first step of an android app audit is packet capturing which can be used to analyse whether the communication between app and server is encrypted or not. The most common way to capture the packets and analyse them is through proxies but setting up a proxy can be a headache. We had discussed in our post on packet capturing with android app in the article "sniffing without rooting your phone" but the apps discussed in this post don't allow you to analyse the packets on your phone. So I was searching for a better alternative and found this app.

How to?

  1. Download the packet capture app from the play store and install it.
  2. Now open the app and select the capture button(Play button).
  3. It will ask you to create a VPN, select OK.
  4. Now minimize the app and go ahead use the app which you want to test.
  5. When you are done go back to the app and select the stop button.
  6. You will see your captured packet which is timestamped. Select it, you will get a bunch of packets which were captured during your use.                         .
  7. Now select any one packet and you will see the details of the particular packet.                                  
  8. You can hit the http decode button at the top so that the packet is represented in a readable manner.          
Note:-
tpacketcapture doesn't give you the comfort of analysing the packet directly on the phone.


Add SDRTouch to life!!

We have discussed in our article listing to WFM radio about how you can tune into WFM radio and listen to it. So now I was wandering about how to do it on Android. So I started search for apps to do it.

How to
  1. Download rtl2832u driver and SDRtouch from the play Store and install it.
  2.  Now connect your phone and your rtl SDR dongle with an OTG adapter.
  3. Now run SDRTouch App and select the power icon on the top left corner.                                                  
  4. Now select the rtl2832u driver for your backhand decoder.
  5. Now set the desired frequency to listen to the transmissions.
 Note:-
The landscape mode is far more convenient to use when compared to the portrait mode.



Adsb on Android

I was wondering if I could track planes from an android phone. So I started looking for apps which could perform the interception and decoding. I also found out that my phone should support USB OTG to connect the SDR.

How to?
  1. Download the Adsb app from the play store.
  2. Now connect the SDR dongle to your phone with the OTG cable or adapter.
  3. Launch the app and hit the start driver ADSB button, select the app's default driver.                                        
  4. Now wait and watch you will get the data on the main screen.

Note:-
The map view is very lousy so I would advice you to stay away from it.

RFID Hacking without rooting your phone!

RFID is a technology mostly used in access control cards and credit cards. This technology is based on receiver and transmitter type architecture, in which the transmitter is present inside the card. After the famous NFC hacking the easy way by Eddie Lee a large number of hacker have started their research in this field.So to get you started we decide to show you how to collect data from an RFID card with an ordinary android phone.

How to?
  1. Download and install NFC Tools app from the play store.
  2. Now enable NFC on your android phone. 
  3. Open the app and take it near to an RFID card and make sure that the read tab is selected.                      
  4. Now you will see that it will show you the data extracted from the card, save it if you want to duplicate the card.

Note:-
You might have to keep your phone exactly on top of your card as the nfc is a really short range technology.

Bypassing stupid app-locks :p

We all have that one friend who keeps app-locks for all his applications instead of encrypting his device. It's like writing the password of your computer on sticky note and pasting it on your monitor. People forget that app-locks are application which you install on your phone. And if we just kill the process then the application will no longer protect your secrets.I tested 2 of the top play store app-locks, I don't indent to harm the reputation of the poor developers. But I would like to convey to them in simple words that "Your application is SHIT!".


How to? 
  1. Try opening a app which is protected by the app-lock, it will ask you some stupid PIN which I assume that you won't be knowing.
  2. Go to device settings & open Application Manager.
  3. Now locate the app-lock in the list and select it.
  4. Now click on force stop and open the the app which was locked initially, it will open.
  5. If the first trick doesn't work then go to the app-lock and select clear data. All the apps will be unlocked.
Note:-
Clearing the data will disable the app-lock permanently while force stopping will temporarily disable it.
Encrypting your entire device is the best protection. Another way is to lock the application manager with the app-lock.

Airplane tracking for Linux Penguins

We had shared articles on tracking airplanes with SDR on windows. Here is how you do it on Linux. We will be using Kali Linux in our example but you can do it on any other distribution as well. The number of dependencies required may vary from distribution to distribution.
.

How to?
1) Before we start with the actual script you might need a couple of dependencies which means you might have to do a couple of apt-gets:-  
apt-get install libusb-1.0-0-dev

apt-get install libusb-dev

apt-get install librtlsdr-dev

2) After you are done you might need to get dump1090 from GitHub:-
git clone https://github.com/antirez/dump1090.git

3) Now you will have to cd into the folder and recompile the script:-
cd dump1090

make

4)Now to run it use the command:-
./dump1090 --interactive


Note:-
To explore more options you can the command ./dump1090 --help. The best thing is that the script is open source so you can modify it as per your desires.
 







 

Sniffing for GSM packets

GSM network works on a frequency 850-900 MHz. In other words we can sniff the packet transfer between the phone and a GSM tower with an rtl-sdr dongle.

How to?
At first you might have to get the dependences:
  • apt-get –y install git-core autoconf automake libtool g++ python-dev swig libpcap0.8-dev
  • apt-get install gnuradio gnuradio-dev cmake git libboost-all-dev libusb-1.0-0 libusb-1.0-0-dev libfftw3-dev swig python-numpy libpcsclite-dev 
Now you will need to get libosmocore:
  • git clone git://git.osmocom.org/libosmocore.git
  • cd libosmocore
  • autoreconf –i
  • ./configure
  • make
  • make install
  • ldconfig
  • cd ..
Now you will need airprobe:

  • git clone https://github.com/ksnieck/airprobe.git
At the end you might have to install the gsmdecoder:

  • cd airprobe/gsmdecode
  • ./bootstrap 
  • ./configure
  • make
  • cd ..

At last you might have to install the receiver:

  • cd airprobe/gsm-receiver
  • ./bootstrap
  • ./configure
  • make


Now to start the sniffing:
  • python gsm_receive_rtl.py -s 1e6
Now open wireshark and set the interface to lo(loopback). And set the filter to gsmtap so that you only get the gsm packets.




Note:- 
If you don't get packets change the frequency with the gnu radio GUI. If you want to know more you can refer to this article. You might have to add a few more dependencies if you are using other distributions of Linux.