Search This Blog

Thursday 18 December 2014

Top 12 Android Apps toTurn Your Smartphoneinto a Hacking Dev

Mobile devices is now very common
now a days and mobile devices has
changed the way of bi-directional
communication. There are many
operating system for mobile devices
available but the most common and the
best operating system for mobile is
Android, it is an OS means you can
install other applications (software''s) on
it. In Android application usually called
apps or android apps.

The risk of hacking by using mobile
devices is very common and people are
developing and using different apps
(application) for their hacking attack.
Android has faced different challenges
from hacking application and below is
the list of application for android
hacking.

1. SpoofApp

Here is an app that spies at heart could
use – SpoofApp. It allows you to use a
fake Caller ID – a number that you are
free to specify yourself, in order to
protect your privacy or to pull a prank
on someone. Sounds like fun, doesn’t it?
Well, Apple didn’t think so, which is why
it never allowed the app to enter its App
Store. Google, however, didn’t mind,
which is why SpoofApp was available on
the Android Market for about two and a
half years. However, it was banned from
there last year as it allegedly was in
conflict with The Truth in Caller ID Act
of 2009.This can be useful in social
engineering.

2. FaceNiff

Requirements: Android 2.1+ (rooted)
FaceNiff is an Android app
that allows you to sniff and intercept
web session profiles over the WiFi
that your mobile is connected to.
It is possible to hijack sessions only
when WiFi is not using EAP, but it
should work over any private networks
(Open/WEP/WPA-PSK/WPA2-PSK). It’s
kind of like Firesheep for android.
Maybe a bit easier to use (and it works
on WPA2!). Please note that if webuser
uses SSL this application won’t work.
Legal notice: This application is for
educational purposes only. Do not try to
use it if it’s not legal in our country. I
do not take any responsibility for
anything you do using this application.
Use at your own risk

3. Penetrate

Requirements: Android 2.1+ (rooted)
The most of the times you
scan the Wi-Fi networks available
around, they’re protected with key.
Penetrate is an app that help you out
with that. If the routers of that Wi-Fi
networks are encrypted with WEP/WPA
it will bring you the keys to access them.
This seems a sort of cracking, but the
developers says it isn’t, because it’s
supposed to get the keys for penetration
testing and you should use it only with
permission from network owners. Well,
apart from those regardings, it does
what it says. Check the developer
description to know which routers are
supported.
Take in account that if you have an
antivirus installed in your device, it will
warn you about this app. The developer
says it’s normal because it’s a security-
related tool. Penetrate isn’t a danger for
your phone.
This is the paid version (€1.99) that
contains no ads, some more features
and sponsors further development.
What’s more, it allows you to use 3G to
get the password instead of using
dictionaries that you will have to
download in the free version.
Penetrate works properly with the range
of routers supported. We’re missing
more though. Despite the apparent use
for which it was developed this
application, we all know the “regular”
use. And if you’re looking for it, give it a
chance. It’s a great app.

4. Anti-Android Network Toolkit

Requirements: Android 2.1+ (rooted)
Anti-Android Network Toolkit is an app
that uses WiFi scanning tools to scan
networks. You can scan a network you
have the phone connected to or you can
scan any other nearby open networks.
Security admins can use Anti to test
network host vulnerabilities to DoS
attacks and other threats.

5. Andosid

AnDOSid is the application which is
used for DOS attacks from Android
mobile phones.

6. Nmap For Android

Nmap is a network scanner tool which
gives the entire information of the ip
address and website. There is a version
of nmap for Android users too, with the
help of this app hackers can scan the
ip''s through mobiles.

7. The Android Network Toolkit

The Android Network Toolkit is an
complete tool kit for the pentesters ,
where hackers can find expolots using
the mobile and penetrate or attacks the
ip''s according to their vunerabilities.

8. SSHDroid- Android Secure Shell

Secure shell or SSH is the best protocol
that provides an extra layer of security
while you are connecting with your
remote machine.SSHDroid is a SSH
server implementation for Android.
This application will let you to connect
to your device from a PC and execute
commands (like ''terminal'' and ''adb
shell'').

9. WiFi Analyzer

WiFi Analyzer is one of the most popular
applications in the Android Marketplace,
which is really a testament to how wildly
useful this tool is for both the average
user and the more technically inclined.
In the most basic of terms, WiFi
Analyzer is a tool to scan the area for
WiFi networks and determine which
channel is the least populated so you
can adjust your own hardware to a less
congested part of the spectrum.

10. ConnectBot

ConnectBot is an exceptionally well done
SSH/Telnet client, which also acts as a
terminal emulator for the local Linux
sub-system. While there are better
terminal emulators (though not for
free), there is no question that
ConnectBot is the absolute best SSH
client available for Android.

11. Network Discovery

Network Discovery is a handy tool for
finding and enumerating devices on
public WiFi networks. Network Discovery
uses a simple ping scan to find hosts on
the network, and then allows the user to
select one of the found hosts to target
for a TCP connect() scan.

12. dSploit

dSploit is an Android network analysis
and penetration suite which aims to
offer to IT security experts/geeks the
most complete and advanced
professional toolkit to perform network
security assesments on a mobile device.
Once dSploit is started, you will be able
to easily map your network, fingerprint
alive hosts operating systems and
running services, search for known
vulnerabilities, crack logon procedures
of many tcp protocols, perform man in
the middle attacks such as password
sniffing ( with common protocols
dissection ), real time traffic
manipulation, etc, etc .

No comments:

Post a Comment

Translate