Top Android Mobiles For Hackers~

Best Android Mobiles For Hacking And Pentesting 
Hey Guys Whats Up ? as you can read the title that i am going to share some popular Android Mobiles for hacking and pentesting..

Ok , Lets Get BuZZzZy!

Ok Lemme start it with Samsung ;D
Samsung Galaxy S2
Samsung Galaxy S2 Plus Price Pakistan
OS  Android OS, v4.1.2 (Jelly Bean) 
 Memory  8GB built-in, 1GB RAM, microSD card (supports up to 64GB) 
 Processor  Dual core 1.2 GHz, Broadcom BC28155 Chipset 

Qmobile Noir A20

Qmobile Noir A20 Price Pakistan
OS  Android OS, 4.1 Jelly Bean 
 Memory  4GB built-in + 8GB card included in box1GB RAM, microSD card(supports up to 32GB) 
 Processor  Quad-core 1.2 GHz, ARMv7 Chipset, GPU (PowerVR SGX) 

Qmobile Noir A50

Qmobile Noir A50 Price Pakistan
OS  Android Jelly Bean (v 4.1) 
 Memory  4GB ROM, 512 RAM, microSD card (supports up to 32GB) 
 Processor  1GHz Dual Core 

Huawei Ascend G510 U8951

Huawei Ascend G510 U8951 Price Pakistan
OS  Android OS, v4.1 (Jelly Bean) 
 Memory  4GB built-in, 512MB RAM, microSD card(supports uo to 32 GB)  
 Processor  Dual core 1.2 GHz Cortex-A9 

Sony Xperia L 

Sony Xperia L Price Pakistan
OS  Android OS, v4.1 (Jelly Bean
 Memory  8GB built-in 1GB RAM, microSD Card (supports up to 32GB) 
 Processor  Dual-core 1 GHz, Qualcomm MSM8230 Snapdragon Chipset 

Samsung Galaxy Note II

Samsung Galaxy Note II Price Pakistan
Android OS, v4.1.1 (Jelly Bean) 
 Memory  16/32/64GB built-in, 2GB RAM, microSD card (supports up to 64GB) 
 Processor  Quad-core 1.6 GHz Cortex-A9 

Samsung Galaxy S3

Samsung Galaxy S3 I9300 Price Pakistan
Android OS, v4.0.4 (Ice Cream Sandwich) 
 Memory  16/32/64GB built-in, 1GB RAM, microSD card (supports up to 64GB) 
 Processor  Quad-core 1.4 GHz Cortex-A9 + Mali-400MP GPU, Exynos 4212 Quad 

HTC One

HTC One Price Pakistan
OS  Android OS, v4.1.2 (Jelly Bean), upgradable to v4.2.2 (Jelly Bean) 
 Memory  32/64GB built-in, 2GB RAM 
 Processor  Quad-core 1.7 GHz Krait 300, Qualcomm APQ8064T Snapdragon 600 Chipset 

Sony Xperia Z

Sony Xperia Z Price Pakistan
OS  Android OS, v4.1.2 (Jelly Bean), planned upgrade to v4.2 (Jelly Bean) 
 Memory  16GB built-in 2GB RAM, microSD Card (supports up to 32GB) 
 Processor  Quad-core 1.5 GHz Krait, Qualcomm MDM9215M / APQ8064 Chipset 

How To Hack Targeted Server ?

How To Hack Your Victim’s Website ?

umm.. in this post i’ll tell you how to hack your victim’s website easily ;D
This method is very well-known method , used by around every hacker..
This Method Is Also Known As Reverse IP Hacking

In this method we will try to get access to other websites hosted on Same Server

Let the Game Begin ;D

First of all get the website you want to hack and than open CMD ( Command Prompt)
Open Start Menu => Run => type cmd in box
Or Simply Press Windows Logo Button + R 
than type cmd in box

Now type ping website address and hit enter

than you’ll get I.P Address of the website 
now goto bing.com and type
ip:xxx.xxx.xxx.xxx .php?id= 
replace xxx with I.P Address 🙂

it will give you all the websites hosted on the server 
now you can check them for SQL injection vulnerability…
Note:- After Getting Access Dont Forget To BUZZ The Serer ;D


kidsec.com
Zaid Sparrow

Network Security Toolkit v2.16.0-4104 Released


The Network Security Toolkit is bootable ISO live CD/DVD (NST Live) is based on Fedora. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86/x86_64 platforms. 

he main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of Open SourceNetwork Security Tools. An advanced Web User Interface (WUI) is provided for system administration, navigation, automation and configuration of many network and security applications found within the Network Security Toolkit distribution.

In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines. Network Security Toolkit also makes an excellent tool to help one with crash recovery troubleshooting scenarios and diagnostics.

Yaptest – Penetration Framework


It is a penetration testing framework that helps automate the boring parts of pentests.Yaptest aims to make it easy for a pentester to automate parts of testing on the fly. This is particularly useful when testing very large networks. Below are some examples of tasks which would be easy to automate using yaptest:
  • Run nikto on anything nmap thinks is an HTTP service
  • Run hydra on every host with TCP port 21 open
  • Attempt upload a file to any TFTP servers found
  • Run onesixtyone on all hosts that are up
  • Try metasploit’s solaris_kcms_readfile exploit against any hosts running kcmsd
Yaptest is the glue between your favourite tools and the knowledge base gathered during your pentest. It handles all the mundane stuff that can easily be automated and leaves you free to get on with owning boxes demonstrating risk using techniques that yaptest doesn’t know about yet.

Volatility 2.2 Framework –

The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer unprecedented visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.

Windows Basic


  • Current date, time, CPU count, CPU speed, service pack
  • Current thread and idle thread
  • Addresses of the KDBG, KPCR, DTB, PsActiveProcessHead, PsLoadedModuleList, etc


Processes


  • List active processes (column or tree view)
  • Scan for hidden or terminated _EPROCESS objects (using pool tags or _DISPATCHER_HEADER)
  • Enumerate DLLs in the PEB LDR lists
  • Rebuild/extract DLLs or EXEs to disk based on name, base address, or physical offset
  • Print open handles to files, registry keys, mutexes, threads, processes, etc
  • List security identifiers (SIDs) for processes
  • Scan for cmd.exe command history and full console input/output buffers
  • List process environment variables
  • Print PE version information from processes or DLLs (file version, company name, etc)
  • Enumerate imported and exported API functions anywhere in process or kernel memory
  • Show a list of virtual and physical mappings of all pages available to a process
  • Dump process address space to disk as a single file
  • Analyze Virtual Address Descriptor (VAD) nodes, show page protection, flags, and mapped files
  • Represent the VAD in tree form or Graphviz .dot graphs
  • Dump each VAD range to disk for inspecting with external tools
  • Parse XP/2003 event log records
Miscellaneous


  • Link strings found at physical offsets to their owning kernel address or process
  • Interactive shell with disassembly, type display, hexdumps, etc
  • And Much More , More Than Your Imagination ~

Server Analyser : Simple Server Malware Scanner

Server Analyser  is a service for detecting and analyzing web-based threats. It currently handles shells, obfuscated JavaScript, Executables, Iframes and port scans.

Featured added:
+ Logging scans
+ Just paste the results ( option 1 )
+ Added new Exploit methods to option 1
+ Latest infections ( will be updated automaticly )
+ Added PHP Shell detection exec()/system() etc. ( more will be added soon )
+ The code has been changed into a smaller one
+ Added new BlackHole methods
+ Added different javascript methods
+ Added decoded php syntaxes
+ gzinflate
+ var url
+ base64_decode
+ The Beta has been releases and uploaded
+ code improvements
+ fixed the dos2unix issue

Whonix ALPHA 0.4.5 – Anonymous Virtual operating system


IP/location.

Whonix consists of two machines, which are connected through an isolated network. One machine acts as the client or Whonix-Workstation, the other as a proxy or Whonix-Gateway, which will route all of the Whonix-Workstation’s traffic through Tor. This setup can be implemented either through virtualization and/or Physical Isolation.

Whonix advantages:
  • All applications, including those, which do not support proxy settings, will automatically be routed through Tor.
  • Installation of any software package possible.
  • Safe hosting of Hidden services possible.
  • Protection against side channel attacks, no IP or DNS leaks possible^3^ To test for leaks, see LeakTests.
  • Advantage over Live CD’s: Tor’s data directory is still available after reboot, due to persistent storage. Tor requires persistent storage to save it’s Entry Guards.
  • Java / JavaScript / flash / Browser Plugins / misconfigured applications cannot leak your real external IP.
  • Whonix does even protect against root exploits (Malware with root rights) on the Workstation.
  • Uses only Free Software.
  • Building Whonix from source is easy.
  • Tor+Vidalia and Tor Browser are not running inside the same machine. That means that for example an exploit in the browser can’t affect the integrity of the Tor process.
  • It is possible to use Whonix setup in conjunction with VPNs, ssh and other proxies. But see Tor plus VPN/proxies Warning. Everything possible, as first chain or last chain, or both.
  • Loads of Optional Configurations (additional features / Add-Ons) available.
  • Best possible Protocol-Leak-Protection and Fingerprinting-Protection.

THC IPv6 Attack Toolkit v2.0

The Hacker’s Choice (THC) has release version 2.0 of THC IPv6 Attack Toolkit. New tool added for scanning ipv6 networks. New tools for local network denial of service against Windows and BSD based systems. Made feature 6to4, VLAN-Q/801.1q and PPPoE injection features public. Various updates and fixes.

The THC IPV6 ATTACK TOOLKIT (THC-IPV6) is a complete tool set to attack the inherent protocol weaknesses of IPV6 and ICMP6, and includes an easy to use packet factory library.

THC’s IPv6 tools are made available under the GPLv3 and can be downloaded as a compressed source tarball for self compilation.

Arachni version 0.4.1.1


Arachni scanner updated to version 0.4.1.1 !! Arachni is an Open Source, feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. Arachni is smart, it trains itself by learning from the HTTP responses it receives during the audit process and is able to perform meta-analysis using a number of factors in order to correctly assess the trustworthiness of results and intelligently identify false-positives.

Unlike other scanners, it takes into account the dynamic nature of web applications, can detect changes caused while travelling through the paths of a web application’s cyclomatic complexity and is able to adjust itself accordingly. This way attack/input vectors that would otherwise be undetectable by non-humans are seamlessly handled by Arachni.

Change log:
  • Auditor#log and Auditor#log_remote_file bugfixed to pass a Hash of the response headers instead of a String — also solving another bug causing response bodies not to be logged in the Issues. [Issue #294]
  • Issue — Response headers are now always Hash.
  • Reports
    • HTML — Removed response headers handling code and added the option to not include HTTP response bodies. [Issue #296]
    • XML — Removed response headers handling code and added the option to not include HTTP response bodies. [Issue #296]
  • HTTP debugging output now includes Response data. [Issue #297]
  • Executables
    • arachni_rpcd_monitor — Laxed standards enforced on the Dispatcher URL argument. [Issue #293]
  • Path extractors
    • Added path extractor for the area HTML tag (href attribute). [Issue #300]