Now days, smartphones and tablets are most the popular gadgets. If we see recent stats, global PC sale has also been decreasing for the past few months. The reason behind this is that people utilize tablets for most of their work. And there is no need to explain that Android is ruling global smartphone and tablet markets. Android is most popular mobile OS with more than 60% market share.
So, companies are now focusing on bringing their software as a mobile app for Android. These apps include office apps, photo editing apps, instant messaging apps and penetration testing apps. If you have an Android smartphone, you can start your next penetration testing project from your Android phone. There are few android apps that can turn your Android device into a hacking device. Although, these apps have so many limitations and can only be used for few specific tasks. You can never get the same experience as you get with your PC. But smaller jobs can be performed. Apps for penetration testers are not available widely, but hackers can enjoy this platform in a better way. There are many Wi-Fi hacking and sniffing apps available.
As we already said that Android is ruling smartphone and tablet markets, developers are also creating more apps for Android devices. This is the reason why the Android market has millions of apps. Like websites, apps also need penetration testing to check for various vulnerabilities. Security testing for Android apps will need to have a penetration testing environment on your Android device.
- These apps are not for beginners because expertise is needed on the Android platform.
- Most of the apps work on Rooted Android devices. So root your Android device first. If you are not sure how to do it, learn how to by, reading one of the many sites available to help with this process.
- You will lose your device’s warranty if you root it, so think twice before proceeding.
- These apps can also harm your Android device. So please try these apps at your own risk.
In this detailed post, we will see various apps for web application penetration testing, network penetration testing, sniffing, networking hacking and Android apps penetration testing.+
TaiG 2.1.3 para el Jailbreak iOS 8.3
Hace un par de dias TaiG ha puesto a disposición de todos los que quieren JailBreak, la versión 2.1.3 de su herremienta para hacer JailBreak a iOS 8.3. Con esta nueva versión han corregido problemas, el principal es el problema que muchos tenian bastabtes usuarios, que se quedaba atascado el proceso de instalar el jailbreak en el 20% o el 60% dependiendo la versión de iTunes que estuviera instalada en vuestro ordenador.
Esta nueva versión ademas es compatible con la actualización de Cydia substrate, así que ya tendrás menos problemas a la hora de instalar Tweaks en tu dispositivo y tendrás un Jailbreak mucho más estable, cosa que se agradece.
Haciendo un pequeño resumen estas serian todas las mejoras introducidas en esta actualización:
– Soluciona los errores de atasque en el 20% o 60% del proceso de instalación del Jailbreak en las versiones más modernas de iTunes.
– Compatible con la actualización de Cydia Substrate
– Corrige el problema del menú en blanco si emparejabas un Apple Watch con el iPhone
– Solucionas los problemas con la caché
Descargar TaiG 2.1.3 AQUÍ
iOS 9 vs iOS 8: What’s new?
iOS 8’s Search feature is one that we find ourselves using quite often, and has come a long way since the pre-iOS 7 days. In iOS 8, you can use Search to search Wikipedia, find the latest news, nearby places, apps from the App Store, songs from the iTunes Store and suggested websites, as well as your contacts, messages, emails and notes. Siri and Search are about to get a lot better in iOS 9.
The company apparently wants to offer a range of additional information and features based on the users habits and an understanding of context, making your iPhone a “proactive assistant”. Search will also display categories of nearby places including food, drink, shopping and fun. You’ll also be served with trending news story based on your current location so you’re always in the loop.
About two months ago, Apple released iOS 7.1 with some new features and to patch the famous Evasi0n 7 jailbreak vulnerability. Ever since of the release iOS 7.1 we haven’t seen any public release of iOS 7.1 jailbreak. But we have seen some videos of Jailbreaking an iPhone 4 on iOS 7.1. Earlier today, a famous hacker i0n1c has posted a picture of Jailbroken iPhone 5C running Cydia and iOS 7.1.1.
Before you get excited, please stay calm because it is just an image of iPhone 5C jailbroken iOS 7.1.1 (showed above) and not the public release of the iOS 7.1 jailbreak and I think that the public version of iOS 7.1 Jailbreak will not be out until the release of the next big iOS 8.
I0n1c has been out of the jailbreak since the release of the iOS 4.3, he worked for the iOS 4.1.3 but after that he has only been criticizing the jailbreak hackers specially the Evad3rs team. So, you should not expect too much from this developer. So, this photo will probably be just a teaser from the hacker. On the other hand, he may release the public jailbreak for iOS 7.1.1 but it is highly unlikely. What do you think about this photo? Let me know in the comments section below.
Users on a jailbreak subreddit have discovered a new kind of malicious software on iOS phones. The malware, which comes as a library called unfold.dylib, was uncovered after a Reddit user complained of crashes in Google Hangout and Snapchat.
The threat, which has been nicknamed “unflod baby panda,” is rumored to be of Chinese origin. There are several factors that support this theory. According to German mobile security firm SektionEins, the infection is digitally signed with an iPhone developer certificate under the name Wang Xin. Also, the malware, which steals the Apple ID and password of users, sends the information in plain text to 22.214.171.124, which appears to be a Chinese website from the error message it displays. However, these could all be fake. SektionEins even raised the possibility of certificate theft. So for now, no one knows where the malware came from and how it got into iOS devices.
There is currently no tool available that allows users to jailbreak iOS 7.1. Apple has patched several vulnerabilities in iOS 7.1, which has killed the evasi0n7 jailbreak, which allowed users to jailbreak iOS 7 – iOS 7.0.6.
Though hackers have demonstrated a jailbreak for iOS 7.1 on iPhone 4S and iPhone 4, it seems unlikely that they will release a jailbreak anytime soon. evad3rs, hackers behind the evasi0n7 jailbreak have said that they don’t plan to work on a jailbreak for iOS 7.1.
Please note that any site claiming to have a jailbreak for iOS 7.1 is a scam, so stay clear from such sites. If there is a jailbreak for iOS 7.1, it will be available for free, so beware!
Core utilities Darwin tools
iPhone Firmware Libnet
APT Berkeley DB
Debian packager diskdev-cmds Gawk
Link identity editor
Bourne again shell
Cydia installer Dev-Team dns2tcp gettext
GNU privacy guard
iBrowser libffi libutil Lynx
Darwin CC Tools developer-cmds Docs
GNU C Compiler GNU PG errors
inetutils libgcc libxml2 Make
Although we cannot get more robust applications loaded onto the iPod touch, such as Core IMPACT or HP WebInspect, there are still some good applications available. For example Nikto open-source (GPL) Web server scanner version information; Nikto is a Perl application available for download at http://cirt .net/nikto2.
Ranked #12 of the top 100 network security tools by Insecure.org, Nikto will scan a server for configuration files, cgi applications, outdated version information, and a multitude of other bits of data that can be useful in a penetration test. Although most of the work done by Nikto focuses on information gathering, it does a pretty good job of identifying potential vulnerabilities when found.
Unfortunately, the iPod touch’s wireless chip cannot be placed into promiscuous or monitor mode, meaning we cannot obtain wireless data necessary to conduct brute force attacks against wireless access points using encryption. There are other mobile devices that can be set for promiscuous or monitor mode, so if a brute force attack is an absolute necessity, there are options available. However, there is an application that can intercept traffic on a wireless network called “Pirni,” written by Axel Moller also available through Cydia.
The program is configured to intercept all traffic intended for the default router (192.168.1.1 in this particular network) through ARP spoofing. Based on the Berkley Packet Filter (BPF) values, the only traffic that will be collected is TCP segments leaving the network, destined for port 80. The BPF can be modified to capture whatever type of traffic we are after. The Regex Options are used to immediately capture interesting packets, such as usernames and passwords.