Tag Archives: hack

El nuevo IOS11 de Apple


Después del lanzamiento de la versión en pruebas el pasado mes de julio, la versión definitiva de iOS 11 estará disponible a partir de hoy mismo. Apple no acostumbra a fijar una hora exacta, pero si sigue el patrón habitual aparecerá una notificación en los dispositivos de los usuarios a partir de las 10 de la mañana en Cupertino y sobre las 19 horas en España.

¿Qué novedades presenta iOS 11?

Son numerosas y diversas, algunas exclusivas para el iPhone X y otras disponibles también para el resto de dispositivos. De algunas ya pudimos ver una pequeña muestra la semana pasada en la presentación de los nuevos terminales, como el Face ID, los animojis o la realidad aumentada en el modelo más caro. Otras, en cambio, deberemos esperarnos hasta tener el nuevo software para disfrutar de ellas.
Más allá de los emoticonos animados y de la posibilidad de desbloquear el teléfono con el rostro, con iOS 11 también dispondremos de un nuevo centro de control más personalizado y completo, podremos grabar lo que ocurre en nuestra pantalla y editar las imágenes y los vídeos obtenidos y gestionar nuestro contenido con la aplicación Archivos.

Continue reading


10 Herramientas populares para hackear contraseñas

aircrack

Las contraseñas son algo necesario hoy en día para proteger nuestras cuentas de usuarios no autorizados. Además, no cualquier contraseña es capaz de protegernos de los piratas informáticos, sino que, a parte de las medidas de seguridad que debe incluir el propio servidor, es necesario que nosotros mismos utilicemos una contraseña larga, completa y segura de manera que esta no pueda ser crackeada o descifrada con las sencillas herramientas que vamos a ver a continuación.

Descifrar, o crackear, contraseñas es el proceso por el cual se adivina o recupera una clave que se encuentra almacenada en un servidor u oculta en un determinado archivo. En las pruebas de Pentesting, el descifrado de las contraseñas es una de las pruebas más importantes para comprobar si nuestro sistema es seguro o, de lo contrario, un atacante podría hacerse con el control del mismo, por lo que, para poder comprobar si nuestras plataformas son seguras, a continuación, os vamos a listar las 10 herramientas más utilizadas por hackers e investigadores de seguridad para llevar a cabo pruebas de resistencia y descifrado de las mismas.

Este artículo está creado solo con fines educativos. Utilizad las aplicaciones siempre en infraestructuras propias y con permiso del administrador.

Las 10 mejores herramientas para Windows, Linux y basadas en web para descifrar o adivinar contraseñas

A continuación, os mostramos una sencilla recopilación con las 10 aplicaciones mejor consideradas por los hackers para el trabajo intensivo con contraseñas.

Brutus

Brutus es una de las aplicaciones más antiguas para crackear contraseñas. Publicada en el año 2000, esta herramienta es compatible con una gran cantidad de protocolos diferentes, como HTTP, FTP, POP3, SMB, Telnet, NNTP, IMAP y NetBus, entre otros muchos. Además, una de las características más interesantes de Brutus es que es posible pausar y reanudar los ataques de fuerza bruta cuando queramos sin tener que empezarlos de cero.

Cain and Abel

Esta herramienta ha sido diseñada para facilitar la recuperación de varios tipos de contraseñas mediante distintas técnicas, como análisis de paquetes de red, decodificación de claves, ataques de fuerza bruta, ataques de diccionario, criptoanálisis y recuperación de claves de la caché, entre otras técnicas.

Esta aplicación no explota ninguna vulnerabilidad, sino que busca la obtención de las contraseñas por técnicas convencionales.

Continue reading


HOW TO ROOT ANDROID

Kingo Android Root offers every Android user the easiest one-click method to root any Android devices. How to use this universal Android root software to root your Android device? Here we go.

Make sure you get everything right beforehand.

  • Device powered ON
  • At least 50% battery level
  • Internet connection necessary
  • USB Cable (the original one recommended)

Step 1: Install Kingo Android Root.

Kingo offers the best one-click Android root software for free. Just download and install it now.

Step 2: Double click the desktop icon of Kingo Android Root and launch it.

After launching Kingo Android Root, you will see its interface as shown below.

Kingo Android ROOT

Continue reading


News and info on IOS 8.3 and 8.4 Jailbreak

Lots of new tidbits of information is beginning to surface regarding a potential jailbreak for iOS 8.3 and iOS 8.4, and the future of jailbreaking with iOS 9, which will presumably be released in beta form after the WWDC keynote on Monday, June 8th, 2015.

iDigitalTimes’ Cammy Harbison’s interview with TaiG member Ray Xie, revealed that the TaiG team is setting its sights on iOS 9 with regard to future jailbreaks. Not long after that interview went live, news began to leak out that Pangu, the other Chinese team responsible for some of the more recent jailbreaks, was preparing a jailbreak release for iOS 8.3 right after the release of iOS 8.4.

Continue reading


iOS 7.1 Jailbreak Expectations

20140504-113708.jpg

If there’s one thing that we have learned over the last few years, it’s that, rightly or wrongly, the jailbreak community expects a lot. The majority of the complexities involved in researching vulnerabilities, exploiting those bugs and then tying it all nicely together into a jailbreak package capable of mass distribution are abstracted away from the end-user. This is undoubtedly how it should be, but the trade-off is that users become impatient and irritable due to a lack of understanding of the process and how much work is actually involved in effectively producing a jailbreak from scratch once Apple have slammed the security door in our faces.

First and foremost we expect to see a first glimpse of iOS 8 at this year’s Worldwide Developer Conference (WWDC) in June. We also expect to see a first developer seed going live to registered developers during the course of WWDC week. A public version of iOS 8 will likely ship with the iPhone 6 sometime in September or October. That’s approximately six or seven months in the future, so we of course expect to see an untethered 7.1 solution made available before then – all going well. However, if the first seed of iOS 8 is found to have exploitable vulnerabilities in then the Evad3rs could potentially make the call to hold off on iOS 7 and focus attention on liberating iOS 8 with the hope that any vulnerabilities are not patched as part of the process of going from beta to public.

iOS 7.1 Jailbreak with Evasi0n?

If the Evad3rs team are involved in the research or production of an iOS 7.1 untether, which we expect them to be, then it’s highly likely that we will see an updated version of Evasi0n7 shipping. The distributed tools and software that makes jailbreaking possible on a mass scale has improved exponentially over the years. What used to be a laborious and overly technical process has now been condensed into a single one click solution (where possible).
Continue reading


Beware of unflod virus on jailbroken devices!!!

20140421-221138.jpg

Users on a jailbreak subreddit have discovered a new kind of malicious software on iOS phones. The malware, which comes as a library called unfold.dylib, was uncovered after a Reddit user complained of crashes in Google Hangout and Snapchat.
The threat, which has been nicknamed “unflod baby panda,” is rumored to be of Chinese origin. There are several factors that support this theory. According to German mobile security firm SektionEins, the infection is digitally signed with an iPhone developer certificate under the name Wang Xin. Also, the malware, which steals the Apple ID and password of users, sends the information in plain text to 23.88.10.4, which appears to be a Chinese website from the error message it displays. However, these could all be fake. SektionEins even raised the possibility of certificate theft. So for now, no one knows where the malware came from and how it got into iOS devices.
Continue reading


Jailbreak iOS 7.1: Everything I know

20140418-143017.jpg

There is currently no tool available that allows users to jailbreak iOS 7.1. Apple has patched several vulnerabilities in iOS 7.1, which has killed the evasi0n7 jailbreak, which allowed users to jailbreak iOS 7 – iOS 7.0.6.
Though hackers have demonstrated a jailbreak for iOS 7.1 on iPhone 4S and iPhone 4, it seems unlikely that they will release a jailbreak anytime soon. evad3rs, hackers behind the evasi0n7 jailbreak have said that they don’t plan to work on a jailbreak for iOS 7.1.
Please note that any site claiming to have a jailbreak for iOS 7.1 is a scam, so stay clear from such sites. If there is a jailbreak for iOS 7.1, it will be available for free, so beware!


Hacking with mobile devices PART IV (FINAL)

20140415-175740.jpg

DATA SMUGGliNG

Collecting data at a remote site requires that we remove it somehow – if we have a continuous connection, such as a reverse shell, then we can collect the data real time. However, if we deposit our mobile device with the intention of concealing it for an extended period of time, then we need to worry about a few issues as follows:
1. Preventing discovery of our collected data while on-site
2. Providing concealment during the duration of the event
3. Extracting the data safely

Encryption

If we use mobile devices to collect and transmit data, we should be selective in our choices of devices and ensure that they are capable of encrypting any data at rest or in motion. Earlier models of most mobile devices are incapable of full disk encryption, which puts the device and us at risk if discovered and forensically examined; we, therefore, need to look for devices that will allow us to keep our
activities secret or provide a mechanism for covering our tracks if discovered.

Data at Rest

The newer mobile devices claim to provide something similar to full disk encryption. Although the ability of these devices to be able to protect data against forensic analysis is questionable, the devices are getting better at addressing the security of data at rest. We can do a few additional tasks to encrypt data at rest on our mobile devices to increase our comfort level about our hacking data.
Naturally, we cannot encrypt scripts that we need to run during our collection or attack phases; however, once we have collected the data, we can encrypt the data using strong passwords. The program gpg is one method of securing a file through symmetric encryption. It is possible to encrypt a file with the GNU Privacy Guard (GNU PG) application, which can be installed on a jailbroken iPod touch.
Continue reading


Tools Installed on iPod Touch Through Cydia for Hacking

20140410-140014.jpg

adv-cmds
Base structure
Core utilities Darwin tools
Diff utilities
Find utilities
GNU cryptography
Grep
iPhone Firmware Libnet
Libxslt
mDNSResponder
APT Berkeley DB
csu
Debian packager diskdev-cmds Gawk
GNU debugger
gzip
less
libpcap
Link identity editor
Metasploit
AutomaticSSH
Bourne again shell
Cydia installer Dev-Team dns2tcp gettext
GNU privacy guard
iBrowser libffi libutil Lynx
Mobile substrate
Backgrounder bzip2
Darwin CC Tools developer-cmds Docs
GNU C Compiler GNU PG errors
inetutils libgcc libxml2 Make
nano

Continue reading


%d bloggers like this: