A GUIDE FOR ANDROID HACKING TOOLS
LIST OF FAVORITE APPS
NOTE: YOU NEED ROOT FOR THESE APPS!!
1. MAC ADDRESS:Mac Address Spoofing: This app lets you change your wifi Mac Address. It is no longer availabe ANYWHERE!
2. NETWORK MAPPER:Network Mapping: This tool lets you scan a network for live hosts and check for open ports.
3. SHARK ROOT AND SHARK READER:Shark is a popular port (or simular) to WireShark (Based of TCPDUMP). It lets you log network traffic and analyze it on your device!
This is the logger: https://market.android.com/details?i...=search_result
This is to read the logs: https://market.android.com/details?i...from_developer
Below are some of the best hacking apps for android. Real hacking apps!
Many says these are a lot more effective than most Linux apps!
4. FACENIFF:Session Hijackers: Pwning Facebook was never so easy! This is by far one of my favorite apps! Faceniff is a Session Hijacker like Firesheep or hamster/ferret but BETTER. No more need to use cain and able and firesheep to hijack. Also who would suspect a cell phone as a hacking tool? Devlish Faceniff will sniff the network and display active sessions and Hijack them! It can hijack the following -
NOTE: It is a paid application.
5. DROID SHEEP:Another Hijacking Apps: Droid sheep does the same as above and the author is working on SSL Stripping as well! I personally prefer this over Faceniff! Get it here
ULTIMATE HACKING TOOLS6. ANTI - AKA: Android Network Tool Kit:
Anti can do a LOT! Here is the description from the website:
[+] Scan - This will scan the selected target for open ports and vulnerabilities, also allowing the user to select a specific scanning script for a more advanced/targeted scan.
[+] Spy - This will 'sniff' images transferred to/from the selected device and display them on your phone in a nice gallery layout. If you choose a network subnet/range as target, then all images transferred on that network - for all connected devices - will be shown. Another feature of the Spy plugin is to sniff URLs (web sites) and non-secured (ie, not HTTPS) username/passwords logins, shown on the bottom drawer.
[+] D.O.S - This will cause a Denial Of Service (D.O.S) for the selected target, ie. it will deny them any further access to the internet until you exit the attack.
[+] Replace images - This will replace all images transferred to/from the target with an Anti logo, thus preventing from attacked used seeing any images on their browsers while the browse the internet, except for a nice looking Anti logo...
[+] M.I.T.M - The Man In The Middle attack (M.I.T.M) is an advanced attack used mainly in combination with other attack. It allows invoking specific filters to manipulate the network data. Users can also add their own mitm filters to create more mitm attacks.
[+] Attack - This will initiate a vulnerability attack using our Cloud service against a specific target. Once executed successfully, it will allow the attack to control the device remotely from your phone.
[+] Report - This will generate a vulnerability report with findings, recommendations and tips on how to fix found vulnerabilities or bad practices used.
Anti supports & uses the followings OSS tools :
We will be releasing patch sets for OSS shortly. This should assist developers to compile binaries used by Anti!
Anti Can Steal SSL Encrypted logins (GMAIL ETC), Anti uses driftnet to spy on images a slave computer is viewing, Anti Can Brute Force passwords and even remote exploit a computer using metasploit! Anti also uses nmap to map targets and uses OS Detection! Not to mention anti has the ability to DOS a network. The only downside is that if you want to use a Metasploit hackable computer you need to buy credits however everything else works! I hosted so it stays live.
7. WIFIKILL:This is a simple Denial Of Service App. It will let you either completely freeze a users Internet access or DOS the whole network! Here is the app (Also Unreleased Beta).
WEP KEY and WPA KEY8. PENETRATE PRO:
Penetrate calcultes WEP/WPA keys for some wireless routers and allows you to unlock them. Watch Me
9. ROUTER KEYGEN:
Router Keygen gets WEP/WPA keys for some wireless routers and let you unlock them.Watch Me
I am pretty sure this is why android is a growing hacking platform. Best of all no computers necessary. True mobile hacking.
DO NOT ABUSE SUCH COOL APPS. Ok
DO NOT ABUSE SUCH COOL APPS. Ok