Nexus 7 Infinity
Nexus 7 Infinity
Network hacking
infinity
CTJB 2014
root@PwnPad:~# whoami
infinity
Kamil Vavra
twitter.com/vavkamil
github.com/vavkamil
sprvce st
Mendelova univerzita v
Brn
Presentation Transcript
xexexe
Presentation Transcript
Defensive
xexexe
Offensive
xerexexe
Evolution
Evolution
Evolution
Evolution
Instalace
https://www.pwnieexpress.com/community/
Instalace
infinity@desktop:~$ tar xvf pwnpad-2013_image.tar.xz
infinity@desktop:~$ cd pwnie_img/
infinity@desktop:~/pwnie_img$ sudo chmod +x imagev2.sh
infinity@desktop:~/pwnie_img$ sudo adb start-server
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
infinity@desktop:~/pwnie_img$ sudo ./imagev2.sh
Fastboot Android utilities are required to flash the PwnPad image onto the Nexus7
android-tools-adb android-tools-fastboot
Would you like to automatically install the required tools? (Ubuntu 12.04 only)
1. Yes
2. No
Choice: 2
Not installing fastboot and adb tools
Instalace
Which Nexus 7 (2012 HW) would you like to install the
PwnPad onto?
1. 8GB
2. 16GB
3. 32GB Wifi
Choice (1-4): 2
Instalace
=== Pwn Pad 2014 Installer ===
A Mobile Pentesting platform by PwnieExpress.com
------------------------------------------------------------------WARNING: THIS WILL WIPE ALL DATA ON THE DEVICE!
Pwnie Express is not responsible for data loss resulting from the
use of this installer. Backup critical data before continuing!
------------------------------------------------------------------Press ENTER to continue, CTRL+C to abort.
Boot the device into fastboot mode (hold power and volume down).
Attach the device via USB once in fastboot mode.
Press [Enter] key to continue...
Instalace
[+] Unlock the device
...
(bootloader) Bootloader is already unlocked
OKAY [ 0.020s]
finished. total time: 0.020s
[+] Flash the recovery partition with TWRP recovery image
sending 'recovery' (8106 KB)...
OKAY [ 8.655s]
writing 'recovery'...
OKAY [ 2.563s]
finished. total time: 11.218s
Instalace
[+] Erase the boot partition
erasing 'boot'...
OKAY [ 0.026s]
finished. total time: 0.026s
[+] Flash the boot partition with Pwn Pad boot image
sending 'boot' (4898 KB)...
OKAY [ 5.211s]
writing 'boot'...
OKAY [ 0.322s]
finished. total time: 5.533s
Instalace
[+] Erase and format system partition
******** Did you mean to fastboot format this partition?
erasing 'system'...
OKAY [ 0.307s]
finished. total time: 0.307s
erasing 'system'...
OKAY [ 0.107s]
formatting 'system' partition...
Creating filesystem with parameters:
Size: 681574400
Block size: 4096
Blocks per group: 32768
Inodes per group: 6944
Inode size: 256
Journal blocks: 2600
Label:
Blocks: 166400
Block groups: 6
Reserved block group size: 47
Created filesystem with 11/41664 inodes and 5415/166400 blocks
sending 'system' (12416 KB)...
writing 'system'...
OKAY [ 13.989s]
finished. total time: 14.097s
Instalace
[+] Erase & format the user data partition
******** Did you mean to fastboot format this partition?
erasing 'userdata'...
OKAY [ 11.318s]
finished. total time: 11.318s
erasing 'userdata'...
OKAY [ 2.311s]
formatting 'userdata' partition...
Creating filesystem with parameters:
Size: 14569963520
Block size: 4096
Blocks per group: 32768
Inodes per group: 8160
Inode size: 256
Journal blocks: 32768
Label:
Blocks: 3557120
Block groups: 109
Reserved block group size: 871
Created filesystem with 11/889440 inodes and 97309/3557120 blocks
sending 'userdata' (137563 KB)...
writing 'userdata'...
OKAY [158.601s]
finished. total time: 160.912s
Instalace
[+] Booting into TWRP Recovery
downloading 'boot.img'...
OKAY [ 8.645s]
booting...
OKAY [ 0.019s]
finished. total time: 8.664s
Current serial number of connected Nexus is: 015d49069c53fa09
Instalace
Rebooting recovery....
Restoring PwnPad image....Please wait for device to reboot.
DO NOT INTERUPT THE PROCESS ON THE DEVICE,
TWRP WILL DISPLAY RESTORE COMPLETE BUT
PROCESS WILL NOT BE FINISHED UNTIL IT REBOOTS
ON ITS OWN
Kismet
more_stuff
Phishing
Hacking
Vchoz prosted
Vchoz prosted
Vchoz prosted
Vchoz prosted
Vchoz prosted
Vchoz prosted
Alfa
Alfa2
Zvody ve zbrojen
Wifi Tracker ~
Hacker's Keyboard ~
Bluetooth
[09/09/14 11:06:33] Scan started on 00:10:60:D1:85:76
[09/09/14 11:06:38],B8:5E:7B:9D:0D:CD,0x5a020c,Galaxy Note3
[09/09/14 11:06:45],B8:C6:8E:C2:2D:5D,0x5a0204,S5610
[09/09/14 11:06:59],BC:47:60:92:5A:46,0x5a0204,Manicka 1997
[09/09/14 11:07:04],00:1D:98:4C:86:DE,0x5a0204,Hanicka
[09/09/14 11:07:08],E0:A6:70:6E:C9:81,0x5a0204,Nokia 2730
classic
[09/09/14 11:07:13],A0:82:1F:5C:78:4B,0x5a020c,Mrs.Kejt
[09/09/14 11:07:53],34:C3:AC:91:AE:E2,0x5a0204,C3050
[09/09/14 11:08:05],30:69:4B:CD:BF:8E,0x7a020c,BlackBerry
9700
[09/09/14 11:08:12],A8:44:81:65:01:E2,0x520204,206
Bluetooth
BD Address:
Device class:
BD Address:
Device class:
BD Address:
Device class:
BD Address:
Device class:
MITMf
https://github.com/byt3bl33d3r/MITMf
Spoof - Redirect traffic using ARP Spoofing, DNS Spoofing or ICMP Redirects
MITMf
package com.kalipwn.mitmf;
import android.os.Bundle;
import android.app.Activity;
import android.content.Intent;
@Override
super.onCreate(savedInstanceState);
i.addCategory(Intent.CATEGORY_DEFAULT);
startActivity(i);
finish();
MITMf
loggedURL=http%3A%2F
%2Femail.seznam.cz&serviceId=email&forceSSL=1&username=teest1&domai
n=post.cz&password=heslo12345&js=1
Apps
B10N1C
B10N1C
dangerousthings.com
dangerousthings.com
dangerousthings.com
adb shell
cd /data/data/com.android.providers.settings/databases
sqlite3 settings.db
sch3m4/androidpatternlock
################################
# ---------------------------- #
http://safetybits.net
################################
v0.1
@sch3m4
#
#
#
#
sch3m4/androidpatternlock
sch3m4/androidpatternlock
[+] Gesture:
sch3m4/androidpatternlock
zANTI
zANTI
RFID cooking
Github
https://github.com/vavkamil/Pwn-Pad-Arsenal-Too
ls