Sunday, 22 October 2017

Installing Penetration Testing Tools In Android Without Rooting

Android devices are portable where ever we go we carry our android phones with us. Adding the pen testing tools in android phones seems to be complicated like we need to grant Root access (superuser) privileges that void our warranty.
But we can make our smartphone into a pen testing device without rooting. And also we will get the application of Linux emulator for free in play store.

converting the android device into Hacker device

TERMUX: Termux is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed
automatically.
STEP 1: Go to play store and type termux and install the application.
STEP 2: Open the TERMUX app.
STEP 3: Type the command “termux-setup-storage”

INSTALLING NMAP :

STEP 1: Open the TERMUX app
STEP 2: Type the command “apt-get install nmap”
STEP 3: To open nmap just type “nmap”

INSTALLING METASPLOIT-FRAMEWORK:

STEP 1: Open the TERMUX app
STEP 2: Type the below commands to install Metasploit-Framework
cd $HOME
pkg install wget
wget https://Auxilus.github.io/metasploit.sh
Bash metasploit.sh
STEP 3: Change the directory to Metasploit-Framework
STEP 4: To execute Metasploit console type ./msfconsole
NOTE: This tutorial mentions that you need not root your device to convert your Android device into penetration testing device. The application emulates as Linux and it’s also user-friendly.

Source & credits

This article provided to www.techincidents.com by Shankara Narayanan Co-Leader at Hackers Day, student TamilNadu Dr Ambedkar law University. He is a Penetration Tester & Computer Forensics.

Disclaimer

All the Content of this Article Belongs to above Original Author. “computernetworksecuritis.blogspot.in” won’t take any credits.This article is only for an Educational purpose.Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question.
The experiment described in this article has a study purpose. Tested on any smartphone with Android system and no attack was performed on external sites. We’ve looked at the typical vulnerabilities associated with hacking.

2 comments:

Hugo said...

Very valuable information shared in this blog . I was looking for something like that and found it here. You have so many great ideas on load testing services ! Loved reading them . I’ll definitely share it and personally suggest to my friends. I am confident they will be benefited from this web site.

Penetration testing Services
Best Penetration testing Companies
Vulnerability Assessment Services

sakthee kumar said...

Great blog. Thanks for sharing.
Penetration Testing Company
Penetration Testing Services Provider
Penetration Testing Company In India

PAN-OS Supported ciphers

Following is a list of supported ciphers for PAN-OS 7.1 and later: SSLv3 Ciphers Supported (No change from PAN-OS 7.0) Non-FIPS mod...