Skip to content

Commit aea86b4

Browse files
committed
android.md and ios.md modified.
1 parent fa54cab commit aea86b4

File tree

3 files changed

+75
-6
lines changed

3 files changed

+75
-6
lines changed

mobile/android.md

+42-2
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,43 @@
1-
# Place Holder
1+
## Using meterpreter:
2+
#### Meterpreter shell useful commands for android post-exploitation
3+
| Commands | Functionality |
4+
|:--------------- |:------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
5+
| `webcam_chat` | This module allows streaming a webcam from a privileged Firefox Javascript shell. |
6+
| `webcam_list` | The ‘webcam_list‘ command when run from the Meterpreter shell, will display currently available web cams on the target host. |
7+
| `webcam_snap` | The ‘webcam_snap’ command grabs a picture from a connected web cam on the target system, and saves it to disc as a JPEG image. By default, the save location is the local current working directory with a randomized filename. |
8+
| `webcam_stream` | The webcam_stream command basically uses the webcam_snap command repeatedly to create the streaming effect. There is no sound. |
9+
| `dump_calllog` | The dump_calllog command retrieves the call log from the Android device. |
10+
| `dump_contacts` | The dump_contacts command allows you to retrieve contacts information form the android device. |
11+
| `dump_sms` | The dump_sms command allows you to retrieve SMS messages. And save them as a text file. |
12+
| `geolocate` | The geolocate commands allows you to locate the phone by retrieving the current lat-long using geolocation. |
13+
| `check_root` | The check_root command detects whether your payload is running as root or not. |
14+
| `upload` | The upload command allows you to upload a file to the remote target. The -r option allows you to do so recursively. |
15+
| `download` | The download command allows you to download a file from the remote target. The -r option allows you to do so recursively. |
16+
| `shell` | The shell command allows you to interact with a shell. |
17+
| `sysinfo` | The sysinfo command shows you basic information about the Android device. |
18+
| `record_mic` | The record_mic command records audio. Good for listening to a phone conversation, as well as other uses. |
19+
| `send_sms` | The send_sms command allows you to send an SMS message. Keep in mind the phone will keep a copy of it, too. |
220

3-
Content coming. Feel free to submit ;-)
21+
#### Way to change password of services.
22+
You can recover password for some services (like gmail, twitter and facebook) by receiving SMS message.
23+
First, click "forgot password" and select SMS options. Then use the command `dump_sms` and you will have
24+
verification code. Insert the code and change the password.
25+
26+
27+
28+
## Other post-exploitation tools
29+
- Pupy: https://github.com/n1nj4sec/pupy
30+
- TheFatRat: https://github.com/Screetsec/TheFatRat
31+
32+
33+
# Refernce:
34+
### android shell command:
35+
- https://github.com/jackpal/Android-Terminal-Emulator/wiki/Android-Shell-Command-Reference
36+
- https://docs.google.com/document/d/1XaCCyAf46_gQYUIWHyRSCQue6d-TzJmKOZ1z1cpl1sI/edit
37+
- https://android.stackexchange.com/questions/11052/what-useful-android-shell-commands-do-you-know
38+
- https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/payload/android/meterpreter/reverse_tcp.md
39+
- https://null-byte.wonderhowto.com/how-to/hack-android-using-kali-remotely-0160161/
40+
- http://ddosdipdye.weebly.com/blog/big-android-hacking-article
41+
- http://www.hackingarticles.in/hack-call-logs-sms-camera-remote-android-phone-using-metasploit/
42+
- https://android.stackexchange.com/questions/60906/terminal-on-real-android-device-from-pc
43+
- https://github.com/n1nj4sec/pupy

mobile/ios.md

+28-2
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,29 @@
1-
# Place Holder
1+
# Tools
2+
### iRET
23

3-
Content coming. Feel free to submit ;-)
4+
iRET is a set of tools that allows you to automate many of the manual tasks an iOS penetration tester would need to perform in order to analyze and reverse engineer iOS applications. And the bonus is...this can all be performed right on the device.
5+
6+
Refer to:
7+
- https://www.veracode.com/iret-ios-reverse-engineering-toolkit-veracode
8+
- https://n0where.net/ios-macos-remote-administration-tool-eggshell/
9+
10+
Download:
11+
- https://www.veracode.com/sites/default/files/Resources/Tools/iRETTool.zip
12+
13+
### Egg shell
14+
15+
EggShell is an iOS and macOS post exploitation surveillance pentest tool written in Python. This tool creates 1 line multi stage payloads that give you a command line session with extra functionality. EggShell gives you the power and convenience of uploading/downloading files, taking pictures, location tracking, shell command execution, persistence, escalating privileges, password retrieval, and much more. Server communication features end to end encryption with 128 bit AES and the ability to handle multiple clients. This is a proof of concept pentest tool, intended for use on machines you own.
16+
17+
Refer to:
18+
- https://github.com/neoneggplant/EggShell
19+
20+
### Bella
21+
22+
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS.
23+
24+
Refer to:
25+
- https://github.com/Trietptm-on-Security/Bella
26+
27+
# Reference
28+
- http://www.blackhat.com/presentations/bh-usa-09/IOZZO/BHUSA09-Iozzo-iPhoneMeterpreter-SLIDES.pdf
29+
- http://www.securitylearn.net/2012/09/09/metasploit-post-exploitation-scripts-to-steal-ios-5-backups/

osx/persistance.md

+5-2
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1-
# Place Holder
1+
# Tools
2+
## EggShell
23

3-
Content coming. Feel free to submit ;-)
4+
5+
#### Refer to:
6+
https://github.com/neoneggplant/EggShell

0 commit comments

Comments
 (0)