How to hack a smartphone using Termux like in Mr. Robot
👨💻
Mr. Robot is a series that tells the story of Elliot Alderson, a young computer security specialist who suffers from severe personality disorders who ends up getting involved with a mysterious anarchist hacker and a group known as fsociety, whose mission is to try to eliminate all global credit records. Although the series shows a fictional side of hacking, the plot starts from real premises, including the ability to perform hacking tasks from a mobile device.
On this occasion, the pentesting specialists of the International Institute of Cybersecurity (IICS) will show you COMPANY, a hacking repository for Termux, the popular terminal emulator for Android, which works directly without the need for a rooted device and without having to perform complicated configurations.
Contents hide 1 INSTALLATION 2 INFORMATION COLLECTION 3 PASSWORD THEFT 4 WIRELESS TEST 5 EXPLOITATION TOOLS 6 MONITORING AND COUNTERFEITING 7 WEB HACKING 8 PRIVATE WEB HACKING 9 AFTER EXPLOITATIONINSTALLATION
Installation is probably the easiest step. Go to the terminal and enter the following commands:
pkg update pkg upgrade pkg install git pkg install python2 pkg install python git clone https://github.com/Manisso/fsociety demandes d’installation pip2 cd fsociety chmod + x install.sh python2 fsociety.py
The result should look like the following screenshot:
INFORMATION COLLECTION
Gathering information is a pentest process that involves the use of several tools. In FSOCIETY we can find tools such as Nmap, Setoolkit Port Scanning, Host To IP, CMS scanners, XSStrike, Dork – Google Dorks Passive Vulnerability Auditor, among others, mentioned by pentesting specialists.
PASSWORD THEFT
This repository includes tools for password attacks, including CUPP, Bruterx, among others.
WIRELESS TEST
We can find several tools for the wireless test, including Reaver and Pixewps.
OPERATING TOOLS
Exploitation tools allow the attacker to abuse vulnerabilities present in any service. FSOCIETY includes tools such as ARSCAN, SQLmap, Shellnoob, COMMIX, JBoss-autopwn, automatic SQL injection software, Bruteforce Android Passcode, Joomla SQL Injection Scanner, among others, pentesting experts mention.
CONTROL AND COUNTERFEITING
User monitoring involves intercepting information, injecting data into network packets via TCP/IP, among other tasks. This repository includes Setoolkit, SSLStrip, pyPISHER and SMTP Mailer.
WEB HACKING
FSOCIETY includes powerful web testing tools, as well as content management systems. Here we can find Drupal Hacking, Inurlbr, WordPress Scanner and Joomla Scanner.
PRIVATE WEB HACKING
The private web hacking section includes the following tools:
- Get Joomla Websites
- Get WordPress Websites
- Search panel
- Find zip files
- Search File Downloader
- Get Server Users
- SQLi Analyzer
- Port analysis
- Bypass Cloudflare
AFTER OPERATION
In this section we can find tools like Shell Checker, POET and Weeman.
Please remember that this material has been produced for academic purposes only, therefore misuse of this information is not the responsibility of IICS. To learn more about computer security risks, malware, vulnerabilities and information technology, do not hesitate to visit the sites of the International Institute of Cyber Security (IICS).
Working as a cybersecurity architect, Alonso focuses on data protection and enterprise data security. Prior to joining us, he held various cybersecurity research positions at Microsoft and Fortinet. He also has experience in different industries such as finance, medical health and facial recognition.
Don't forget to share the article with your friends!