Saturday, September 27, 2014

Ninja Revenge 1.1.4


Play as an enrage ninja killing every assassin to revenge the dead of his wife. When they dare to drive a ninja angry, there will only be blood!

FEATURES :
  • True ninja experience
  • Power-ups, utilities and more
  • Tons of missions
  • Global leaderboard & achievement
  • Excellent multiplier system
  • Fast pace and simple control
  • Both HD/SD are supported

            


Like it ? Share it.

Friday, September 26, 2014

ES File Explorer 3.2.0


ES File Explorer is a free, full-featured file and application manager. It functions as all of these apps in one: file manager, application manager, task killer, download manager, cloud storage client (compatible with Dropbox, Google Drive, SkyDrive, Box.net, Sugarsync, Yandex, Amazon S3, and Ubuntu One...), FTP client, and LAN Samba client. It provides access to pictures, music, video, documents, and other files on both your Android devices and your computers.
ES File Explorer allows Android users, no matter where they are, to manage their resources freely. You can access all of your files from your mobile device and share them with others. This app makes it easy to stay connected over 3G, 4G, EDGE, or Wi-Fi to share with friends, upload photos, and watch videos.

ES File Explorer for Android Features:

  • File Manager – Manage your files like you do on your desktop or laptop using Multiple Select, Cut/Copy/Paste, Move, Create, Delete, Rename, Search, Share, Send, Hide, Create Shortcut, and Bookmark; operations can be performed on local files (on Android device) or remotely (on your computer)
  • Application Manager – categorize, uninstall, backup, and create shortcuts to your apps
  • Remote File Manager – when enabled, manage files on your phone from your computer
  • Built-in ZIP and RAR support allows you to compress and decompress ZIP files, unpack RAR files, and create encrypted (AES 256 bit) ZIP files
  • Built-in viewers and players for various file types, including photos, music, and videos; supports third-party applications, such as Quick office, for opening others
  • Shows thumbnails for APKs and images
  • Text viewers and editors


       




Like it ? Share it.

Monday, September 22, 2014

How to use ettercap


Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.
Ettercap works by putting the network interface into promiscuous mode and by ARP poisoning the target machines. Thereby it can act as a 'man in the middle' and unleash various attacks on the victims. Ettercap has plugin support so that the features can be extended by adding new plugins.


How to do ARP Poisoning with ettercap
In this Article we will Learn:
  • How to use ettercap-graphical
  • How to do ARP Poisoning
  • How to get remote visited URLs
1. Before starting ettercap we need to do some edit on its configure file. 
    Go to Computer → File System → etc → etter.conf

(Click on image for large view)


2. Right click on etter.conf file and Click on Open with leafpad

3. Carefully remove ‘#’ symbol from the iptables paragraph. 

4. As you can see we have removed ‘#’ symbol so now save this file.

5. Now open ettercap-graphical
A. GUI Method
     Appication → Kali Linux → Sniffing Spoofing → Network Sniffers → ettercap-graphical


B. Open terminal, type ettercap –G and Press Enter

6. Go to Sniff and click on Unified sniffing

7. Select your Network Interface (here my interface is eth0) and click OK

8. Go to Hosts and Click on Scan for hosts – This will scan hosts which are alive in your network.

9. Go to Hostsand click on Hosts list – It will show you all hosts which are alive in your network

10. Here you can see we got 4 alive hosts in the network. You must need to add your default gateway IP for doing successful poison in your target. You can find out default gateway IP by using netstat –rn command on terminal.

11. Select Default Gateway IP and Click on Add to Target 1

12. Again Select Target PC’s IP and Click on Add to Target 2

13. Go to Mitm and Click on Arp Poisoning – It will start poisoning to Target Host.

14. After Clicking on Arp Poisoning You will a pop up. In this pop up kindly check sniff remote connections box and click OK.

15. Go to Targets and Click on Current Targets. – It will show your Current Targets.

16. After Clicking on Current Targetsyou will see this window. In this window as you can see you have two current targets.

17. Go to Start and Click on Start sniffing – It will start sniffing your target hosts.

18. Go to Plugins and Click on Manage the Plugins – It will show you all type of plugins.

19. Find out chk_poison from the plugins list and double click on it. After sometime as result you will see a message on bottom of the window Poisoning Process Successful. It means you have successfully done poisoning on your target.  

20. Now, I am going to show you one other plugin who sends your targets visited URLs. If you will apply this plugin in your target. You can see which websites he is surfing right now. As you can see in bottom of this window it is showing “REMOTE COMMAND: Mozilla-remote openurl(http://www.google.co.in) etc. It is just because my target pc is surfing www.google.co.in in his browser.

21. This was our target pc and here I was searching www.google.co.in .
(Click on image for large view)
Note – If you want to play with ettercap then try to apply all plugin one by one on your target with some research. 

Like it ? Share it.

Friday, September 19, 2014

Motorola Alert



Motorola Alert lets you quickly alert people important to you when you need them. Simply put your phone on alert, and it will begin sending periodic notifications with your location to the people you designate so they can act fast to get you the help you need.

With Motorola Alert you can also set up places such as Home, Work, or School, so that your loved ones can be automatically notified when you leave or arrive.

              



Like it ? Share it.

Motorola Assist


Motorola Assist recognizes when you shouldn’t be bothered, like when you’re sleeping or in a meeting. After hours, it only lets important calls through. It even knows when you’re driving and can automatically read out new text messages or play music. When you’re at home it can announce calls. You can set actions and exceptions so that they work exactly how you want them to.

New Updates: Home and Driving Modes
There are two apps 'Motorola Contextual Services and Assist Apps' in this zip folder. You have to install both of them.



         


Like it ? Share it.

Wednesday, September 17, 2014

Request and Response Interception in Burp Suite


We have already discussed almost all basic theories about burp suite. Now, Let’s do some practical things with burp suite. You should not jump into practical thing directly without reading Basic theories. If you are wondering for Basic theory then you can visit my previous articles about burp suite which are based in theory. I am providing the link below.

Requirement:
2. Burp Suite
3. Firefox or Iceaweasel
5. Basic Theories Target Taband Proxy Tab




What we are going to do ?
We will understand how interception work, how we can add a scope in burp suite for particular target and how request and response works.

1. First of all start mysql and apache server for running mutillidae
   Open Terminal
  • Type service mysql start and Press Enter
  • Type service apache2 startand Press Enter

   Now start burp suite by terminal
  • Type burpsuite.jar and Press Enter 

(Click image for large view)



2. Burp Suite has been opened. Go to Proxy Tab then Intercept Sub-tab. There you will see intercept is off.


3. We have seen our interception is off in burp suite so, let’s see what happen when we browse any url in our web browser which is configure with burp suite. We will not use any website to do these testing because that will be illegal so we will use our mutillidae this is our own web server.
Write 127.0.0.1/mutillidaein your web address and Press Enter. Web site responds without any trouble.


4. When we come to intercept sub-tab there are also no web traffic records available.
 We have configured well burp with our browser but still burp is not capturing any web traffic from browser why ?
Very simple answer, because we turned off intercept while browsing the website so, burp could not capture any data. If you are beginner and trying to test any web and your burp is also not getting traffic from the browser then you should look at once your intercept is On or Off.


5. In the Site Map sub-tab we can see which url we have visited it doesn’t matter intercept on or off.

--------------------------------------------------------------------------------

6. Now, Let’s Turn On interception in Intercept sub-tab


7. Go to Proxy Tab then Option Sub-tab. There you will see intercept Client Request and Responsesection you just need to uncheck Match type : URL boxes. (If already unchecked leave this step)


8. Go to Target Tab then Scope Sub-tab. There you will see Include in scope section, you need to delete all the scopes from there if you have added any.


9. Go to your web browser and open 127.0.0.1/mutillidae


10. Go to Burp Suite there you will see it send request to server for response. You need to click on forward for forwarding the request to server so you will get the response from server.


11. Here, We got the response.


12. Go to your web browser, our web browser is still waiting for response.


13. Go to Burp Suite and Click once again on Forward button so, Our web browser should get their response.


14. Here, our web browser got the response.

------------------------------------------------------------------------------
15. Go to Proxy Tab then Option Sub-tab. There you will see intercept Client Request and Responsesection you just need to check Match type : URL boxes. (If already checked leave this step)


16. Intercept should be turn On.


17. Go to your web browser and open 127.0.0.1/mutillidae


18. Interception is On but Burp suite could not get any traffic from web browser.
Why?
Because, We did setup (step 15) burp to get traffic for particular target not for all which are browsed by web browser but we are not getting any traffic because we did not add any target to burp suite yet for getting the traffic.


19. Here we will add a particular url target for getting the traffic on burp. Go to Target tab then Site mapsub-tab and Right Click on the url which one you want to test then Click on Add to Scope.


20. Now we gave burp suite a particular target for testing so if you will browse any other url on same browser it will not effect on burp. I like this method because it do not intercept other websites during your testing. For example I have added 127.0.0.1/mutillidae as a scope means as target. Now I need to search something on google or I am also using facebook while testing for discussion with my team or whatever reason in same browser which is configure with burp suite. If you added a scope 127.0.0.1/mutillidae burp will not show you any traffic for other sites like google search or facebook. It is trace only your target url activity.
As you can see we have added a scope from site map sub-tab. You can also add scope manually by clicking on Add button there you need fill up some details like Protocol, host/Ip range, Prot etc. You can also Enable or Disable your scope by clicking on the check box in include in scope section.


21. Intercept should be On.


22. Go to Web Browser and Open URL 127.0.0.1/mutillidae You will notice it is waiting for response.


23. Burp sends request to server for response. Click on Forward button for getting response.


24. Here, We got response.


25. Go to Web Browser there you will see it is still waiting for response.


26. Go to Burp Suite and click on Forward button so your web browser will response.


27. Here, we got response.  


 (Click image for large view)

Like it ? Share it.