Friday, May 27, 2016

Top 12 Android Apps to Turn Your Smartphone into a Device


Mobile devices is now very common now a days and mobile devices has changed the way of bi-directional communiion. There are many operating system for mobile devicesavailable but the most common and the best operating system for mobile is Android, it is an OS mns you can install other appliions (software's) on it. InAndroidappliion usually called apps or android apps.
The risk of by using mobile devices is very common and people are developing and using different apps (appliion) for their attack. Android has faced different challenges from appliion and below is the list of appliion for android .

1. SpoofAppHere is an app that spies at hrt could use – SpoofApp. It allows you to use a fake Caller ID – a that you are free to specify yourself, in order to protect your privacy or to pull a prank on someone. Sounds like fun, doesn’t it? Well, didn’t think so, which is why it never allowed the app to enter its App Store. Google, however, didn’t mind, which is why SpoofApp was available on the Android Market for about two and a half yrs. However, it was banned from there last yr as it allegedly was in conflict with The Truth in Caller ID Act of 2009.This can be useful in social engineering.Download it from here2. FaceNiffRequirements:Android 2.1+ (rooted)

Overview:FaceNiff is an Android app that allows you to sniff and intercept web sessionprofilesover the WiFi thatyour mobileis connected to.It is possible to hijacksessionsonly when WiFi is not using P, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK). It’s kind of like Firesheep for android. Maybe a bit sier to use (and it works on WPA2!). Plse note that if webuser uses SSL this appliion won’t work.Legal notice:This appliion isfor eduionalpurposes only. Do not try to use it if it’s not legal in your country. I do not take any responsibility for anything you do using this appliion. Use at your own riskLrn More:http://goh4x.blogspot.in/2012/09/how-to--friends-facebook-account.html

3. Penetrate ProRequirements:Android 2.1+ (rooted)Overview:The most of the times you scan the Wi-Fi networks available around, they’re protected with . Penetrate is an app that help you out with that. If the routers of that Wi-Fi networks are encrypted with WEP/WPA it will bring you the to access them. This seems a sort of , but the developers says it isn’t, because it’s supposed to get the for penetration testing and you should use it only with permission from network owners. Well, apart from those regardings, it does what it says. Check the developer description to know which routers are supported.Take in account that if you have an antivirus installed in your device, it will warn you about this app. The developer says it’s normal because it’s a security-related tool. Penetrate isn’t a danger for your phone.This is the paid version (€1.99) that contains no ads, some more ftures and sponsors further development. What’s more, it allows you to use 3G to get the instd of using dictionaries that you will have to download in the free version.Penetrate works properly with the range of routers supported. We’re missing more though. Despite the apparent use for which it was developed this appliion, we all know the “regular” use. And if you’re looking for it, give it a chance. It’s a grt app.Download it from here4. Anti-Android Network ToolkitRequirements:Android 2.1+ (rooted)Anti-Android Network Toolkit is an app that uses WiFi scanning tools to scan networks. You can scan a network you have the phone connected to or you can scan any other nrby open networks. Security admins can use Anti to test network host vulnerabilities to DoS attacks and other thrts.

Download it from here5. AndosidAnDOSid is the appliion which is used for DOS attacks from Android mobile .

Download it from here
6.Nmap For AndroidNmap is a network scanner tool which gives the entire information of the ip address and website. There is a version of nmap for Android users too, with the help of this app s can scan the ip's through mobiles.

Download it from here

7.The Android Network ToolkitThe Android Network Toolkit is an complete tool kit for the pentesters , where s can find expolots using the mobile and penetrate or attacks the ip's according to their vunerabilities.

Download it from here8.SSHDroid- Android Secure ShellSecure shell or SSH is the best protocol that provides an extra layer of security while you are connecting with your remote machine.SSHDroid is a SSH server implementation for Android.
This appliion will let you to connect to your device from a PC and execute commands (like "terminal" and "adb shell").

Download it from here

10.WiFi AnalyzerWiFi Analyzer is one of the most popular appliions in the Android Marketplace, which is rlly a testament to how wildly useful this tool is for both the average user and the more technically inclined. In the most basic of terms, WiFi Analyzer is a tool to scan the ar for WiFi networks and determine which channel is the lst populated so you can adjust your own hardware to a less congested part of the spectrum.

Download it from here

11.ConnectBotConnectBot is an exceptionally well done SSH/Telnet client, which also acts as a terminal emulator for the local Linux sub-system. While there are better terminal emulators (though not for free), there is no question that ConnectBot is the absolute best SSH client available for Android.

Download it from here

12.Network DiscoveryNetwork Discovery is a handy tool for finding and enumerating devices on public WiFi networks. Network Discovery uses a simple ping scan to find hosts on the network, and then allows the user to select one of the found hosts to target for a TCP connect() scan.

Download it from here


Bonus :dSploitdSploitis an Android network analysis and penetration suite which aims to offer toIT securityexperts/geeksthe most complete and advanced professional toolkitto perform network security assesments on a mobile device. Once dSploit is started, you will be able to sily map your network, fingerprint alive hosts operating systems and running services, srch for known vulnerabilities, logon procedures of many tcp protocols, perform man in the middle attacks such as sniffing ( with common protocols dissection ), rl time traffic manipulation, etc, etc .

Well I Have Installed Them All ! Have You ? If Yes, Then Plse Share Your Experience Through Posting a Comment Below

No comments:

Post a Comment