<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Rahul Tyagi Official Blog | Information Security</title>
		<link>https://ethicalhacking.do.am/</link>
		<description></description>
		<lastBuildDate>Sun, 05 Apr 2015 14:54:56 GMT</lastBuildDate>
		<generator>uCoz Web-Service</generator>
		<atom:link href="https://ethicalhacking.do.am/news/rss" rel="self" type="application/rss+xml" />
		
		<item>
			<title>CryptoWall 3.0 2015 | Understanding CryptoWall 3.0 in Depth</title>
			<description>&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/files/2015/03/ransomware-logo.png&quot; style=&quot;width: 250px; height: 230px;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Crypto-ransomware is once again upping the ante with its routines. We came across one crypto-ransomware variant that&amp;rsquo;s combined with spyware&amp;mdash;a first for crypto-ransomware. This development just comes at the heels of the discovery thatransomware has included file infection to its routines.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#008000;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;CryptoWall 3.0&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;We first encountered CryptoWall as the payload of spammed messages last year. We noted that while other crypto-ransomware variants have a graphical user interface (GUI) for their payment purposes, CryptoWall relied on other means&amp;mdash;opening a Tor site to directly ask for payment or opening the ransom note in Notepad, which contained the instru...</description>
			<content:encoded>&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/files/2015/03/ransomware-logo.png&quot; style=&quot;width: 250px; height: 230px;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Crypto-ransomware is once again upping the ante with its routines. We came across one crypto-ransomware variant that&amp;rsquo;s combined with spyware&amp;mdash;a first for crypto-ransomware. This development just comes at the heels of the discovery thatransomware has included file infection to its routines.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#008000;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;CryptoWall 3.0&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;We first encountered CryptoWall as the payload of spammed messages last year. We noted that while other crypto-ransomware variants have a graphical user interface (GUI) for their payment purposes, CryptoWall relied on other means&amp;mdash;opening a Tor site to directly ask for payment or opening the ransom note in Notepad, which contained the instructions to access a payment page via a Tor browser.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;But a lot of things have changed since those first CryptoWall sightings. The earlier versions of CryptoWall pretended to be CryptoLocker, even mimicking its UI for its messages. Since then, we have seen CryptoWall use its own name and UI for its victims.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Also gone is the use of Tor for its command-and-control (C&amp;amp;C) servers. The latest version, dubbed CryptoWall 3.0, now uses hardcoded URLs. Admittedly, using Tor can be seen as an advantage for the anonymity offered. But the disadvantage is that system admins could easily block Tor network traffic or even the Tor application itself if there is no need for it.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;The hardcoded URLs are heavily obfuscated so threat researchers wouldn&amp;rsquo;t extract them easily. Since URL blocking is reactive, there is a delay before the blocking can be implemented. During this &amp;ldquo;window,&amp;rdquo; the malware could have already communicated with the C&amp;amp;C server and acquired the RSA public key to be used for file encryption.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;It should be noted that its C&amp;amp;C server is different from its payment page. The malware still uses Tor for its payment page so that transactions wouldn&amp;rsquo;t be hindered if authorities try to bring down their payment servers.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;And perhaps as a &amp;ldquo;precautionary measure,&amp;rdquo; CryptoWall 3.0 deletes the system&amp;rsquo;s shadow copies to disable restoring files to their previous state, rendering victims with no other options for saving their files.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#008000;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Using JavaScript and &amp;ldquo;JPEGS&amp;rdquo;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;CryptoWall 3.0 arrives via spammed emails, using a JavaScript attachment. In the screenshot below, the attachment poses as a resume inside an archive file. A .JS file (detected as JS_DLOADR.JBNZ, JS_DLOAD.CRYP, and JS_DLOADE.XXPU) will be extracted from the file, which is peculiar as it is as the file extensions often associated with resumes are .DOC, .PDF and .RTF.&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 17px; background-color: rgb(249, 247, 248);&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;p align=&quot;center&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 17px; background-color: rgb(249, 247, 248);&quot;&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/files/2015/03/CrypWall3-11.jpg&quot; style=&quot;border: none; padding: 3px 5px; max-width: 650px;&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Figure 1. Sample spammed message&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Selecting a .JS file could be seen as an evasion technique due to its small file size, which can be skipped by some scanners, together with the obfuscation applied in its code.&lt;/span&gt;&lt;/p&gt;

&lt;p align=&quot;center&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 17px; background-color: rgb(249, 247, 248);&quot;&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/files/2015/03/CrypWall3-2.jpg&quot; style=&quot;border: none; padding: 3px 5px; max-width: 650px;&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Figure 2. Screenshot of the obfuscated code (truncated)&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Further analysis of the .JS file reveals that it will connect to two URLs to download &amp;ldquo;.JPG&amp;rdquo; files. But don&amp;rsquo;t be fooled by the extension&amp;mdash;this is an old technique which may bypass poorly designed intrusion detection systems (IDS) by disguising malware as an image file. Looking at the screenshot below, you will see that it actually downloads executable files.&lt;/span&gt;&lt;/p&gt;

&lt;p align=&quot;center&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 17px; background-color: rgb(249, 247, 248);&quot;&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/files/2015/03/CrypWall3-3.jpg&quot; style=&quot;border: none; padding: 3px 5px; max-width: 650px;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Figure 3. MZ and PE signature of the downloaded executable file disguised as an image&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;The JS file will execute the said files after a successful download. The two files, one.jpg and two.jpg, are detected as TROJ_CRYPWAL.YOI and TSPY_FAREIT.YOI, respectively.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#008000;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;File Encryption&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;TROJ_CRYPWAL.YOI will create a new instance of explorer.exe to gain local admin privilege, provided that the victim has admin rights&amp;mdash;which is a common setup. Using a legitimate system process like explorer.exe could help the malware bypass scanners that use whitelisting. It will create a new instance of svchost.exe with -k netsvcsarguments which will perform the C&amp;amp;C communication and file encryption. This also gives the malware system service privileges.&lt;/span&gt;&lt;/p&gt;

&lt;p align=&quot;center&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 17px; background-color: rgb(249, 247, 248);&quot;&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/files/2015/03/CrypWall3-4.jpg&quot; style=&quot;border: none; padding: 3px 5px; max-width: 650px;&quot; /&gt;&lt;br /&gt;
&lt;i&gt;Figure 4. System modification&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;As you can see in the screenshot in Figure 4, it will also delete the shadow copies by issuing the commandvssadmin.exe Delete Shadows /All /Quiet. This will prevent victims from restoring their files using the shadow copies.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;After receiving the RSA public key for file encryption from its C&amp;amp;C server, as the private key to be used for decryption is stored in the server, it will start encrypting the files with certain file extensions. Targeted files include documents, databases, emails, images, audio, video, and source codes.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;After encrypting a file using RSA-2048 encryption algorithm, it will append a random file extension to the original file name, and add the &amp;ldquo;HELP_DECRYPT&amp;rdquo; files to the directory affected. After its encryption routine, it will open the &amp;ldquo;HELP_DECRYPT&amp;rdquo; files to show the victim the dreaded ransom note.&lt;/span&gt;&lt;/p&gt;

&lt;p align=&quot;center&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 17px; background-color: rgb(249, 247, 248);&quot;&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/files/2015/03/CrypWall3-5.jpg&quot; style=&quot;border: none; padding: 3px 5px; max-width: 650px;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Figure 5. Sample ransom note&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#008000;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Information Theft by FAREIT&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;TSPY_FAREIT.YOI &amp;nbsp;is executed alongside TROJ_CRYPWAL.YOI. While the victim is distracted by CryptoWall&amp;rsquo;s extortion, the spyware will steal credentials stored in the system&amp;rsquo;s FTP clients, web browsers, email clients and even Bitcoin wallets.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;As we mentioned earlier, this is the first time we&amp;rsquo;ve seen crypto-ransomware team up with spyware. This just shows that the cybercriminals are getting greedier. They are no longer content with the revenue they get from their ransom, around US$500&amp;mdash;which doubles after a certain period of time has lapsed.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
&lt;span style=&quot;font-size:14px;&quot;&gt;Figure 6. Ransom fee increases&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#008000;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Covering All Bases&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;There could be several reasons why cybercriminals introduced FAREIT to their crypto-ransomware attacks. Perhaps people are refusing to pay the ransom or they have become more savvy in protecting their files. Regardless of the reason, the threat actors are using an &amp;ldquo;old business model&amp;rdquo; as their back-up plan. Even if the victim refuses to pay the Bitcoin ransom, the cybercriminals can still get money by stealing existing Bitcoin wallets and by selling/using any stolen information.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Based on feedback from the Smart Protection Network, the region most affected by CryptoWall 3.0 is Australia/New Zealand, followed by North America and Europe.&lt;/span&gt;&lt;/p&gt;

&lt;p align=&quot;center&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 17px; background-color: rgb(249, 247, 248);&quot;&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/files/2015/03/CrypWall3-7.jpg&quot; style=&quot;border: none; padding: 3px 5px; max-width: 650px;&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Figure 7. Regions affected by CryptoWall 3.0&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Users can protect their important data by regularly backing up their files. They can implement the 3-2-1 rule for their files. Of course, for threats like crypto-ransomware and spyware, other safety practices are advised. For example, users should never open attachments from unknown or unverified senders. In fact, they should ignore or delete from unknown senders. Lastly, they should invest in security solutions that can protect their devices against the latest threats.&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 17px; background-color: rgb(249, 247, 248);&quot;&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Source :&amp;nbsp;http://blog.trendmicro.com/trendlabs-security-intelligence/cryptowall-3-0-ransomware-partners-with-fareit-spyware/&lt;/span&gt;&lt;/p&gt;</content:encoded>
			<link>https://ethicalhacking.do.am/news/cryptowall_3_0_2015_124_understanding_the_impact/2015-04-05-404</link>
			<dc:creator>defaultNick</dc:creator>
			<guid>https://ethicalhacking.do.am/news/cryptowall_3_0_2015_124_understanding_the_impact/2015-04-05-404</guid>
			<pubDate>Sun, 05 Apr 2015 14:54:56 GMT</pubDate>
		</item>
		<item>
			<title>Xenotix APK Decompiler | Learn Ethical Hacking India</title>
			<description>&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;http://opensecurity.in/wp-content/uploads/2013/11/apk.png&quot; style=&quot;width: 320px; height: 200px;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;So you think reversing and getting source code of an APK is a big deal. Then give a try to Xenotix APK Decompiler.&lt;/p&gt;

&lt;p&gt;APK Decompiler is an Open Source Android Application Package (APK) decompiler powered by dex2jar and JAD written in Python.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Minimum Requirements&lt;/strong&gt;&lt;br /&gt;
OS: Windows&lt;br /&gt;
JDK 1.6&lt;br /&gt;
Wx Python&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Download&lt;/strong&gt;&lt;br /&gt;
https://github.com/ajinabraham/Xenotix-APK-Decompiler/&lt;/p&gt;</description>
			<content:encoded>&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;http://opensecurity.in/wp-content/uploads/2013/11/apk.png&quot; style=&quot;width: 320px; height: 200px;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;So you think reversing and getting source code of an APK is a big deal. Then give a try to Xenotix APK Decompiler.&lt;/p&gt;

&lt;p&gt;APK Decompiler is an Open Source Android Application Package (APK) decompiler powered by dex2jar and JAD written in Python.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Minimum Requirements&lt;/strong&gt;&lt;br /&gt;
OS: Windows&lt;br /&gt;
JDK 1.6&lt;br /&gt;
Wx Python&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Download&lt;/strong&gt;&lt;br /&gt;
https://github.com/ajinabraham/Xenotix-APK-Decompiler/&lt;/p&gt;</content:encoded>
			<link>https://ethicalhacking.do.am/news/xenotix_apk_decompiler_124_learn_ethical_hacking_india/2014-11-05-401</link>
			<dc:creator>defaultNick</dc:creator>
			<guid>https://ethicalhacking.do.am/news/xenotix_apk_decompiler_124_learn_ethical_hacking_india/2014-11-05-401</guid>
			<pubDate>Wed, 05 Nov 2014 09:00:02 GMT</pubDate>
		</item>
		<item>
			<title>Understanding Xiaomi Mobile&apos;s Privacy Issues | Learn Ethical Hacking India</title>
			<description>&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;http://news.bbcimg.co.uk/media/images/76433000/jpg/_76433426_a45d6c19-0a4f-4358-bab5-0b23eb18d4dc.jpg&quot; style=&quot;width: 512px; height: 260px;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Xiaomi is present third largest smartphone manufacture in the world. But few days ago IAF found Xiaomi stealing the private information, call logs, IMEI numbers and some info to webservers in Beijing china.&lt;/p&gt;

&lt;p&gt;The Indian Air force&amp;nbsp; &amp;nbsp;warned its employees and their belongings that their private information was being shipped over to servers in China, and asked them to avoid using Xiaomi smartphones due to security risk.&lt;/p&gt;

&lt;p&gt;&amp;nbsp;Xiaomi is facing an investigation in Taiwan for alleged cyber security threat, as a result of which last month the Taiwanese government decided to ban the company due to several privacy controversies.&lt;/p&gt;

&lt;p&gt;Coming to sales in India, Xiomi&amp;rsquo;s models Mi3 and Redmis &amp;hellip; created a record sales in flipkart by being sold more than 80 k phones in 9-13 seconds.&lt;/p&gt;

&lt;p&gt;Rec...</description>
			<content:encoded>&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;http://news.bbcimg.co.uk/media/images/76433000/jpg/_76433426_a45d6c19-0a4f-4358-bab5-0b23eb18d4dc.jpg&quot; style=&quot;width: 512px; height: 260px;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Xiaomi is present third largest smartphone manufacture in the world. But few days ago IAF found Xiaomi stealing the private information, call logs, IMEI numbers and some info to webservers in Beijing china.&lt;/p&gt;

&lt;p&gt;The Indian Air force&amp;nbsp; &amp;nbsp;warned its employees and their belongings that their private information was being shipped over to servers in China, and asked them to avoid using Xiaomi smartphones due to security risk.&lt;/p&gt;

&lt;p&gt;&amp;nbsp;Xiaomi is facing an investigation in Taiwan for alleged cyber security threat, as a result of which last month the Taiwanese government decided to ban the company due to several privacy controversies.&lt;/p&gt;

&lt;p&gt;Coming to sales in India, Xiomi&amp;rsquo;s models Mi3 and Redmis &amp;hellip; created a record sales in flipkart by being sold more than 80 k phones in 9-13 seconds.&lt;/p&gt;

&lt;p&gt;Recently a Chinese woman found that , Xiaomi can stole bankcard data by using Near Field communication.&lt;/p&gt;

&lt;p&gt;Security Researchers from F-Secure Antivirus firm has shown that the Xiaomi phones (RedMi 1S handset) send quite a lot of personal and sensitive data to &quot;&lt;a href=&quot;http://u.to/YI9fCQ&quot; title=&quot;http://api.account.xiaomi.com/&quot; target=&quot;_blank&quot;&gt;api.account.xiaomi.com&lt;/a&gt;&quot; server located in China, including following information:&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
&amp;nbsp;1)IMEI Number of your phone&lt;br /&gt;
&amp;nbsp;2)IMSI Number (through MI Cloud)&lt;br /&gt;
&amp;nbsp;3)Your contacts and their details&lt;br /&gt;
&amp;nbsp;4)Text Messages&lt;/p&gt;

&lt;p&gt;Kenny Li of Hong Kong forum, IMA Mobile, recently noticed something odd with its Redmi Note smartphone. He discovered that the device continued to make connections with IP addresses in Beijing, China. The device kept trying to make the connection, even after switching off the company&apos;s iCloud-like MiCloud service&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Xiaomi said the company collects data only with the user&apos;s permission to offer specific services like cloud and will set up a server in India next year.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Article By : &lt;/strong&gt;&amp;nbsp;Sai Phaneendra Mulupuru &amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Talk To Me :&lt;/strong&gt;&amp;nbsp;https://www.facebook.com/sai.phaneendra.10&lt;/p&gt;

&lt;p&gt;&amp;nbsp;&lt;/p&gt;</content:encoded>
			<link>https://ethicalhacking.do.am/news/understanding_xiaomi_mobile_39_s_privacy_issues_124_learn_ethical_hacking_india/2014-11-05-400</link>
			<dc:creator>defaultNick</dc:creator>
			<guid>https://ethicalhacking.do.am/news/understanding_xiaomi_mobile_39_s_privacy_issues_124_learn_ethical_hacking_india/2014-11-05-400</guid>
			<pubDate>Wed, 05 Nov 2014 04:56:54 GMT</pubDate>
		</item>
		<item>
			<title>Cracking Passwords with HashCat on Windows 8.01 |Learn Ethical Hacking India</title>
			<description>&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Hashcat is the world&amp;rsquo;s fastest CPU-based password recovery tool.&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;padding: 0px; margin: 0px 0px 1em; color: rgb(0, 0, 0); font-family: &apos;Lucida Grande&apos;, Verdana, Lucida, Helvetica, Arial, sans-serif; line-height: normal; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;While it&apos;s not as fast as its GPU counterpart l&lt;a class=&quot;wikilink1&quot; href=&quot;http://hashcat.net/wiki/doku.php?id=oclhashcat&quot; style=&quot;padding: 0px; margin: 0px; color: rgb(0, 153, 0) !important; text-decoration: none;&quot; title=&quot;oclhashcat&quot;&gt;ocalHashcat&lt;/a&gt;, large lists can be easily split in half with a good dictionary and a bit of knowledge of the command switches.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;360&quot; src=&quot;https://ethicalhacking.do.am//www.youtube.com/embed/1wx5DY94KJY&quot; width=&quot;550&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;</description>
			<content:encoded>&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Hashcat is the world&amp;rsquo;s fastest CPU-based password recovery tool.&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;padding: 0px; margin: 0px 0px 1em; color: rgb(0, 0, 0); font-family: &apos;Lucida Grande&apos;, Verdana, Lucida, Helvetica, Arial, sans-serif; line-height: normal; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;While it&apos;s not as fast as its GPU counterpart l&lt;a class=&quot;wikilink1&quot; href=&quot;http://hashcat.net/wiki/doku.php?id=oclhashcat&quot; style=&quot;padding: 0px; margin: 0px; color: rgb(0, 153, 0) !important; text-decoration: none;&quot; title=&quot;oclhashcat&quot;&gt;ocalHashcat&lt;/a&gt;, large lists can be easily split in half with a good dictionary and a bit of knowledge of the command switches.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;360&quot; src=&quot;https://ethicalhacking.do.am//www.youtube.com/embed/1wx5DY94KJY&quot; width=&quot;550&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;</content:encoded>
			<link>https://ethicalhacking.do.am/news/cracking_passwords_with_hashcat_on_windows_8_01_124_learn_ethical_hacking_india/2014-09-14-399</link>
			<dc:creator>defaultNick</dc:creator>
			<guid>https://ethicalhacking.do.am/news/cracking_passwords_with_hashcat_on_windows_8_01_124_learn_ethical_hacking_india/2014-09-14-399</guid>
			<pubDate>Sun, 14 Sep 2014 15:17:51 GMT</pubDate>
		</item>
		<item>
			<title>Exploiting Android with Metasploit Framework | Learn Ethical Hacking India</title>
			<description>&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Today we will talk about something interesting , YES :) , As we all know today Android is the best mobile OS and crossed over 80% of global mobile users. Hence in this article we will try to exploit android through the one and only hacker&apos;s love - &amp;gt; Metasploit Framework.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color:#006400;&quot;&gt;&lt;strong&gt;Requirements:&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
1. Kali Linux / Backtrack 5 (Having MSF)&lt;br /&gt;
2. Android Phone ( Jelly Beans - I am Using Samsung S3)&lt;br /&gt;
3. Common Wireless Network ( Using Hotspot)&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;I am not gona take much time hence will do it fast in simple steps. So lets go.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#8B4513;&quot;&gt;Step 1:&lt;/span&gt;&lt;/strong&gt; Open Your Kali terminal and type the following command.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;http://ethicalhacking.do.am/Lucideus/android_hacking_msf_1.png&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-...</description>
			<content:encoded>&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;Today we will talk about something interesting , YES :) , As we all know today Android is the best mobile OS and crossed over 80% of global mobile users. Hence in this article we will try to exploit android through the one and only hacker&apos;s love - &amp;gt; Metasploit Framework.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color:#006400;&quot;&gt;&lt;strong&gt;Requirements:&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
1. Kali Linux / Backtrack 5 (Having MSF)&lt;br /&gt;
2. Android Phone ( Jelly Beans - I am Using Samsung S3)&lt;br /&gt;
3. Common Wireless Network ( Using Hotspot)&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;I am not gona take much time hence will do it fast in simple steps. So lets go.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#8B4513;&quot;&gt;Step 1:&lt;/span&gt;&lt;/strong&gt; Open Your Kali terminal and type the following command.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;http://ethicalhacking.do.am/Lucideus/android_hacking_msf_1.png&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#006400;&quot;&gt;Step 2: &lt;/span&gt;&lt;/strong&gt;After pressing the enter key, just type ls for listing the files on same directory. And you will see app.apk file.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;77&quot; src=&quot;http://ethicalhacking.do.am/Lucideus/android_ahcking_msf2.png&quot; width=&quot;467&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#006400;&quot;&gt;Step 3: &lt;/span&gt;&lt;/strong&gt;Now use the exploit i.e exploit/multi/handler , set the respective payload and after setting lhost and lport just type exploit to trigger the exploit.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;160&quot; src=&quot;http://ethicalhacking.do.am/Lucideus/android_hacking_msf3.png&quot; width=&quot;570&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#006400;&quot;&gt;Step 4: &lt;/span&gt;&lt;/strong&gt;Now send the .&lt;span class=&quot;sac&quot; id=&quot;spans0e0&quot;&gt;apk&lt;/span&gt; file we just created to &lt;span class=&quot;ui&quot; id=&quot;spans0e1&quot;&gt;victim&lt;/span&gt;, it will be having &lt;span class=&quot;sac&quot; id=&quot;spans0e2&quot;&gt;an&lt;/span&gt; M icon showing Metasploit icon on it. As &lt;span class=&quot;ui&quot; id=&quot;spans0e3&quot;&gt;user&lt;/span&gt; tries to install it you &lt;span class=&quot;sac&quot; id=&quot;spans0e4&quot;&gt;on&lt;/span&gt; attacker machine i.e Kali Linux in our case will get the reverse connection. &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;118&quot; src=&quot;http://ethicalhacking.do.am/Lucideus/android_hacking_msf_4.png&quot; width=&quot;560&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#006400;&quot;&gt;Step 5: &lt;/span&gt;&lt;/strong&gt;Now as you can see in below image we got the shell of the Android phone and can have access to its data. If the phone is rooted then you can even get Call Logs, SMS and other data stored in the internal storage space.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:14px;&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;133&quot; src=&quot;http://ethicalhacking.do.am/Lucideus/android_hacking_msf_5.png&quot; width=&quot;555&quot; /&gt;&lt;/span&gt;&lt;/p&gt;</content:encoded>
			<link>https://ethicalhacking.do.am/news/exploiting_android_with_metasploit_framework_124_learn_ethical_hacking_india/2014-05-24-398</link>
			<dc:creator>defaultNick</dc:creator>
			<guid>https://ethicalhacking.do.am/news/exploiting_android_with_metasploit_framework_124_learn_ethical_hacking_india/2014-05-24-398</guid>
			<pubDate>Fri, 23 May 2014 20:55:28 GMT</pubDate>
		</item>
	</channel>
</rss>