“Anti” Android app allows to Hack local PCs from Smartphones - Android Software/Hacking General [Developers Only]

What is Anti?
ZImperium "Anti" LTD is proud to annonce Android Network Toolkit - Anti.
Anti consists of 2 parts: The Anti version itself and extendable plugins. Upcoming updates will add functionality, plugins or vulnerabilities/exploits to Anti
Using Anti is very intuitive - on each run, Anti will map your network, scan for active devices and vulnerabilities, and will display the information accordingly: Green led signals an 'Active device', Yellow led signals "Available ports", and Red led signals "Vulnerability found". Also, each device will have an icon representing the type of the device. When finished scanning, Anti will produce an automatic report specifying which vulnerabilities you have or bad practices used, and how to fix each one of them.
What is AntiCredit?
AntiCredit is the app to purchase status and credits for Anti usage.
Once you buy Silver, Gold or Platinum(for corporate users and power users), your status is saved forever. You can use MITM,DOS,SPY,REPLACE IMAGES and other features like PASSWORD CRACKER, but you also get N amount of credits, these credits can be used for attacks and reports.
Once Anti has mapped your network, it is time to choose the attack method:
[+] Scan - This will scan the selected target for open ports and vulnerabilities, also allowing the user to select a specific scanning script for a more advanced/targeted scan.
[+] Spy - This will 'sniff' images transferred to/from the selected device and display them on your phone in a nice gallery layout. If you choose a network subnet/range as target, then all images transferred on that network - for all connected devices - will be shown. Another feature of the Spy plugin is to sniff URLs (web sites) and non-secured (ie, not HTTPS) username/passwords logins, shown on the bottom drawer.
[+] D.O.S - This will cause a Denial Of Service (D.O.S) for the selected target, ie. it will deny them any further access to the internet until you exit the attack.
[+] Replace images - This will replace all images transferred to/from the target with an Anti logo, thus preventing from attacked used seeing any images on their browsers while the browse the internet, except for a nice looking Anti logo...
[+] M.I.T.M - The Man In The Middle attack (M.I.T.M) is an advanced attack used mainly in combination with other attack. It allows invoking specific filters to manipulate the network data. Users can also add their own mitm filters to create more mitm attacks.
[+] Attack - This will initiate a vulnerability attack using our Cloud service against a specific target. Once executed successfully, it will allow the attack to control the device remotely from your phone.
[+] Report - This will generate a vulnerability report with findings, recommendations and tips on how to fix found vulnerabilities or bad practices used.
Anti supports & uses the followings OSS tools :
nmap
Ettercap
driftnet
THC-Hydra
Metasploit
We will be releasing patch sets for OSS shortly. This should assist developers to compile binaries used by Anti!
Download
Or
PrateekHck

Anti Platinum
yes. yes. YES>
this is a SWEEET apppp!
working on cracking it, and finding a cracked one.
and dont give me no, "you should just pay for it" crap.
if your using it, you are no angle.
if it was 5 bux, suuure... but THAT much for platinum?!
must be HOG-High on glue

Permissions for this app? And who are they?
I am a little worried that this app doesn't appear on the android market (I'm still not used to say "google play") and at the same time don't tell me what the permissions are before I even download the zip-file. It's maybe understandable why.
And heading over to their website, there's not much about their privacy policies or anything else when it comes to this app.
It seems to be a fantastic tool that I could use for what it is intended for, to check vulnerabilities.
And Zimperium are probably some good guys that have come up with this app.
Kudos to them if so, but it is the nature of these apps that makes me worried.
I mean, if it does what it says then at least I would be very concerned about trusting them completely.
It could be the perfect tool to gather informatioin to be used against you.
Is there anybody that know a bit more about these guys?
Not so much more than some general info in their "about link" on their website.
Or what the permissions are?

they are from Israel, and they are good guys indeed.
you can find a review (in hebrew) here: http://www.youtube.com/watch?v=9qo9jqxxfJE
by the way, anyone knows of a good application that can crack WPA and WEP passwords?

Related

[Q] Android Virus

What does anyone think of this?
Geinimi virus emerged in China, according to U.S. security specialists.
A virus infecting mobile phones using Google Inc.'s Android operating system has emerged in China, and can allow a hacker to gain access to personal data, U.S. security experts said.
A report this week from Lookout Mobile Security said the new virus affecting Android devices has been dubbed "Geinimi" and "can compromise a significant amount of personal data on a user's phone and send it to remote servers."
The firm called the virus "the most sophisticated Android malware we've seen to date."
"Once the malware is installed on a user's phone, it has the potential to receive commands from a remote server that allow the owner of that server to control the phone," Lookout said.
"Geinimi's author(s) have raised the sophistication bar significantly over and above previously observed Android malware by employing techniques to obfuscate its activities."
The motive for the virus wasn't clear, according to the Lookout, which added that this could be used for anything from "a malicious ad-network to an attempt to create an Android botnet."
However, the company said the only users likely to be affected are those downloading Android apps from China.
The infected apps included repackaged versions sold in China of Monkey Jump 2, Sex Positions, President vs. Aliens, City Defense and Baseball Superstars 2010.
"It is important to remember that even though there are instances of the games repackaged with the virus, the original versions available in the official Google Android Market have not been affected," the security firm said.
Click to expand...
Click to collapse
http://www.totaltele.com/view.aspx?ID=461296
Lookout: http://blog.mylookout.com/
December 29, 2010
Security Alert: Geinimi, Sophisticated New Android Trojan Found in Wild
By tim 34 Comments
The Threat:
A new Trojan affecting Android devices has recently emerged in China. Dubbed “Geinimi” based on its first known incarnation, this Trojan can compromise a significant amount of personal data on a user’s phone and send it to remote servers. The most sophisticated Android malware we’ve seen to date, Geinimi is also the first Android malware in the wild that displays botnet-like capabilities. Once the malware is installed on a user’s phone, it has the potential to receive commands from a remote server that allow the owner of that server to control the phone.
Geinimi is effectively being “grafted” onto repackaged versions of legitimate applications, primarily games, and distributed in third-party Chinese Android app markets. The affected applications request extensive permissions over and above the set that is requested by their legitimate original versions. Though the intent of this Trojan isn’t entirely clear, the possibilities for intent range from a malicious ad-network to an attempt to create an Android botnet.
Lookout has already delivered an update for its Android users to protect them against known instances of the Trojan. If you are already a Lookout user (free or premium), you are protected and no action is needed.
How it Works:
When a host application containing Geinimi is launched on a user’s phone, the Trojan runs in the background and collects significant information that can compromise a user’s privacy. The specific information it collects includes location coordinates and unique identifiers for the device (IMEI) and SIM card (IMSI). At five minute intervals, Geinimi attempts to connect to a remote server using one of ten embedded domain names. A subset of the domain names includes www.widifu.com, www.udaore.com, www.frijd.com, www.islpast.com and www.piajesj.com. If it connects, Geinimi transmits collected device information to the remote server.
Though we have seen Geinimi communicate with a live server and transmit device data, we have yet to observe a fully operational control server sending commands back to the Trojan. Our analysis of Geinimi’s code is ongoing but we have evidence of the following capabilities:
* Send location coordinates (fine location)
* Send device identifiers (IMEI and IMSI)
* Download and prompt the user to install an app
* Prompt the user to uninstall an app
* Enumerate and send a list of installed apps to the server
While Geinimi can remotely initiate an app to be downloaded or uninstalled on a phone, a user still needs to confirm the installation or uninstallation.
Geinimi’s author(s) have raised the sophistication bar significantly over and above previously observed Android malware by employing techniques to obfuscate its activities. In addition to using an off-the-shelf bytecode obfuscator, significant chunks of command-and-control data are encrypted. While the techniques were easily identified and failed to thwart analysis, they did substantially increase the level of effort required to analyze the malware. The Lookout Security team is continuing to analyze capabilities of new and existing Geinimi variants and will provide more information as we uncover it.
Who is affected?
Currently we only have evidence that Geinimi is distributed through third-party Chinese app stores. To download an app from a third-party app store, Android users need to enable the installation of apps from “Unknown sources” (often called “sideloading”). Geinimi could be packaged into applications for Android phones in other geographic regions. We have not seen any applications compromised by the Geinimi Trojan in the official Google Android Market.
There are a number of applications—typically games—we have seen repackaged with the Geinimi Trojan and posted in Chinese app stores, including Monkey Jump 2, Sex Positions, President vs. Aliens, City Defense and Baseball Superstars 2010. It is important to remember that even though there are instances of the games repackaged with the Trojan, the original versions available in the official Google Android Market have not been affected. As the Lookout team finds more variants of the Geinimi Trojan grafted onto legitimate applications, we’ll provide timely updates.
As stated above, Lookout has already delivered an update for its Android users to protect them against known instances of the Trojan.
How to Stay Safe:
* Only download applications from trusted sources, such as reputable application markets. Remember to look at the developer name, reviews, and star ratings.
* Always check the permissions an app requests. Use common sense to ensure that the permissions an app requests match the features the app provides.
* Be aware that unusual behavior on your phone could be a sign that your phone is infected. Unusual behaviors include: unknown applications being installed without your knowledge, SMS messages being automatically sent to unknown recipients, or phone calls automatically being placed without you initiating them.
* Download a mobile security app for your phone that scans every app you download. Lookout users automatically receive protection against this Trojan.
With the discovery of this new malware, it is more important than ever to pay attention to what you’re downloading. Stay alert and ensure that you trust every app you download. Stay tuned for more details on this threat.
Click to expand...
Click to collapse
kobesabi said:
What does anyone think of this?
Click to expand...
Click to collapse
There will be more problems like this, it's pretty obvious.
It's surprising we haven't seen malicious applications uploaded to Cydia yet, considering how popular iPhone is.
Scary though, probably why I don't trust third party app stores most of the time.
mikkohypponen said:
It's surprising we haven't seen malicious applications uploaded to Cydia yet, considering how popular iPhone is.
Click to expand...
Click to collapse
That is because in Cydia they only let you have a few trusted sources for apps to begin with. They also have some control over which source you add although they don't really care if you add a source containing cracked apps.
yea cydia safe for now hope lookout works for android
Dadonpo said:
yea cydia safe for now hope lookout works for android
Click to expand...
Click to collapse
The only way I see Cydia getting a virus is if the person forgot to change their root password.

Android Can Be Hacked through SMS

I found this on a site, does any one else know about this or have they been infected by it? It states that it works better on older versions of android so hopefully it cant infect us. so i thought i would share this. It sounds like fun lol
Security experts from NQ Mobile have recently detected new Android malware which is controlled through SMS messages. The malware, dubbed TigerBot, is able to record calls and surrounding noise.
TigerBot was detected while circulating in the wild through non-official Android channels.
The malware is wise: it can hide itself on a targeted device. TigerBot refuses to install an icon on the home screen, and masks itself with an ordinary application name like Flash or System.
Once active, TigerBot registers a receiver marked as a high priority in order to listen to the intent with action “android.provider.Telephony.SMS_RECEIVED”.
NQ Mobile explained that when a user receives a new SMS message, the malware would run a check to find out whether the message is a specific bot command. In the event it is TigerBot will prevent it from being seen by the user, after which it will execute the command.
The malware is able to record sounds in the immediate area of the device, along with the calls themselves. It is also able to alter network settings and report the current GPS coordinates of the device. TigerBot was proved to manage capturing and uploading pictures, killing other processes and rebooting the infected device.
However, the malware isn’t written perfectly enough. For instance, some of its commands aren’t routinely supported: the command to kill other processes can only be performed on early Android versions. Still, the mobile security company points out that the fact that this piece of malware and any of its variants might be controlled without your knowledge does mean that it is a serious threat. The insecurity specialists added that users are recommended to always reject unknown application requests and attentively monitor permissions requested by any program.
how to detect this malware infection?
Not sure how to yet, just be careful what apps you install, check permission, don't worry about apps from the android market or dev on here. So just be wise in what you install.
Sent from my R800i using xda premium

SecAndy : let's get the party started

Pronounced "say candy", the goal of SecAndy is to come up with as secure and private of an OS as possible. So as not to reinvent the wheel, we'll base this initiative on our open source code of choice (Android or maybe other developers' choice).
I am not a developer myself but I can without a doubt, because of former professional experiences, organize a project and gather the right people together as a community in order to make sure that project sees the light of day after it has acquired a life of its own if needed, which I think we will agree is something that this kind of project requires because of the scrutiny it will quickly attract.
I am officially calling upon this post all interested developers that could help us fork Android or other open source OS.
Let's get a kickstarter funded and let the party begin. I will update you later today on the advancement of such.
This thread welcomes constructive ideas and developer participation, but here are beginning requirements we'll need to fulfill eventually to privatize and secure android :
- default browser allowing custom search engines such as https://ixquick.com or duckduckgo
- default system search pointing to those custom engines for online component
- control of gps at firmware level to allow full disability
- peer to peer file exchange (think BitTorrent sync) with 1024 to 2048 bit encryption
- implementation of secure sms and mms exchange (think textsecure)
- implementation of encrypted voice channels (think redphone or SIP with end-to-end encryption)
- root vpn for all online access
- systemwide warning of insecure solutions (example : wanting to use gmail or regular email)
- PGP transparent email solution
- Tor option for root vpn (subject to mitm attacks but more on that later)
- peerguardian type auto-updated database to identify suspicious IP address ranges
- systematic in-out firewall control auto updated with peerguardian database and community based rules database
- hardened malware protection and app permissions with automatic permission audit based on application type
- full device encryption and lockup (in case of unauthorized user)
- full remote wipe out and bricking with auto IMEI reporting (in case of theft, might have to be amended because of attack vector)
- full remote location capability with real time tracking (that one might have to be scratched, high security risk because of attack vector)
This obviously doesn't cover all the bases but would be a good start... I know a lot of these options can be implemented with a mismatch of apps and custom Roms but having it all at an OS level AOKP style would greatly help in building an android by the people for the people community that could eventually loosen the stranglehold of less than transparent corporations.
60 views in 24 hours and not one comment. Obviously I'm approaching this the wrong way. More news at 11.
e-motion said:
60 views in 24 hours and not one comment. Obviously I'm approaching this the wrong way. More news at 11.
Click to expand...
Click to collapse
I don't want to be insulting, but no programming work has been done on your part, and you're just asking for people to dive in this project to get managed by someone they never heard of. It's not really surprising no one has commented yet.
I understand what you're saying but any comment, even if only just to show interest in such a project, will be key to drive developers to it.
I might not have started any development but I have clear understanding of how to design secure solutions. I can't go into details of why that is, however you can clearly see with my 2nd post that some research has been done. If I wanted a solution for me alone, I could just go on with my own little pudding of custom ROM and security apps.
However, because of the recent news events that SHOULD have awaken this population, I thought now might finally be the right time to try to get such a project off the ground. But without anyone even showing any interest, why would any developer be drawn to it ? If people would rather focus more on content consumerism than on what might happen under an umbrella of spooks that they're paying for with their taxes, then they have learned nothing from history and deserve what's coming to them, simple as that.
This is NOT a development thread in case you haven't noticed, so telling me I haven't developed anything yet is not even relevant.
In case anyone cares, this will be moved shortly in the t-mobile Note 2 Android development thread as a Touchwiz proof of concept ROM. Little steps, little steps...
Sent from my SGH-T889 using Tapatalk 2
mobile sec
While I am not a developer I would be interested in this project. I've been thinking about this a bit lately given recent events. I think a useful privacy preserving security related app and phone combo might have these features:
-some way to separate the baseband processor (radio) from the OS. It seems most phones share memory with the radio and this fact can and has been exploited. Own the bb processor and you own the phone. Perhaps a 3g dongle plugged into an android phone in host mode would work. Some of these usb "data only" radios can be unlocked for voice too. I believe a rooted phone with IP tables/firewall running would be much more secure than a conventional mobile phone.
-an anonymising network for connecting to servers/peers. I think the i2p network is well suited for this purpose. Rather than connect to services that are not designed with your anonymity/privacy in mind, connect to hidden/darknet servers that make it extremely difficult to ascertain your real IP and location. Perhaps an i2p router running on your home computer relaying i2p traffic while also maintaining a long lived encrypted connection to your mobile in order to "push" data to it. In this way the user benefits from the anonymising network, contributes to the network, but doesn't have the battery drain of relaying packets from the phone (if this is even possible).
-end-to-end encryption. Perhaps OTR messaging for texting and perhaps openPGP for transferring binary files as I don't believe file transfer in OTR is available at this time.
-an app that uses the above network that is capable of sending/receiving encrypted text, audio, video, gps location etc and does not leak any personal information that you don't want leaked. XMPP might be a good choice (with perhaps out-of-band binary transfers for efficiency). Giving your unique identifier to another person that is using the same app would allow you to communicate with them while not revealing your phone number, imei, imsi, etc. There would be some latency in the communication especially with binary transfers but I would gladly accept that for the added security.
anyway, just wanted to add this to the conversation and hope to see this project take shape as we definitely need more security enabled os's and apps.

[GUIDE] Paranoid Security For Android

Table Of Contents
~ Introduction
~ Basic Stuff
Applications
~ Vpn's
~ Antivirus
~ FindmyPhone apps
~ mySecureMail
~ 1Password
~ Signal
~ AppLock
~ Snoopsnitch
~ AFwall+
Firefox Addons
~ Bluhell Firewall
~ CanvasBlocker
~ Clean Links
~ Decentraleyes
~ Disable WebRTC
~ HTTPS everywhere
~ Privacy Badger
~ Procon Latte Content Filter
~ Self Destructing Cookies
// Optional
~ Less Spam please
~ AdBlock Plus
~ Less Spam please
Secure Mail Providers
~ Proton Mail
~ Lavabit
~ HushMail
~ vfemail
A Tad To Paranoid
~ Ipkungfu
~ Snort
Disclaimer I Am Not responsible for the end of the world, your device, your lives or anything else that goes wrong. This is a guide to be more secure on Android.
Introduction
Hello!
This is an attempt to help users who are either very tech savvy or not. While this is a guide and I imagine some might disagree, I will take into consideration complaints or suggestions and I will adjust the post accordingly.
If you know of any apps that are not on my list please inform me I will be happy to adjust the post. (please explain why the app is useful and provide the name of it) while it mostlikly very possible to find everything in this post by searching the web, It might take some time to collate everything so I decided to make a post and put everything down into text.
The point of this guide is to provide several ways to secure your device. You don't need to use it all you can simply cherry pick what you want or use bits.
This is a suggestion Guide if anything. So naturally you can adjust the bellow to your needs.
Finally I'm no security Pro. I am a crazy man who has made himself overly paranoid after some years of learning white hat hacking. If you find something a bit to ridiculous or over the top just ignore it. Nor is it designed to scare you. Just help
Basic Stuff
Lock screen
The first line of defense! This is very basic but often overlooked. A pin/password/pattern are all great! While alternative lock screens might look good, there security is questionable. As one can get around it if they can make your system run on system apps only. While I know little about it market lockscreens and their security. Perhaps it be possible using an app such as Link2SD to make it a system app. Adding better security?
Fingerprint is secureish, but security concerns about fingerprint harvesting is a reason I don't use it. Good security system includes keeping your screen clean and buttons.
Don't like yucky screens.
Sim Lock
Enable Lock SIM card, found under:
Code:
Settings -> Personal -> Security -> Set up SIM card lock.
Simply put this will mean after turning your phone on you'll need to put in a pin to ring anyone.
Device Encryption
Pretty basic. Encrypt your data. You life. Encryption for everyone!!!
Code:
Settings -> Personal -> Security -> Encryption.
Nfc
TURN IT OFF UNLESS YOU NEED IT ON!!!
My dislike of contactless is well founded, I know a few people who have been done by countless swipe hacks. £10 taken out 6 or 8 times poor people. While some NFC or pay apps can only be used with a passcode or fingerprint which adds more security, general rule is having it turned of. Saves battery too so... Ye
Software Updates
To be fair most of the resident xdaers are well up-to-date with security patches. As most of you run roms. With security updates in them. So keep your self updated!
Applications
VPN's
Virtual private networks, aren't only useful for hackers trying to stay hidden but useful for normal people to hide their ips from the evil-doers of the world. While Vpn's are not 100% mainly because there is a gap between connection to the VPN. They are great on the hole.
Open VPN (Both Connect and for Android)
Play Store Link
This is an app that allows you to connect to the various Vpn's, while most are paid a few are free (see Note). Majority of sites explain how to connect to their VPN others aren't as simple this app also means you can make your own VPN and connect to it. Some useful guides exist below for making your own VPN:
VPN server on Android
tutorial on making and hosting your own VPN
Note: WARNING, while some VPN with a free service and pay for upgrades tend to be trust worthy some fully freemium ones are questionable. Some have been branded honeypots and although you may not worry about being logged it might still bring in some privacy concerns.
Free/Upgrade/Payfor VPNs
VyrpVPN
Playstore link
Possibly the fastest and most reliable, doesn’t share your data with anyone, and only keeps logs of IP addresses, connection times, and bytes used for 30 days. It offers 50 server locations spread across the globe, support for 256-bit encryption, and uses Chameleon, which hides the fact you are using a VPN service. It's a little pricey. But I'd always advise going for by yearly in any VPN it always works out cheaper. But there is a free option with a limited usage limit.
Tunnel bear VPN
Playstore link
I use this one personally. While it might not be the fastest it's very versatile easy to use no fiddly bits, and also its excellent value for money with it clocking in around £30 quid a year for up to 5 Devices, TunnelBear doesn't track what you do online, no logy logy of your IP, and won't whore out your data with them third-party peps. It also supports 256-bit encryption. So woo! Also has a free 500m monthly limit as well if you want to try it out.
NordVPN
Playstore Link
Possibly the most well established VPN. Some SERIOUS Encryption under the hood and they log absolutely nothing as well. Again yearly Plan is a lot cheaper. And possibly cheapest one. All rounder really also the account has a .ovpn file which is required by open VPN app.
Express VPN
Playstore Link
The service allows you to have two symoltanious connections which, I don't know, might be useful to you. They have good customer service though and pretty good connection. No logging and pretty well priced. With a 30-day back guarantee.
IPvanish
Playstore Link
They take no logging seriously! And have a solid encryption and a good price scheme. There's not much to say about this one. It's very good though.
The above are ones I personally or people I know have used, they are by no means in order. There are a number of ones that available do a good search! Always do research. Find good deals and make sure you are always secure.
Antivirus
It's still a bit of a question if you really need an Antivirus on Android. I personally say it's useful as a tool box. Most provide find my phone and so on.
Avira
Playstore Link
Test Results here:Av-Test
A great app, not too intrusive. Really useful and fairly simple to use.
Lookout
Playstore Link
I use this one personally with conjunction with another. Has theft protection and a number of other features that need an upgrade
Avast
Playstore Link
Test results here:Av-test
I use this one as well. It's a great service and very useful. Wifi scanning, call blocking and a number of other features.
AVL
Playstore Link
This is a bear bones app just for maleware scanning. Great app. Easy to use.
Sophos
Playstore Link
Test results here:av-test
Very solid app. Useful to have to protect you. Simple app. Business level protection.
The above list is from apps I my self have used and can recommend. As always there is a large variety. Search away, check tests on independent labs. And decided for your self.
Findmyphone Apps
Loosing your phone is concerning, a lost phone could fall in hands of a nice person. But then it could end up in an evil doers hand thus wiping of data is fundamental! The following apps are highly recommended and well rated.
Android Device Manager
Cerberus
Prey
mySecureMail
Playstore link
Unlimited amount of email accounts in one encrypted secure place. Password protected and Free!
1Password
Playstore Link
Having various passwords can be confusing, while the actual security of them is questionable after all having passwords saved on your phone might be concerning. But with high encryption and good security keeps all your information safe and secure!
Signal
Playstore Link
It provides end-to-end encryption to secure all communications and the app can also verify the identity of who people are messaging, as well as the what channels they are using! A really secure app, with concerns mounting about how private you really are this app is very good for security.
Applock
Playstore Link
Lock all your important apps from being prayed on. Does what it says on tin.
SnoopSnitch
Playstore Link
This only works on some phones! Be careful. It's basically a IMSI catcher.
There is another one here which in my opinion is a fantastic app and deserves support! XDA IMSI catcher
An IMSI Catcher is a great peace of kit warning against fake base stations. Or trying to scan your network.
AFwall+
PlayStore Link
A front end app that means you can set what apps are allowed to use Internet.
//While there is no support yet for Nougut for xposed: But for those running below The app XPrivacy is a must have! Really good security focused app.
Firefox Addons
But I use Chrome/Opera/<Insert other browser here>, I use Firefox on my phone, the reason being is because of the extension side. While I am aware opera has this addon ability, I will be using Firefox Addons only. Also Chrome has no extension support for mobile yet? Oh well munches out on RAM anyway.
These Addons are mirrored on Opera, if you prefer Opera, I'm sure you can find the same addon or one that works similar.
Bluhell Firewall
Addons Link
Lightweight Ad-Blocker and Tracking/Privacy Protector.
CanvasBlocker
Addons Link
Blocks the JS-API for modifying to prevent Canvas-Fingerprinting
CleanLinks
Addons Link
Converts obfuscated or nested links to genuine clean links.
Decentraleyes
Addons LinkThe aim of this add-on is to cut-out the middleman by providing lightning speed delivery of local (bundled) files to improve online privacy.
Disable WebRTC
Addons Link
WebRTC leaks your actual IP addresses from behind your VPN, by default.
HTTPS Everywhere
Addons Link
enabling HTTPS encryption automatically on sites that are known to support it
Privacy Badger
Addons Link
Better Privacy stops ads and invisible trackers
Pro Latte Content Filter
Addons Link
Block sites containing pornography, or any other kind of material, based on simple keyword lists.
Self Destructing Cookies
Addons link
BOOM!! GOES THE COOKIES.
//Optional
Less spam, please
Addons Link
Disposable Emails. Great for them pesky sites that ask for emails the spam you with rubbish
Ad Block plus
Addons Link
Does what it says on the tin. There are Addons that block pages from saying you have an ad blocker.
Secure Mail Providers
Why more people don't use secure encryption emails is beyond me sometimes. But regardless it's something I'd strongly recommend! Tell your friends too, and family! Get your dog on them. While there are a number available the following are ones I've used or still continue to use!
Proton Mail
Lavabit.com
hushmail.com/
vfemail.net/
Proton Mail is the main one I use anymore. It's an excellent app and great service with double log in and encryption. Like your emails in a double safe. Do note! If you forget your password, it will turn your emails into plonk and be completely useless.
Thank you for reading this post! I really appreciate it, I put this together just so people can be helped there is no one place. My hope is to turn this into quite a buzzing post, I'd like to constantly update it having it a great go to resource for your needs. Give me a thanks for my hard work if you think it's deserved
Warning: The following is not for Amateurs or new to XDA, you MUST be running a LinuxGNU interface! This is extra security usually set on PCs, and may work depending on your interface.
A Tad too Paranoid
Ipkungfu
Open up your terminal running in your Linux IDE.
Input :
Code:
sudo apt-get install ipkungfu
Next we need to configure the file there are two ways to do this way 1 you can configure in the terminal with "Nano" :
Code:
sudo nano /etc/ipkungfu/ipkungfu.conf
Or move it to SD card, open with your favorite text editor then move back like so:
Code:
mv /etc/ipkungfu/ipkungfu.conf /sdcard
Then to move back:
Code:
mv /sdcard/ipkungfu.conf /etc/ipkungfu
Once you have got the config file open you want to un comment and adjust accordingly to your needs. Here is an example of what you can change:
Code:
# IP Range of your internal network. Use "127.0.0.1"
# for a standalone machine. Default is a reasonable
# guess.
LOCAL_NET="192.168.1.0/255.255.255.0"
-------
Code:
# Set this to 0 for a standalone machine, or 1 for
# a gateway device to share an Internet connection.
# Default is 1.
GATEWAY=0
-------
Code:
# Temporarily block future connection attempts from an
# IP that hits these ports (If module is present) FORBIDDEN_PORTS="135 137 139"
-------
Code:
# Drop all ping packets?
# Set to 1 for yes, 0 for no. Default is no.
BLOCK_PINGS=1
-------
Code:
# What to do with 'probably malicious' packets
#SUSPECT="REJECT"
SUSPECT="DROP"
-------
Code:
# What to do with obviously invalid traffic
# This is also the action for FORBIDDEN_PORTS
#KNOWN_BAD="REJECT"
KNOWN_BAD="DROP"
-------
Code:
# What to do with port scans
#PORT_SCAN="REJECT"
PORT_SCAN="DROP"
These are just a suggestion, adjust to your needs!
Once you've done and moved back or saved the nano, (to save use ctrl+X) everything should be done. Now type in:
Code:
sudo ipkungfu
Jump on over to shields Up and see something Coolio. Hopefully.
Snort
This is intrusion detection, have a look at seeing who's been at your door, this is a basic configuration. To set this up. We simply type:
Code:
sudo apt-get install snort
Once that's done type:
Code:
snort -D
All done, you can view live packets like so:
Code:
sudo snort
Or view logs:
Code:
sudo nano /var/log/snort/alert
~ More May be added soon
~ Give us a thanks please
Reserved
Please, go on.
Thanks for this guide. I now have my device encrypted. On Marshmallow it does not explicitly say that my SD Card is also encrypted (its formatted as internal storage) but according to articles out there actually it is.
Yes, I don't know why email encryption is not more widely adopted. For personal every day emails "Hi, how you doing ? Had a great day?" kind of thing maybe that's not the most sensitive info. But what if it contains a meeting place to go and pick up your child at and you are late ? Paranoid ? In today's world ? But what about actual sensitive data. I'm talking about charities that help victims of abuse. The Samaritans. Other organisations that help victims of child trafficking. I once volunteered for an organisation that helped people illegally pursued by a government run organisation. I eventually found out that they had no, I mean ZERO, ZILCH security policy yet they were holding sensitive details about individuals who were in danger. After failing to get their board of directors to change things I resigned from the organisation. So anyway back on topic ... I just checked cPanel and my host does allow "GnuPG" encryption on email. So when I've figured out how to set it up and use the appropriate app on my device (starting with list above of course) I come back here.
Awesome guide. I know this thread is a couple years old but still applies.
Anyone have any opinions or comments about Proton VPN? I see the Proton mail is on the list which I also use. Just curious about the VPN.

(seven 07) Mobile App Scanner to Find Security Vulnerabilities.

Test if your Mobile App has any security flaws and fix it before it damages your business reputation.
The latest research by NowSecure shows that 25% of mobile apps contains at least one high-risk security vulnerability.
59% of finance app on Android had three OWAS Mobile top 10 risks.
Mobile usage is growing so Mobile Apps. There are more than 2 billion apps in Apple App Store & 2.2 million in Google Play Store.
There are multiple types of vulnerabilities and some of the dangerous are:
Leaking personal user sensitive data (email, credential, IMEI, GPS, MAC address) over the network
Communication over the network with little or no encryption
Having world readable/writable file
Arbitrary code execution
Malware
If you are the owner, the developer then you should do all it takes to secure your mobile app. There are plenty of security vulnerability scanner for the website, and the following should help you to find the security flaws in Mobile apps.
Some of the abbreviation used in this post.
APK – Android Package Kit
IPA – iPhone application archive
IMEI – International mobile equipment identity
GPS – Global positioning system
MAC – Media access control
API – Application Programming Interface
OWASP – Open web application security project
Android/iOS App Vulnerability Scanner
1. Ostorlab
2. Appvigil
3. Quixxi
4. AndroTotal
5. Akana
6. NVISO
7. SandDroid
1. Ostorlab
Ostorlab let you scan your Android or iOS app and give you the detailed information on the finding. You can upload the APK or IPA application file, and within few minutes you will have the security scan report.
The maximum size of app file you can upload to be scanned is 60MB However, if your app size is larger than 60MB then you may contact them to upload through API call.
It is based on open-source like Androguard, Radare2. It would be good to scan your mobile application in FREE with Ostorlab.
2. Appvigil
Find the security loophole in your mobile app with Appvigil and get in-depth vulnerability report in minutes.
With Appvigil, you get not just a safety hazard details but also the patch recommendation so you can fix it immediately. You don’t need to install any software as everything is done at Appvigil cloud.
Once you upload APK or IPA file, It performs static and dynamic analysis on your app (Android/iOS) including OWASP Mobile Top 10 vulnerabilities.
3. Quixxi
Quixxi is focused on providing mobile analytics, mobile app protection & recovery revenue loss. If you are just looking to do a vulnerability test, then you can upload your Android or iOS application.
The scan may take few minutes and once done; you will get a vulnerability report overview. However, if you are looking for the comprehensive report, then you got to do a FREE registration on their website.
4. AndroTotal
As the name indicates, this is applicable only for Android apps. AndroTotal scan APK file for viruses & malware. It checks against the following Anti-virus.
McAfee
TrustGo
ESET
Comodo
AVG
Avira
Bitdefender
Qihoo
If you are looking for a quick checkup on your APK files for viruses, then AndroTotal scan would be the quick win.
5. Akana
Akana is interactive analysis tool for Android apps. Akana checks your app for malicious code and gives you a nice summary of your app.
It’s free so go ahead and give a try to see if your Android app has any malicious code.
6. NVISO
Nviso APKSCAN is another handy online tool to scan your app for malware. Getting scan results may take time based on queue so you can enter your email address to get a notification once scan report is available.
I checked my dummy application with Nviso and could see it tested the following.
Disk activity
Virus lookup
Network activity
Can place phone call, send SMS or not
Cryptographic activity
Information leakage
7. SandDroid
SandDroid performs static and dynamic analysis and gives you a comprehensive report. You can upload APK or zip file with a maximum of 50 MB.
SandDroid is developed by Botnet research team & Xi’an Jiaotong University. It currently performs checks on the following.
File size/hash, SDK version
Network data, component, code feature, sensitive API, IP distribution analysis
Data leakage, SMS, phone call monitor
Risk behavior and score
Take a look at some scan report to get an idea.
I hope above vulnerability scanners help you to check your mobile application security and fix if any finding.
If you own a website, then you may be interested in performing vulnerability scan against your site automatically.

Categories

Resources