Den 22 jun 2014 19:08 skrev "cexinho ." <[email protected]>: > > Hello all, i'm still trying to understand the full potential pf android and the hardware used in it. > I was wondering if it's possible to turn an Android phone into a fully fledged penetration testing platform. > i'll try to elaborate a bit: > -I know it's possible to use a cellphone jammer to jam the signal from other phones, but is it possible to turn an android phone into a jammer or even a "proxy" for cellphone signals, allowing in a sense the tampering and sniffing of communications?
You would need to reverse engineer the radio firmware. Technically it could be done if you have hardware and firmware support, but that's unlikely. There's an SDR project too, but it isn't that capable yet (you can however use it with some TV receivers and USB-OTG to receive FM radio). > -Is it possible to reverse the USB process when connected to a computer, and make for ex adb work from phone to the computer. It's possible to achieve something like this trough wifi, but i want a wired and faster solution to allow a more practical approach. Look up P2P-adb and various USB based apps. I think back when PS3 was jailbreakable over USB, people managed to do it from Android. You want a device with USB host mode support. Also, for WiFi based look up dsploit. It has a lot of bundled basic classic attacks like arp spoofing (redirecting traffic on the WLAN) and upsidedownternet. There's even a few defense apps that detect arp spoofing and various hijack attempts. > -Also was wondering if its possible to turn an android phone into a web server, no need to be a powerful one a scrap powered one would be fine. Yes, there are tons of servers, of all kinds. Both for static and dynamic content. Even some using SL4A (scripting layer for Android) and Python. Others with ports of regular Linux servers. > -Was also wondering if its possible to install linux packaged applications on android, ones that are not meant to be used on phone. You can run full Linux in chroot with some tricks, and there's the VM app Limbo which even is capable of virtualizing x86. So you can do it that way. The chroot based methods will likely be perform better than a VM like Limbo (less overhead).
_______________________________________________ Guardian-dev mailing list Post: [email protected] List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev To Unsubscribe Send email to: [email protected] Or visit: https://lists.mayfirst.org/mailman/options/guardian-dev/archive%40mail-archive.com You are subscribed as: [email protected]
