Showing posts with label Reverse Engineering. Show all posts
Showing posts with label Reverse Engineering. Show all posts

Sunday, July 21, 2019

How to use Radare2 - Reverse engineering tool

Hello everybody~~

This is IRISnoir from hackingarise. Bringing to you another Termux tutorial. Today we’ll be discussing about the handy-dandy reverse engineering toolkit, Radare2.

Hacking A Rise graph

Now, a brief description of it’s usage, shall we?
Radare2 is a very handy reverse engineering tool. It can be used to analyze some CRACKME stuff and solve them good. It’s use is complex and sophisticated. But it is also very interesting and unique. Not to mention one of the most useful tool I’ve seen besides Metasploit and other. You can also use it to analyze and confirm malware.

Now, it’s installation and usage:

To install it, just casually use:
pkg install radare2

It has a LOT of tool based on it.
I’m going to break down each one.

First tool is definitely:
radare2
The main tool of the whole project. It’s alias is:
r2
This can be used as a hexadecimal editor, disasembler and debugger. That’s the shortened description of it’s usage.

Next tool is:
r2agent
Which can let you tune in with your browser and do your job on it.

Now, we keep flowing with the tools list. Next up will be:
rahash2
This is a block-based hashing utility. You can use it to calculate, check, and view the hash value of a file.

Keep going, you can see:
rax2
This lets you convert between positive and negative integer, float, octal, binary and hexadecimal values.

Next, there is:
rabin2
This can be used to extract all info from a file, script, programs, etc.. This includes compiler info, programming language used, class, etc..

I hope you are keeping up, because next on our list is:
rarun2
This can lend you a hand in running scripts and programs. Activating a script or program with this tool will enable you to run them in exotic environments. How convenient.

Keep up with the list, we got:
rasm2
This is a assembler and disassembler for many architectures. Can assemble and disassemble files and hexpair strings.

Next up, there is:
r2pm
A package manager used to install, uninstall, update packages and discover plugins that is related to radare2.

Keep going, we have:
radiff2
This is a binary diffing utility. Implements and supports many algorithms. It will analyze and compare 2 files in a hash algorithm and print the results.

Another one:
rafind2
This is a tool that help you find byte patterns in files.

We are almost done, next tool is:
ragg2
This is a frontend for r_egg. This tool will compile programs written in high-level language into convenient sized binaries for x86, x86-64 and ARM.

Final command:
r2p
It will let you run r2 commands and pipe via r2pipe.

It will take me ages to instruct you on how to use this tool. Fortunately, I found a perfect PDF that can help.

Click here to download the PDF

Now, my sincerest comments. Since the Radare2 project has a lot of tools and all of them are equally helpful, it has gained a special place in my heart.

I hope you enjoy my tutorial. If so, please share it with your friends. And remember, stay ethical as we are not responsible for any of your malicious acts or any trouble you get into. Thank you. Have a nice day.

Monday, June 17, 2019

Embed apks with Evildroid

welcome to hacking a rise today we are going to show you how to embed a payload to a apk with evildroid this will help with av bypassing on android so lets get started

What is Evildroid

Android Mobile Exploitation with Evil-Droid. … Evil-Droid is a framework that creates & generates & embed apk payload to penetrate Android platforms

using Evildroid

install evil-droid

  • git clone https://github.com/M4sc3r4n0/Evil-Droid.git
    cd Evil-Droid/
    chmod +x evil-droid
    ./evil-droid
  • Hacking A Rise evildroid-300x144

    now we let it check to see what is installed and to see if anything need to be so let it run for few sec and it will as you to start the framework you click yes and start the services like apache2 and postgersql
    Hacking A Rise post-300x132
    Hacking A Rise startservices-285x300
    Hacking A Rise mainscreen-288x300

    now we pick number 3 and it will ask for a ip and then port
    Hacking A Rise 3-283x300

    Hacking A Rise potsss-300x136

    now it will ask for a name and then the payload you want to embed I had selected “android/meterpreter/reverse_tcp”
    Hacking A Rise payloadtype-274x300

    Hacking A Rise nameevil

    then it will ask u for the file as i picked hackingarise test app
    Hacking A Rise apktoembed-300x172
    it will now decompile the apk and the paylaod and recompile with the payload embed
    Hacking A Rise decompliing-300x216

    Hacking A Rise rebuilding--300x220

    Hacking A Rise done-300x241

    now it as you to pick handler i picked multi a its the first one there

    Hacking A Rise handler-300x297

    then it will open a window and start metasploit
    Hacking A Rise metasploitopen-300x208
    Hacking A Rise metasploit-300x218

    now we go to /root/Evil-Droid/evilapk to get the payload to send to target
    Hacking A Rise sendtotarget-300x170

    DISCLAMER

    dont use this for the wrong reasons as this purely for education

    Sunday, June 9, 2019

    How to use apktool on kali linux

    Welcome to hacking a rise in this we are going to show you the 2 basic commands for apktool on Kali this used in reverse engineering OK android apps this will decompile and recompile the apps to expose the source code in this we will be using the modbro app. the advantages of this is u can install a back door in the app and use it to bypass av or u can edit the app add and remove code what ever you want to do with this the so lets get stuck in to this one lads

    What is apk-tool

    A tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications. It also makes working with an app easier because of the project like file structure and automation of some repetitive tasks like building apk.

    Getting started

    Right fire up a terminal and type apktool
    Hacking A Rise Screenshot-from-2019-06-09-21-55-39

    now we are going to decompile the apk so type apktool -f d mobdro.apk
    Hacking A Rise decomplie

    now open the file explorer u will see the code you can now edit the app change everything about the app or add your back door

    Hacking A Rise homess

    once your done editing and all saved we will now build the app back up so type apktool b mobdro -o mobdro.apk

    Hacking A Rise recomplie

    now lads there ya go start cloning apps and putting them under another name hahahahaha but no dont be doing that

    Disclaimer

    lads dont do this for wrong reasons i take no responsibility for your actions as this for education reasons not for you to fuck around and spy on girls or hack people with so dont or u end up in prison I WONT AS THIS DISCLAIMER SAVES ME HAHAHA