Read Me

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 3

888b 888 d8b d8b 888 .d8888b.

8888888888
8888b 888 Y8P Y8P 888 d88P Y88b
888
88888b 888 888 888 888
888
888Y88b 888 888 88888b. 8888 888 888 888888 .d8888b 888 888 888
8888888
888 Y88b888 888 888 "88b "888 888 888 888 88K 888 888 888
888
888 Y88888 888 888 888 888 888 888 888 "Y8888b. 888 888 888 888
888
888 Y8888 888 888 888 888 Y88b 888 Y88b. X88 Y88b 888 Y88b d88P
888
888 Y888 888 888 888 888 "Y88888 "Y888 88888P' "Y88888 "Y8888P"
8888888888
888

d88P

888P"

# Authored By : Hasan
# Version : 1.0
# Date : 05/2020
# Ninjutsu is Penetration Testing & Red Teaming distribution
# Community :
# Github : https://github.com/Ninjutsu-OS/Ninjutsu
# Twitter : @ninjutsu_os
# Telegram: https://t.me/Ninjutsu_os
# Discord : https://discord.gg/wUBybfG
# If you feel like showing your love and/or appreciation for this project, then how
about shouting me a coffee or Pizza :) Buy Me A Coffe
# https://www.buymeacoffee.com/ninjutsu
# https://www.paypal.me/ninjutsuos

SQLExpress :
Password : toor

# Android adb access :


adb connect 127.0.0.1:62001
adb shell

OR Open CMD and run this command below to coorect port to connect :

C:\Users\Administrator\Desktop>for /f "tokens=2" %a in ('tasklist ^|findstr Nox.')


do netstat -aon | findstr %a

TCP 127.0.0.1:56001 0.0.0.0:0 LISTENING 5836


TCP 127.0.0.1:57001 0.0.0.0:0 LISTENING 5836
TCP 127.0.0.1:58001 0.0.0.0:0 LISTENING 5836
TCP 127.0.0.1:60001 0.0.0.0:0 LISTENING 5836
TCP 127.0.0.1:61001 0.0.0.0:0 LISTENING 5836
TCP 127.0.0.1:62001 0.0.0.0:0 LISTENING 5836
TCP 127.0.0.1:63001 0.0.0.0:0 LISTENING 5836
TCP 127.0.0.1:64001 0.0.0.0:0 LISTENING 5836
# Ruuning frida server

adb shell /data/local/tmp/frida-server &

# Note : Open new terminal and type following command :

# List all running processes on device:

frida-ps -U

# output command :

C:\Users\<User>\>frida-ps -U

PID Name
---- ------------------------------------
1734 adbd
5582 android.ext.services
5647 android.process.acore
5853 android.process.media
4633 audioserver
4629 cameraserver
5781 com.android.carrierconfig
5831 com.android.externalstorage
5758 com.android.inputservice
5612 com.android.keychain
5915 com.android.managedprovisioning
5930 com.android.onetimeinitializer
5385 com.android.phone
5953 com.android.providers.calendar

# List of Frida scripts :

Directory of C:\ProgramData\Mr.Robot\Win-Tools\frida

aesinfo.js
find-android-hook.js
jnitrace.js
android-certificate-pinning-bypass.js
frida-android-unpinning-ssl.js
network-security-config-bypass.js
android-debug-mode-bypass.js
frida-multiple-unpinning.js
okhttp3-interceptor.js
android-list-loaded-classes.js
frida_universal_pinning_bypasser.js
universal-ssl-check-bypass.js
anti-frida-bypass.js
fridantiroot.js
universal-ssl-check-bypass2.js
fiddler-4-ssl-pinning-bypass.js
fridascript.js

# Drozer :

run drozer agen and switch butoon to on then type following command :
# adb forward tcp:31415 tcp:31415
# drozer console connect

# Dns Leak Test :

https://restoreprivacy.com/vpn-test/
https://www.bestvpn.co/guides/vpn-leak-test/
https://dnsleak.com/
https://restoreprivacy.com/go/perfect-privacy-ip-check
https://ipleak.net/
https://adguard.com/en/welcome.html
https://www.dnsleaktest.com/
https://browserleaks.com/dns
https://www.expressvpn.com/dns-leak-test
https://cryptoip.info/dns-leak-test

You might also like