How to turn your Android phone into a security analysis toolbox (via installing BackTrack)

Well, I should have known. Smile Once people start putting Ubuntu and whatever on their Android phones, there's no turning back. Wink A guy called Zachary Powell started making Android apps that help you install Ubuntu, Debian or BackTrack on your phone. I think the latter needs not too much of an introduction ... it's got pretty much most of the "security" tools that you might need to do a vulnerability scan of a LAN. Running BackTrack on your phone you can become a "secret agent", walking into a place and just "hack" (as in "run apps that do it for you") through your way to the target by pressing a button titled "upload virus" (note the movie reference Smile ). Of course as a possible side-effect you might find yourself pretty soon in jail. Wink So treat this idea as seriously as it was meant. Smile

Undocumented mm.cfg parameters for the debug version of Adobe Flash Player

A long list of undocumented mm.cfg parameters that could be of help while debugging ActionScript code.

Kazam Screencaster

"Kazam is a simple screen recording program that will capture the content of your screen and record a video file that can be played by any video player that supports VP8/WebM video format. Optionally you can record sound from any sound input device that is supported and visible by PulseAudio."

GTK+ UVC Viewer (webcam app for your Gnome desktop)

"This project aims at providing a simple GTK interface for capturing and viewing video from devices supported by the linux UVC driver, although it should also work with any v4l2 compatible device."

Explanation of real, effective, saved set and file system UID/GID values from /proc/<pid>/status

Very informative. It'd have been nice to see at least a reference to the setuid(2) (and/or seteuid(2)) manpage in the description of /proc/[pid]/status in the manpage of proc(5). Sad

How to fix Samsung Galaxy Nexus MTP file transfer for Ubuntu 11.10

One comment on the article: in Ubuntu Precise Pangolin (v12.04) the libmtp is already the latest (v1.1.3) and Nexus works with it (ie. you can write to the device too) out of the box.

Options of the ps command in Android's builtin toolbox (aka. simplified busybox replacement)

Toolbox itself does not give away too much help about the supported commands' options. Actually it gives you more like nothing. Smile So the only way to find out what options each command supports is by looking into the source. The supplied link points to the latest version of the ps command's source. If you're interested in a specific Android version's ps command, select it in the "branch:...." combobox.

Rooting the Galaxy Nexus

The essential part of the Superboot image is a small shellscript. Actually the entire boot environment is only there so this shell script can be successfully executed. The script consists of the following commands:
mount -o rw,remount -t ext4 /dev/block/platform/omap/omap_hsmmc.0/by-name/system /system
rm /system/bin/su
rm /system/xbin/su
mkdir /system/xbin
cat /superboot/su>/system/xbin/su
chmod 6755 /system/xbin/su
cat /superboot/Superuser.apk>/system/app/Superuser.apk
mount -o ro,remount -t ext4 /dev/block/platform/omap/omap_hsmmc.0/by-name/system /system

Android checks for system updates

This is what I call efficient. Smile

Syndicate content