Download Print this page

Advertisement

Quick Links

Copyright 2012 Rapid Focus Security, LLC, DBA Pwnie Express. Manual revision 6.5.2012.
Pwn Phone User Manual
Note: The online version of this manual is maintained here:
Legal Stuff
All Pwnie Express / Rapid Focus Security products are for legally authorized uses
only.
By using this product you agree to the terms of the Rapid Focus Security EULA:
(http://pwnieexpress.com/pdfs/RFSEULA.pdf)
As with any software application, any downloads/transfers of this software
are subject to export controls under the U.S. Commerce Department's Export
Administration Regulations (EAR). By using this software you certify your complete
understanding of and compliance with these regulations.
This product contains both open source and proprietary software: Proprietary
software is distributed under the terms of the Rapid Focus Security EULA: (http://
pwnieexpress.com/pdfs/RFSEULA.pdf). Open source software is distributed under the
GNU General Public License: (http://www.gnu.org/licenses/gpl.html).
Features
Comes with a wide variety of pen-testing tools installed with quick access shortcuts
Supports wireless monitor mode and injection for WEP cracking
Supports promiscuous mode for sniffing other traffic passively
Man in the middle capabilities for intercepting network traffic
Tools Installed:
Metasploit, Fasttrack, SET, Scapy, Nikto, SSLstrip, iodine
Kismet, Aircrack-NG, Wifite, Wifizoo, GrimWEPa, Wepbuster
Nmap, netcat, tcpdump, wireshark, tshark, Ettercap-NG, exploitDB, macchanger
http://www.pwnieexpress.com/support.html

Advertisement

loading
Need help?

Need help?

Do you have a question about the Smartphone and is the answer not in the manual?

Questions and answers

Summary of Contents for PWNIE Express Smartphone

  • Page 1 Note: The online version of this manual is maintained here: http://www.pwnieexpress.com/support.html Legal Stuff ● All Pwnie Express / Rapid Focus Security products are for legally authorized uses only. ● By using this product you agree to the terms of the Rapid Focus Security EULA: (http://pwnieexpress.com/pdfs/RFSEULA.pdf)
  • Page 2: Getting Started

    ● presencevnc client, x11vnc server, conky, tor, rdesktop, openvpn, netmon, iptables Getting started Make sure the keyboard is not slid out, otherwise you will be greeted with the backup menu. Turn the phone on by holding the small power button on the top (between volume and camera buttons) and sliding the side button on the right down.
  • Page 3 2. Promiscuous_on_off – Script to turn promiscuous mode on and off for wlan0 3. xTerm rootshell – Root shell access to the /home/user/MyDocs/pwnphone folder 4. Macchanger - Rolls mac address of wireless card wlan0 and changes hostname to “DellPC” 5. Nmap – Cmd line version of Nmap 6.
  • Page 4 1. File manager – Maemo GUI file manager 2. FTPn900 – FTP client 3. GSM Mon – Monitor status of cell phone connection 4. Presence VNC – VNC client 5. Rdesktop – Remote desktop client...
  • Page 5: Ssh Access

    6. x11vnc – VNC server quick shortcut WARNING – no password set by default! 7. Reverse SSH shell – Will ask for hostname to connect to but must be setup – see below 8. Browser – Maemo Web browser 9. VIM – Vim editor SSH access ●...
  • Page 6 remember you’ll need to put the wireless card wlan0 back into managed mode through a rootshell terminal (or using Green hat icon on desktop) when you want to connect to a network again. Enable: ifconfig wlan0 down iwconfig wlan0 mode monitor ifconfig up Disable: ifconfig down...
  • Page 7 signal strength, and viewing connected clients. ● Aircrack-NG on this phone is mainly used for WEP cracking and capturing WPA handshakes for cracking on a more powerful system. If you are unfamiliar with cracking WEP, start with these videos: http://www.youtube.com/watch?v=qe1VuhGciSI http://www.youtube.com/watch?v=oHq-cKoYcr8 ●...
  • Page 8 the access point, and there are clients connected, it should attack and crack everything automatically. If not, you can try opening a separate rootshell terminal and running the aireplay-ng fake auth and deauth attacks mentioned in the Aircrack-ng section above. 5.
  • Page 9 8. Select Router IP (192.168.1.1 typically) and click 'Add to Target 2' 9. Go to 'Mitm' and click 'Arp Poisoning' and select the checkbox for 'Sniff remote connections' click 'OK' (to stop arp-cache poisoning simply click on 'Mitm' and select 'Stop mitm') 10.