dSploit v1.0.31b - An Android network penetration suite

Dsploit A Penetration Testing ToolKit For Android

dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assessments on a mobile device. Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc . This application is still in beta stage, a stable release will be available as soon as possible, but expect some crash or strange behavior.

Features

  • RouterPWN  - Launch the http://routerpwn.com/ service to pwn your router.
  • Trace - Perform a traceroute on target.
  • Port Scanner - A syn port scanner to find quickly open ports on a single target.
  • Inspector - Performs target operating system and services deep detection, slower than syn port scanner but more accurate.
  • Vulnerability -  FinderSearch for known vulnerabilities for target running services upon National Vulnerability Database.
  • Login CrackerA -  very fast network logon cracker which supports many different services.
  • Packet ForgerCraft -  and send a custom TCP or UDP packet to the target.
  • MITM - A set of man-in-the-midtle tools to command&conquer the whole network.
  • Simple Sniff - Only redirects target's traffic through the device ( useful when using a network sniffer like 'Sharp' for Android ) and shows network stats.
  • Password Sniffer - Sniff passwords of many protocols such as http, ftp, imap, imaps, irc, msn, etc from the target.
  • Session Hijacker - Listen for cookies on the network and hijack sessions.
  • Kill Connections - Kill connections preventing the target to reach any website or server.
  • Redirect - Redirect all the http traffic to another adtress.
  • Replace Images - Replace all images on webpages with the specified one.
  • Replace Videos - Replace all youtube videos on webpages with the specified one.
  • Script Injection - Inject a javascript in every visited webpage.
  • Custom Filter - Replace custom text on webpages with the specified one.
Requirements
  • An Android device with at least the 2.3 ( Gingerbread ) version of the OS.
  • The device must be rooted
  • The device must have a BusyBox full install, this means with every utility installed ( not the partial installation).
Version 1.0.31b :

Implemented debug code profiler to have a clearer logcat when MITM modules slow down the network ( just for user reporting ).
Optimized binary stream search algorithm ( from ~80ms/call to ~13ms/call ).
Fixed #166 : couldn't arp for host x.x.x.x ( or at least the issue is handled ).
Minor code optimizations.
Fixed a bug which could cause javascript corruption during a MITM filtering.
Fixed #164 : "Replace youtube videos with custom ones" issue.
Big optimization of the transparent proxy data streaming performances.
Fixed #163 : Engaged ports when MITM modules are loaded. Fixed an issue occurring when the hijacker was stopped then restarting, causing new sessions not being shown.
Fixed #161 : Faulty nmap, no results returned in trace/portscan/inspector ( thanks to Gerben Meijer )
Switched from ACRA to BugSense bug reporting system ( tnx for BugSense guys for the free plus account!!! )
Fixed #159 : RejectedExecutionException when doing anything.
Fixed #155 : Add a Wake on Lan packets sending function ( to the packet forger module ).
Fixed #156 : Colored services in Login cracker.
Fixed a couple of null pointer exceptions caused by very particular circumstances.
Fixed a race condition when iterating dSploit targets.
Fixed a bug causing the application to crash when the login cracker has too many attempts to try.
Download dSploit

Source -
http://www.dsploit.net