[CLOSED][APP][2.3+] dSploit v1.0.31b - An Android network penetration suite

Do you think the dSploit project needs a website with a forum and maybe some doc ?


  • Total voters
    340
  • Poll closed .
Status
Not open for further replies.
Search This thread

evilsocket

Senior Member
Oct 1, 2012
706
1,743
38
Rome
www.evilsocket.net
Hi guys, i'd like to introduce this project of mine and hopefully find some beta testers for it :D

dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device.

Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc .

It's still in beta stage so unexpected behaviour could happen, after all i need b-testers for this reason :D

ANNOUNCEMENT: dSploit merges with ZImperium zANTI2
 
Last edited by a moderator:

frenzyboi

Senior Member
May 11, 2012
866
762
First time after it loads the netowork, after like 2 seconds, it crashed and started FC-ing thereafter.
Toast states that a log has been sent but I'll attached it anyway.
Hope it can be fixed soon! Subscribed to this thread!
Code:
E/SYSTEM  (18861): java.io.FileNotFoundException: /data/data/it.evilsocket.dsploit/files/tools/nmap/nmap-services (No such file or directory)
E/SYSTEM  (18861): java.io.FileNotFoundException: /data/data/it.evilsocket.dsploit/files/tools/nmap/nmap-mac-prefixes (No such file or directory)
E/su      (18870): sudb - Database closed
E/su      (18893): sudb - Opening database
E/su      (18893): sudb - Database opened
E/su      (18893): sudb - Database closed
E/su      (18905): sudb - Opening database
E/su      (18905): sudb - Database opened
E/su      (18905): sudb - Database closed
E/su      (18916): sudb - Opening database
E/su      (18916): sudb - Database opened
E/su      (18916): sudb - Database closed
E/su      (18928): sudb - Opening database
E/su      (18928): sudb - Database opened
E/su      (18928): sudb - Database closed
E/kernel  (  132): [19972.000244] init: untracked pid 18730 exited
E/ACRA    (18861): ACRA caught a RuntimeException exception for it.evilsocket.dsploit. Building report.
E/ACRA    (18861): it.evilsocket.dsploit fatal error : Unable to start service it.evilsocket.dsploit.net.NetworkMonitorService@2b0ced30 with Intent { cmp=it.evilsocket.dsploit/.net.NetworkMonitorService }: java.lang.IllegalArgumentException: contentIntent required: pkg=it.evilsocket.dsploit id=1 notification=Notification(vibrate=null,sound=null,defaults=0x0,flags=0x10)
E/ACRA    (18861): java.lang.RuntimeException: Unable to start service it.evilsocket.dsploit.net.NetworkMonitorService@2b0ced30 with Intent { cmp=it.evilsocket.dsploit/.net.NetworkMonitorService }: java.lang.IllegalArgumentException: contentIntent required: pkg=it.evilsocket.dsploit id=1 notification=Notification(vibrate=null,sound=null,defaults=0x0,flags=0x10)
E/ACRA    (18861): 	at android.app.ActivityThread.handleServiceArgs(ActivityThread.java:2073)
E/ACRA    (18861): 	at android.app.ActivityThread.access$2800(ActivityThread.java:121)
E/ACRA    (18861): 	at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1006)
E/ACRA    (18861): 	at android.os.Handler.dispatchMessage(Handler.java:99)
E/ACRA    (18861): 	at android.os.Looper.loop(Looper.java:130)
E/ACRA    (18861): 	at android.app.ActivityThread.main(ActivityThread.java:3701)
E/ACRA    (18861): 	at java.lang.reflect.Method.invokeNative(Native Method)
E/ACRA    (18861): 	at java.lang.reflect.Method.invoke(Method.java:507)
E/ACRA    (18861): 	at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:866)
E/ACRA    (18861): 	at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:624)
E/ACRA    (18861): 	at dalvik.system.NativeStart.main(Native Method)
E/ACRA    (18861): Caused by: java.lang.IllegalArgumentException: contentIntent required: pkg=it.evilsocket.dsploit id=1 notification=Notification(vibrate=null,sound=null,defaults=0x0,flags=0x10)
E/ACRA    (18861): 	at android.os.Parcel.readException(Parcel.java:1326)
E/ACRA    (18861): 	at android.os.Parcel.readException(Parcel.java:1276)
E/ACRA    (18861): 	at android.app.INotificationManager$Stub$Proxy.enqueueNotificationWithTag(INotificationManager.java:274)
E/ACRA    (18861): 	at android.app.NotificationManager.notify(NotificationManager.java:111)
E/ACRA    (18861): 	at android.app.NotificationManager.notify(NotificationManager.java:91)
E/ACRA    (18861): 	at it.evilsocket.dsploit.net.NetworkMonitorService.sendNotification(NetworkMonitorService.java:70)
E/ACRA    (18861): 	at it.evilsocket.dsploit.net.NetworkMonitorService.onStartCommand(NetworkMonitorService.java:94)
E/ACRA    (18861): 	at android.app.ActivityThread.handleServiceArgs(ActivityThread.java:2060)
E/ACRA    (18861): 	... 10 more
E/InputDispatcher(  260): channel '2b2fbf18 Toast (server)' ~ Consumer closed input channel or an error occurred.  events=0x8
E/InputDispatcher(  260): channel '2b2fbf18 Toast (server)' ~ Channel is unrecoverably broken and will be disposed!
E/su      (18973): sudb - Opening database
E/su      (18973): sudb - Database opened
E/su      (18973): sudb - Database closed
E/su      (18985): sudb - Opening database
E/su      (18985): sudb - Database opened
E/su      (18985): sudb - Database closed
E/su      (18997): sudb - Opening database
E/su      (18997): sudb - Database opened
E/su      (18997): sudb - Database closed
E/su      (19008): sudb - Opening database
E/su      (19008): sudb - Database opened
E/su      (19008): sudb - Database closed
E/ACRA    (18964): ACRA caught a RuntimeException exception for it.evilsocket.dsploit. Building report.
E/ACRA    (18964): it.evilsocket.dsploit fatal error : Unable to start service it.evilsocket.dsploit.net.NetworkMonitorService@2b1879a0 with Intent { cmp=it.evilsocket.dsploit/.net.NetworkMonitorService }: java.lang.IllegalArgumentException: contentIntent required: pkg=it.evilsocket.dsploit id=1 notification=Notification(vibrate=null,sound=null,defaults=0x0,flags=0x10)
E/ACRA    (18964): java.lang.RuntimeException: Unable to start service it.evilsocket.dsploit.net.NetworkMonitorService@2b1879a0 with Intent { cmp=it.evilsocket.dsploit/.net.NetworkMonitorService }: java.lang.IllegalArgumentException: contentIntent required: pkg=it.evilsocket.dsploit id=1 notification=Notification(vibrate=null,sound=null,defaults=0x0,flags=0x10)
E/ACRA    (18964): 	at android.app.ActivityThread.handleServiceArgs(ActivityThread.java:2073)
E/ACRA    (18964): 	at android.app.ActivityThread.access$2800(ActivityThread.java:121)
E/ACRA    (18964): 	at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1006)
E/ACRA    (18964): 	at android.os.Handler.dispatchMessage(Handler.java:99)
E/ACRA    (18964): 	at android.os.Looper.loop(Looper.java:130)
E/ACRA    (18964): 	at android.app.ActivityThread.main(ActivityThread.java:3701)
E/ACRA    (18964): 	at java.lang.reflect.Method.invokeNative(Native Method)
E/ACRA    (18964): 	at java.lang.reflect.Method.invoke(Method.java:507)
E/ACRA    (18964): 	at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:866)
E/ACRA    (18964): 	at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:624)
E/ACRA    (18964): 	at dalvik.system.NativeStart.main(Native Method)
E/ACRA    (18964): Caused by: java.lang.IllegalArgumentException: contentIntent required: pkg=it.evilsocket.dsploit id=1 notification=Notification(vibrate=null,sound=null,defaults=0x0,flags=0x10)
E/ACRA    (18964): 	at android.os.Parcel.readException(Parcel.java:1326)
E/ACRA    (18964): 	at android.os.Parcel.readException(Parcel.java:1276)
E/ACRA    (18964): 	at android.app.INotificationManager$Stub$Proxy.enqueueNotificationWithTag(INotificationManager.java:274)
E/ACRA    (18964): 	at android.app.NotificationManager.notify(NotificationManager.java:111)
E/ACRA    (18964): 	at android.app.NotificationManager.notify(NotificationManager.java:91)
E/ACRA    (18964): 	at it.evilsocket.dsploit.net.NetworkMonitorService.sendNotification(NetworkMonitorService.java:70)
E/ACRA    (18964): 	at it.evilsocket.dsploit.net.NetworkMonitorService.onStartCommand(NetworkMonitorService.java:94)
E/ACRA    (18964): 	at android.app.ActivityThread.handleServiceArgs(ActivityThread.java:2060)
E/ACRA    (18964): 	... 10 more
E/InputDispatcher(  260): channel '2b475ec0 it.evilsocket.dsploit/it.evilsocket.dsploit.MainActivity (server)' ~ Consumer closed input channel or an error occurred.  events=0x8
E/InputDispatcher(  260): channel '2b475ec0 it.evilsocket.dsploit/it.evilsocket.dsploit.MainActivity (server)' ~ Channel is unrecoverably broken and will be disposed!
 

evilsocket

Senior Member
Oct 1, 2012
706
1,743
38
Rome
www.evilsocket.net
First time after it loads the netowork, after like 2 seconds, it crashed and started FC-ing thereafter.
Toast states that a log has been sent but I'll attached it anyway.
Hope it can be fixed soon! Subscribed to this thread!
...

Yep you are the 2.3.4 Android crash report one, aren't you ? :D
I'm investigating to fix this as soon as possible, 2.3 support is still VERY experimental ( i do not have a 2.3 device and i can't test the app on the emulator due to unhandled functionalities :( ).
 
Last edited:

scarmon25

Senior Member
Feb 18, 2011
5,689
2,159
Knoxville, TN
This is a very interesting app. I do agree with the above poster. That would be a very nice gesture on the devs part. I look forward to the development of this app.
 

frenzyboi

Senior Member
May 11, 2012
866
762
Yep you are the 2.3.4 Android crash report one, aren't you ? :D
I'm investigating to fix this as soon as possible, 2.3 support is still VERY experimental ( i do not have a 2.3 device and i can't test the app on the emulator due to unhandled functionalities :( ).
Yep! I'm on Xperia Ray 2.3.4, rooted.
I'll be your beta tester then ^^ I'll report all bugs etc I encounter so this application can be used by many others using the same version of Android!
Don't worry, the community will help too!

For those using the XDADeveloper Android app, the clickable link is at
https://github.com/evilsocket/dsploit
 
Last edited:

evilsocket

Senior Member
Oct 1, 2012
706
1,743
38
Rome
www.evilsocket.net
Yep! I'm on Xperia Ray 2.3.4, rooted.
I'll be your beta tester then ^^ I'll report all bugs etc I encounter so this application can be used by many others using the same version of Android!
Don't worry, the community will help too!

Thanks dude!!!!! I tried to get some help from the italian community ( the country i am from ) but we lack a tech forum like this, you help is REALLY appreciated ... really.

Anyway, i've just released the 1.0.8b and hopefully fixed that bug, can you confirm that ?

Feel free to use the issue tracker on github to post issues, i think it's better to keep track of bugs ^^
 
D

Deleted member 3493119

Guest
Thanks to you for using and testing it :)

No problem,
but I found a problem with the app, take a look at the screenshot and look look on the textbox popup thingy, plz fix it:):
atu8ynu9.jpg


Can I be a betatester of the app? I use a Xperia Ray with Android 4.0.4and latest busybox and superuser binary

Skickat från min ST18i via Tapatalk 2
 
Last edited by a moderator:

frenzyboi

Senior Member
May 11, 2012
866
762
Thanks dude!!!!! I tried to get some help from the italian community ( the country i am from ) but we lack a tech forum like this, you help is REALLY appreciated ... really.

Anyway, i've just released the 1.0.8b and hopefully fixed that bug, can you confirm that ?

Feel free to use the issue tracker on github to post issues, i think it's better to keep track of bugs ^^

Sadly, still having FC :(
Code:
E/ACRA    (22236): ACRA caught a RuntimeException exception for it.evilsocket.dsploit. Building report.
E/ACRA    (22236): it.evilsocket.dsploit fatal error : Unable to start service it.evilsocket.dsploit.net.NetworkMonitorService@2b6f4dc8 with Intent { cmp=it.evilsocket.dsploit/.net.NetworkMonitorService }: java.lang.IllegalArgumentException: contentIntent required: pkg=it.evilsocket.dsploit id=1 notification=Notification(vibrate=null,sound=null,defaults=0x0,flags=0x10)
E/ACRA    (22236): java.lang.RuntimeException: Unable to start service it.evilsocket.dsploit.net.NetworkMonitorService@2b6f4dc8 with Intent { cmp=it.evilsocket.dsploit/.net.NetworkMonitorService }: java.lang.IllegalArgumentException: contentIntent required: pkg=it.evilsocket.dsploit id=1 notification=Notification(vibrate=null,sound=null,defaults=0x0,flags=0x10)
E/ACRA    (22236): 	at android.app.ActivityThread.handleServiceArgs(ActivityThread.java:2073)
E/ACRA    (22236): 	at android.app.ActivityThread.access$2800(ActivityThread.java:121)
E/ACRA    (22236): 	at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1006)
E/ACRA    (22236): 	at android.os.Handler.dispatchMessage(Handler.java:99)
E/ACRA    (22236): 	at android.os.Looper.loop(Looper.java:130)
E/ACRA    (22236): 	at android.app.ActivityThread.main(ActivityThread.java:3701)
E/ACRA    (22236): 	at java.lang.reflect.Method.invokeNative(Native Method)
E/ACRA    (22236): 	at java.lang.reflect.Method.invoke(Method.java:507)
E/ACRA    (22236): 	at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:866)
E/ACRA    (22236): 	at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:624)
E/ACRA    (22236): 	at dalvik.system.NativeStart.main(Native Method)
E/ACRA    (22236): Caused by: java.lang.IllegalArgumentException: contentIntent required: pkg=it.evilsocket.dsploit id=1 notification=Notification(vibrate=null,sound=null,defaults=0x0,flags=0x10)
E/ACRA    (22236): 	at android.os.Parcel.readException(Parcel.java:1326)
E/ACRA    (22236): 	at android.os.Parcel.readException(Parcel.java:1276)
E/ACRA    (22236): 	at android.app.INotificationManager$Stub$Proxy.enqueueNotificationWithTag(INotificationManager.java:274)
E/ACRA    (22236): 	at android.app.NotificationManager.notify(NotificationManager.java:111)
E/ACRA    (22236): 	at android.app.NotificationManager.notify(NotificationManager.java:91)
E/ACRA    (22236): 	at it.evilsocket.dsploit.net.NetworkMonitorService.sendNotification(NetworkMonitorService.java:72)
E/ACRA    (22236): 	at it.evilsocket.dsploit.net.NetworkMonitorService.onStartCommand(NetworkMonitorService.java:96)
E/ACRA    (22236): 	at android.app.ActivityThread.handleServiceArgs(ActivityThread.java:2060)
E/ACRA    (22236): 	... 10 more
E/InputDispatcher(  260): channel '2b414d58 it.evilsocket.dsploit/it.evilsocket.dsploit.MainActivity (server)' ~ Consumer closed input channel or an error occurred.  events=0x8
E/InputDispatcher(  260): channel '2b414d58 it.evilsocket.dsploit/it.evilsocket.dsploit.MainActivity (server)' ~ Channel is unrecoverably broken and will be disposed!
E/ACRA    (22353): ACRA caught a RuntimeException exception for it.evilsocket.dsploit. Building report.
E/ACRA    (22353): it.evilsocket.dsploit fatal error : Unable to start service it.evilsocket.dsploit.core.UpdateService@2b015248 with Intent { cmp=it.evilsocket.dsploit/.core.UpdateService }: java.lang.NullPointerException
E/ACRA    (22353): java.lang.RuntimeException: Unable to start service it.evilsocket.dsploit.core.UpdateService@2b015248 with Intent { cmp=it.evilsocket.dsploit/.core.UpdateService }: java.lang.NullPointerException
E/ACRA    (22353): 	at android.app.ActivityThread.handleServiceArgs(ActivityThread.java:2073)
E/ACRA    (22353): 	at android.app.ActivityThread.access$2800(ActivityThread.java:121)
E/ACRA    (22353): 	at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1006)
E/ACRA    (22353): 	at android.os.Handler.dispatchMessage(Handler.java:99)
E/ACRA    (22353): 	at android.os.Looper.loop(Looper.java:130)
E/ACRA    (22353): 	at android.app.ActivityThread.main(ActivityThread.java:3701)
E/ACRA    (22353): 	at java.lang.reflect.Method.invokeNative(Native Method)
E/ACRA    (22353): 	at java.lang.reflect.Method.invoke(Method.java:507)
E/ACRA    (22353): 	at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:866)
E/ACRA    (22353): 	at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:624)
E/ACRA    (22353): 	at dalvik.system.NativeStart.main(Native Method)
E/ACRA    (22353): Caused by: java.lang.NullPointerException
E/ACRA    (22353): 	at it.evilsocket.dsploit.core.UpdateService.onStartCommand(UpdateService.java:47)
E/ACRA    (22353): 	at android.app.ActivityThread.handleServiceArgs(ActivityThread.java:2060)
E/ACRA    (22353): 	... 10 more
 

ktl20

Senior Member
Mar 11, 2009
102
7
Hi
I cant iven install 1.0.8b version on SGSplus 2.3.5. dSploit 1.0.6b installs but cant run it (only blink of the screen and nothing more)
Version 1.0.7b installs but FC
 
Last edited:

DeathCzar

Senior Member
Dec 20, 2011
844
418
Mumbai
Tried it on Xperia Neo V running CM 9.1.
Runs smooth. Played around with it a bit. The inspector function doesn't seem to detect the manufacturer and OS of the device. Whereas in the home screen of the app, it correctly shows the manufacturer. See screenshots attached for what I am saying.

PS. The 2nd screenshot is after I ran the inspector and it automatically stopped. Don't say that I didn't run it.

PS. Since it ran on my device, it will definitely run on cm9 based Xperia arc, arc s, neo, and ray. They are almost identical under the.hood.

Sent from my MT11i using xda premium
 

Attachments

  • uploadfromtaptalk1349161254736.jpg
    uploadfromtaptalk1349161254736.jpg
    52.4 KB · Views: 5,560
  • uploadfromtaptalk1349161275107.jpg
    uploadfromtaptalk1349161275107.jpg
    32 KB · Views: 5,475
Last edited:

evilsocket

Senior Member
Oct 1, 2012
706
1,743
38
Rome
www.evilsocket.net
Tried it on Xperia Neo V running CM 9.1.
Runs smooth. Played around with it a bit. The inspector function doesn't seem to detect the manufacturer and OS of the device. Whereas in the home screen of the app, it correctly shows the manufacturer. See screenshots attached for what I am saying.

PS. The 2nd screenshot is after I ran the inspector and it automatically stopped. Don't say that I didn't run it.

PS. Since it ran on my device, it will definitely run on cm9 based Xperia arc, arc s, neo, and ray. They are almost identical under the.hood.

Sent from my MT11i using xda premium

Well the manufacter you see in the main screen, is based upon network adapter mac address lookup, the inspector use a tcp/ip fingerprint, which is another thing.
The network adapter manufacter is not the same thing of the device manufacter, for instance you could have a realtek ethernet adapter on an asus computer :)
 
  • Like
Reactions: Ci-Fi and lopman
Status
Not open for further replies.

Top Liked Posts

  • There are no posts matching your filters.
  • 653
    Hi guys, i'd like to introduce this project of mine and hopefully find some beta testers for it :D

    dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device.

    Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc .

    It's still in beta stage so unexpected behaviour could happen, after all i need b-testers for this reason :D

    ANNOUNCEMENT: dSploit merges with ZImperium zANTI2
    31
    Important Note on the Incoming 1.1.0b Version

    After more than a year a new beta version v1.1.0b is coming, featuring full localization for many languages, a complete graphical restyling and many minor optimizations and fixes.
    Unfortunately I’ve lost the original certificate I used to sign dSploit packages on each release, this means that the auto update mechanism between the current 1.0.31b and the new 1.1.0b version will not work.
    You will be prompted for the new update and you will be able to download it, but installation will fail since the two apks will have different signatures and Android considers this as APK tampering.

    Therefore a manual installation for the new version will be required then, starting from 1.1.0b the auto update process will continue to work as usual since I’m gonna backup the certificate everywhere :D

    Please do not ask when the new release will be available, multi languages localizations need to be finished and only then I will release the new APK.
    29
    dSploit is Back!

    Hi guys, after more than four months from the last release of dSploit, i’ve decided to open this blog and continuing dSploit developing.

    I’d like to say to all of you guys that I’m sorry for this pause period, but as someone already knows, i’ve recently switched to a new job which is very time taking ( and exciting of course! ) therefore i hadn’t any free time to work on my projects.

    Continue reading here ...
    21
    New dSploit 1.1.1b-20131229 nightly version available to download! http://update.dsploit.net/nightly
    18
    Nightly Releases Available.

    Since many of you asked how to compile dSploit themself to try the new features, and many of you had problems with that ( yeah I know, building an Android app is not as easy as compiling a “Hello World”, right? ), I decided to make nightly built apk available for everyone.

    Continues here.