Bypassing App Lock on any Android device

With rapid growth of android smartphone industries, the number of android smartphone users are increasing on fast scale. With growing digital trend, the security of these devices are highly essential as all your data is stored in your phone. Spying others phone is also easy.

Suppose you have a lot a private, confidential, personal photos in your phone. Be it your newspaper articles, college notes, screenshots, selfies, pics of your girlfriend/boyfriend, and other secrets….. You probably would use an App locker installed on your phone.

Now you would want to bypass your friend’s phone app lock to find out who their crush or girlfriend/boyfriend is. The basic methods I share with you might help you.

Ok first let me install an App lock on my phone from playstore. I choose the famous AppLock by DoMobile Lab.

Ok now I locked my Gallery app. By default AppLock locks the Settings app also.

We have to take advantage of user who makes mistakes of not locking other apps through which files can be accessed.

 

Things that usually work.

  1. Access Play Store to install alternate Gallery or File Manager.
  2. Safe Mode and uninstall App Lock.
  3. From installed File Manager which is not locked.

Since everyone knows these methods I’ll move on to this one. This is a fail-safe trick that works if the Chrome browser is not locked. Wait before you lock, checkout the trick, try it out.

Being good guys we did not install extra software here, so no malware building or nerd stuffs here…

Okay….! So open up Chrome and type this in the search bar.

file:///sdcard

Now you can view all the internal storage files on your phone. Everything. Yes everything. Hidden files, system files.

We have tested this on the following browsers, you too can try it out. There’s no harm..

  1. Chrome
  2. FireFox
  3. Opera (Not Opera Mini)
  4. Microsoft Edge

Note: This works only if the browser has permission to access files and storage and if the browser is not locked.

Final words: If nothing works, uninstall App Lock from phone. If you can’t do it in safe mode! To protect yourself lock your browser, PlayStore, File Manager.

Above all make sure not to give your phone to others..!

Warning: All contents are only for educational purposes, do not use these methods to interfere others privacy!

Do you know any other ways of bypassing App lock or things that didn’t work or anything that we left out? Please do comment on the post below and let us know!

DSCI Excellence Award 2017 in Cyber Security Education for Hindustan Institute of Technology and Science

On 14th December the DSCI Excellence Awards 2017 was presented in various disciplines to honor best practices adopted by the industry, exemplary work carried out in the field of security and privacy, and reward visionary leaders.

Hindustan Institute of Technology and Science was nominated under the Category of Excellence in Cyber Security Evangelism and was awarded the Excellence in Cyber Security Education. This was the one academic institution to be honored by DSCI this year.

Dr V Ceronmani Sharmila, Head-Centre for Networking and Cyber Defense, Asst. Prof, School of Computing Sciences and Dr T Sudalai Muthu, Asst Prof, School of Computing Sciences received the award of behalf of HITS and CNCD.

It was really a proud moment for members of Kruptos Security Club and Centre for Networking and Cyber Defense.

Find the Operating System of a server using ping and traceroute

It is simply possible to find or understand the OS a server is running on, using Ping and Traceroute scans.

Note: There are advanced tools to detect OS type, but this is one simple method that might not just be accurate if the datacenter routing traffic to a different subnet.

Ping is a computer network administration software utility, which used to find the Availability of a host on an Internet Protocol (IP) network.

Traceroute is a computer network diagnostic tool for displaying the route and measuring transit delays of packets across an Internet Protocol (IP) network.

We would need the TTL value and sometimes the total number of hops made in traceroute for OS detection.

Below is the table of OS with version and protocol details and the default values. These values differs between the Operating system. Reference: Subinsb gives details of the table of TTL values of different OS.

Device / OS Version Default values
AIX 60
AIX 30
AIX 3.2, 4.1 255
BSDI BSD/OS 3.1 and 4.0 255
Compa Tru64 v5.0 64
Cisco 254
DEC Pathworks V5 30
Foundry 64
FreeBSD 2.1R 64
FreeBSD 3.4, 4.0 255
FreeBSD 5 64
HP-UX 9.0x 30
HP-UX 10.01 64
HP-UX 10.2 255
HP-UX 11 255
HP-UX 11 64
Irix 5.3 60
Irix 6.x 60
Irix 6.5.3, 6.5.8 255
juniper 64
MPE/IX (HP) 200
Linux 2.0.x kernel 64
Linux 2.2.14 kernel 255
Linux 2.4 kernel 255
Linux Red Hat 9 64
MacOS/MacTCP 2.0.x 60
MacOS/MacTCP X (10.5.6) 64
NetBSD 255
Netgear FVG318 64
OpenBSD 2.6 & 2.7 255
OpenVMS 07.01.2002 255
OS/2 TCP/IP 3.0 64
OSF/1 V3.2A 60
OSF/1 V3.2A 30
Solaris 2.5.1, 2.6, 2.7, 2.8 255
Solaris 2.8 64
Stratus TCP_OS 255
Stratus TCP_OS (14.2-) 30
Stratus TCP_OS (14.3+) 64
Stratus STCP 60
SunOS 4.1.3/4.1.4 60
SunOS 5.7 255
Ultrix V4.1/V4.2A 60
Ultrix V4.1/V4.2A 30
Ultrix V4.2 – 4.5 255
VMS/Multinet 64
VMS/TCPware 60
VMS/TCPware 64
VMS/Wollongong 1.1.1.1 128
VMS/Wollongong 1.1.1.1 30
VMS/UCX 128
Windows for Workgroups 32
Windows 95 32
Windows 98 32
Windows 98, 98 SE 128
Windows 98 128
Windows NT 3.51 32
Windows NT 4.0 128
Windows NT 4.0 SP5- 32
Windows NT 4.0 SP6+ 128
Windows NT 4 WRKS SP 3, SP 6a 128
Windows NT 4 Server SP4 128
Windows ME 128
Windows 2000 pro 128
Windows 2000 family 128
Windows Server 2003 128
Windows XP 128
Windows Vista 128
Windows 7 128
Windows Server 2008 128
Windows 10 128

You need not confuse with the long list. Here is the short version of the table you can refer to.

Device / OS Default value
*nix (Linux/Unix) 64
Windows 128
Solaris/AIX 254

First we do a ping test to get the TTL value. Incase the TTL value does not match the given table value we will do a traceroute on the same domain to get the number of hops and sum the TTL value and number of hops.

Now we perform the first test.

We ping www.kruptos.club

We are getting a TTL of 56.

Incase your TTL value matches the table then you can stop here and proceed without doing traceroute.

The value 56 cannot be found in the table so we go to perform the traceroute.

So tracert www.kruptos.club/ traceroute www.kruptos.club

Note: For all *nix based systems traceroute is the command. For windows it is tracert. The results are all the same.

We got 8 hops here.

Now we add the TTL value and Number of Traceroute hops.

Default value= 56+8 ==> 64

So we could say that kruptos.club runs on a linux server.

Alternatively you can try for any domains. You could even do this on your locahost as ping -4 localhost

MacOS HighSierra “root” vulnerability

On November 28th , Lemi Orhan, an Agile Software Craftsman, tweeted about a bug on MacOS HighSierra which allows anyone have a root access to the computer with the username “root” with a blank password which was later confirmed by Apple.

Tweet Screenshot

Testing this bug on your Computer

If you are testing it on your machine it will have a negative impact, which means it creates a persistent root user account on your Computer. It will have effect on some remotely accessibly services like Remote Desktop. Once this has been enabled on your system, it posses some security impact on your Computer.

Some users on Twitter even claimed the vulnerability can be exploited remotely if VNC or Apple Remote Desktop is enabled.

One of the way to protect yourself against this bug is not to try it on your computer. But if you have already done so, Just the change the root password and also disable remote services through System Preferences > Sharing and disable any of the remote services you’re already using.

You can follow this instructions provided by Apple Support to protect yourself.

Computer Security Day

Computer Security Day is an annual event and is celebrated on the 30th November each year. It is designed to raise awareness and to promote best practices in Information Security.

CNCD at Hindustan Institute of Technology and Scinece celebrated the Computer Security Day by organizing a talk event. Mr. Sam Abraham, CISO, Royal Sundaram General Insurance Co. Limited, Chennai was the speaker of the day.

Students and Staff had an exciting interactive session.

#ksc #cncd #CyberAware