Okay, now let's take a look at some functionality for the agents
over agent commands. These are all things we can do.
Something's symbols, like sending a text message to another device. This was like my original, but that research
well descended to the third found and say, like hide your hair or something like that I
person could also send a link so you could
grab their contacts list and send the agents all of them as well.
mess with the circle of trust.
Two years or third phone, and we should get a message from 5556
This looks like it came directly from that center phone, the one that has the agent that's not in the Centre folder anywhere
produce simple example There,
like the first functionality I built.
Do some other things.
Let's see, How about
get installed APS list? All right, so let's grab all of the absolute her own there.
So it'll just get a list of all the installer applications. So what we'll do after that is actually pulling app off the device
so we can reverse engineer is hoping to see any, like company abs that we might want to use
as a potential agent.
I'm like you find some vulnerabilities in it, but we can actually pull the entire AP, chaos the phone and then start reverse, engineering it
with their application security tools.
This will take a minute. The phones aren't particularly quick about this sort of stuff.
The SMS was gonna you pretty much instantaneous,
though. The 45554 phone has to check in with us three f Ellen's in the tax message, but we should be received nearly instantaneous with whatever like there is for text messaging. But the http it is only gonna check in periodically national easily on the battery down.
Otherwise let anyone there that we're sending a bunch of communication. It's meant to look like normal usage.
So what, we're gonna have enough time when get a three few information gathered
It also keeps track of all the client side attacks and such
if the agent we want currently there's nothing. There's We haven't waited quite long enough.
We'll sit around for a little bit on. Try again.
So there's all our packages. So that's every application that's installed on there that's got them by their full package name comes off andro don't exchange
whatever it is that the android ones would be built into
combat. Abc dot ABC News is on there.
We could take suffering from this last one
The maps application,
my original example for a started using ABC News. In fact,
and then I have to be on the news. So it was a local ABC news program, so I just used their app. Have been using it ever since
we get back to send commands to an agent.
Now I can d'oh upload a B k 16.
We actually pull that.
That shows us of list again. It allows us to upload the entire application, so just grab it off the phone, steal it if you will.
All right. We give that a little bit of time. We should be able to
well, that application.
application security in this course, But if you do study android applications security, you'll see how you can reverse engineer this.
And I stole it on an emulator test. room and run some tests against it,
you know? So, of course, use it as a
agent so we could run it through our back door was all in the previous video
and turn it into an agent as well.
And some other people from the contact.
This is just some of the things you can do. You see,
there's a lot more stuff on here. And once you start bringing in, like, execute command,
we can run a lot of things. We can download things
onto the device. Will things off the device that we can run in map?
See that next video?
Must be s to pivot onto another device Windows device, actually,
so you could do a lot with it. I mean, I just have something built in.
Make it easier, like run and map is really just
three commands together,
downloaded map, running mouth to execute command and then upload results of football.
Let's go back to our information gathered and see if we have an APP. App is currently blank. So you still want the weight? A little bit more
sounds could be a bit tedious.
They're of subversion. Why every do the SMS shell, so it has an option where I can have you
pivot on. Then you can actually do it through as a mass. Have the shell come back. That's actually pretty fast. It really only delays a couple of seconds.
Let's try this again.
There we go. The route smart from Vince's Framework Framework Consul map start A P K.
Opened up. Another channel would actually take a look at that.
It maps that AP caves, where we have grabbed the entire application off the phone.
We can do any reverse engineering. We like,