Zetasploit
Leaving the public clueless about further development of zANTI, the Zimperium team has successfully made cloud exploits available from within the app and created something known as Zetasploit.
Using Metasploit, one of the most used penetration utilities, Zetasploit aims to run and exploit vulnerabilities based on scan results. Unfortunately, Zetasploit is available to enterprise users only and supposedly will be available for public users as well at some time. Hopefully, it is now when you're reading these lines!
You've probably seen the video showing the power of Zetasploit. (If not, look it up, it's crazy—https://youtu.be/di5FHSh3Z7c).
From what we know, there are over eight separate exploits (probably many more) available from the server, then there's a client tab followed by file intercept.
The guy seems to run a Windows exploit that exploits a parsing flaw in the path canonicalization code of NetAPI32.dll
through the server service. Then, he selects an available VNC payload to connect the desktop and finally launches the exploit.
He then takes control of the entire system using the graphical interface, which was successfully provided by the VNC.
VNC is not the only option for connecting to the victim; the video also shows us how to interact with the generic shell and execute the shutdown –r
command, which reboots the computer. Easy, peasy!
Although all of these sound very interesting, we'll probably not get our hands on them till they're officially announced in the next release. However, as you will read in Chapter 3, Connecting to Open Ports, regarding connecting to open ports, it is possible to intrude into a computer using port number 3389, which is responsible for remote desktop connection.
That being said, you can't run Metasploit on your Android powered device. Or can you?
Oh, of course you can! The newly-updated cSploit, which is being continuously updated by one of the former developers of dSploit has (apart from original dSploit features) slightly improved tweaks and added new features such as:
- The vulnerability finder
- The exploit finder
- Metasploit Framework integration
At least that's what http://www.csploit.org/ says, and it looks like the app is doing really well. Since the main developer is only one person and is often busy, we can't expect frequent updates, but it's great to see that we can use Metasploit exploits using a free Android tool.