1 00:00:00,980 --> 00:00:03,830 Next, let's switch back to our Android device. 2 00:00:04,280 --> 00:00:10,760 We're going to, first of all, go to input and turn off the mouse integration if yours is on mouse 3 00:00:10,760 --> 00:00:16,090 integration, because that forces you to click and drag that pointer around. 4 00:00:16,100 --> 00:00:21,320 We want to turn off mouse integration so that when we click, we get this capture window. 5 00:00:21,860 --> 00:00:28,150 And remember, to get out of the capture, we can hit our left control or left command key. 6 00:00:28,160 --> 00:00:29,180 So I'm going to capture. 7 00:00:30,340 --> 00:00:35,410 Now, when I click in here, I've let it sit too long, but this is a good thing, you need to know 8 00:00:35,410 --> 00:00:40,300 that if you do leave your Android device sitting for too many minutes, it can freeze up on you. 9 00:00:40,310 --> 00:00:45,250 So we may have to restart this device, will restart it, and we'll start back up here on the lesson. 10 00:00:45,850 --> 00:00:52,360 And before we Budha Android device and new, we can see that we've got the old ISO file still attached 11 00:00:52,360 --> 00:00:52,550 there. 12 00:00:52,570 --> 00:00:58,480 Let's go to the storage and let's remove that file from the disk. 13 00:00:59,140 --> 00:01:02,890 So we're going to remove that ISO file that let us set up Android in the first place. 14 00:01:04,500 --> 00:01:04,940 Move. 15 00:01:04,980 --> 00:01:11,280 There we go, and we should start up with just the Android virtual device and now when we start our 16 00:01:11,280 --> 00:01:15,420 Android six should boot up just like a regular Android device. 17 00:01:15,880 --> 00:01:16,500 Good. 18 00:01:16,500 --> 00:01:20,060 We may get a choice there, but it'll automatically boot in just a few seconds. 19 00:01:20,640 --> 00:01:24,420 And like any Android device, it'll take just a little bit of time to boot up. 20 00:01:24,420 --> 00:01:25,650 But it's pretty fast. 21 00:01:26,250 --> 00:01:28,860 And once it boots, we're ready to change a couple of settings. 22 00:01:28,860 --> 00:01:29,820 So click on. 23 00:01:31,190 --> 00:01:37,160 The screen, so that you capture your mouse again, we need to go to input, turn off mouse integration, 24 00:01:37,520 --> 00:01:39,960 then click in the screen so that we capture the mouse. 25 00:01:40,400 --> 00:01:42,440 Now, this moves the big mouse pointer. 26 00:01:43,570 --> 00:01:46,870 So I'm going to click on my menu button down here toward the bottom. 27 00:01:47,830 --> 00:01:53,260 And let's go to settings, and we need to change the setting for the browser under apps. 28 00:01:54,500 --> 00:01:58,430 So that our browser can download to our devices storage. 29 00:01:59,470 --> 00:02:01,120 So we come to permissions. 30 00:02:02,150 --> 00:02:06,750 It might have location, it might have a few other things enabled, but we need to click permissions 31 00:02:06,750 --> 00:02:10,680 and give it just a second, come to storage and let's turn that on. 32 00:02:11,320 --> 00:02:15,120 So we need to turn on the browser storage so that we can download files. 33 00:02:16,760 --> 00:02:18,320 That will be our first step. 34 00:02:18,560 --> 00:02:20,420 We'll come back to settings a little later. 35 00:02:22,750 --> 00:02:28,840 We can hit the home button now, open up your browser, and if you're Apache services started. 36 00:02:30,400 --> 00:02:39,310 And we should be able to go to a 10 dot o dot three, top five slash Sha're. 37 00:02:40,590 --> 00:02:42,810 And we should see our APK file there. 38 00:02:43,170 --> 00:02:44,490 Let's go one step further. 39 00:02:44,520 --> 00:02:50,340 Let's go ahead and go up one directory, or we can hit the parent directory here and let's grab an image 40 00:02:50,340 --> 00:02:52,470 file just to make sure that we're able to download something. 41 00:02:52,470 --> 00:02:57,690 So click on the Debian image file here and come to save image. 42 00:02:58,230 --> 00:03:03,570 And if that downloads OK, you know, you've changed your settings so that the browser can access storage. 43 00:03:04,350 --> 00:03:09,510 So let's hit the back button and come back to the funny game that APIC and try the same thing once that 44 00:03:09,510 --> 00:03:10,720 file downloads. 45 00:03:11,190 --> 00:03:14,580 Let's go to our downloads folder and we can access that. 46 00:03:14,580 --> 00:03:21,810 You can see at the very top of our screen here we have a couple of downloads, funny game RPK and that. 47 00:03:22,650 --> 00:03:23,340 There we go. 48 00:03:23,520 --> 00:03:25,430 We need to pull that down and let it stay. 49 00:03:25,950 --> 00:03:31,620 So I'm going to try to run funny game that RPK, that OPK file and Android will let us know that by 50 00:03:31,620 --> 00:03:37,650 default, the tablet is set to block installation of apps obtained from unknown sources, but it will 51 00:03:37,650 --> 00:03:39,250 let us go straight to settings. 52 00:03:39,270 --> 00:03:45,960 Well, my friend told me this was a really fun app, so I'm going to scroll down to security and I'll 53 00:03:45,960 --> 00:03:50,860 find unknown sources and I'm going to enable unknown sources. 54 00:03:50,880 --> 00:03:55,830 Now, there are other ways that we can infect an Android device, but for this interpretor example will 55 00:03:55,830 --> 00:03:57,570 allow this unknown sources. 56 00:03:58,440 --> 00:04:02,470 If anyone wants to download something from a third party, this is something they have to turn on. 57 00:04:03,030 --> 00:04:04,990 So now we've enabled unknown sources. 58 00:04:05,010 --> 00:04:10,890 Let's go back and let's come back to those downloads or we can click on the fun game. 59 00:04:10,950 --> 00:04:14,250 That app again downloads a fresh. 60 00:04:16,080 --> 00:04:18,470 That and we got funny game at APK. 61 00:04:18,630 --> 00:04:22,840 Let's see what that is says, do you want to install this application? 62 00:04:22,860 --> 00:04:28,380 It'll get X access to all of these things. 63 00:04:28,950 --> 00:04:36,300 Well, it's supposed to be a funny game, so let's give it a try, click install, then click open and 64 00:04:36,300 --> 00:04:37,890 it looks like nothing is happening. 65 00:04:37,890 --> 00:04:42,890 So let's hit our host key to get control of our mouse again. 66 00:04:44,590 --> 00:04:46,830 Let's come back to our Kelly Linux box. 67 00:04:50,300 --> 00:04:55,550 And look at this, my interpreter says there's a session open from Tendo three point seven, I wonder 68 00:04:55,550 --> 00:05:04,730 where that could be from, let's say sessions that I won and let's say get video. 69 00:05:07,140 --> 00:05:07,740 Info. 70 00:05:09,420 --> 00:05:19,800 Look at that, we are running as username you 086 to Android, and look at that localhost is Android 71 00:05:19,800 --> 00:05:27,900 six point zero point one and we are running them interpretor Shell on Android from Calli Linux. 72 00:05:28,470 --> 00:05:33,420 So this just happens to be an emulated Android device, but it works just as well on your real physical 73 00:05:33,420 --> 00:05:34,260 Android device. 74 00:05:34,500 --> 00:05:40,860 If you want to give this a try inside your own local area network, your home wireless network, some 75 00:05:40,890 --> 00:05:45,920 place where you can do this safely and where you have permission to do this across a network. 76 00:05:46,410 --> 00:05:52,770 But let's see what our directory is, PWP, and we can see where running from someplace inside that 77 00:05:52,770 --> 00:05:53,400 exploit. 78 00:05:53,670 --> 00:05:59,190 When we come back, we're going to see how to find that file, the Debian logo that we download a little 79 00:05:59,190 --> 00:06:01,380 bit earlier by saving the image. 80 00:06:01,710 --> 00:06:04,590 We'll see how to grab that and how to do a few other things. 81 00:06:04,590 --> 00:06:06,180 And Android before we wrap it up.