iDevice Jailbroken = Your New PenTesting Tool.

What if someone asks you to do a Nmap scan but you left your pc at home
What if a golden opportunity shows during a pentest but you were walking around the building, taking a break

But leaving your phone at home or in the office when you go out is absurd, I mean, everyone brings his phone with him nowadays.

Wouldn’t it be awesome if you could do a pentesting session with your mobile phone

Today you can. It doesn’t mind if you have an Android or an iPhone (or the respective Tablets).
Today I’m going to talk about iDevices.

Sadly, you need to first jailbreak your devices in order to install Nmap, Metasploit, SET, Aircrack, Ettercap… (almost all of them, I even saw Beef, but haven’t tried it yet).

Note: images are taken by an italian version of Cydia and I had an icon pack.

Step 1: Jailbreak Your iDevice

This can be done in different ways according to the iOS version. At the time I’m writing every framework version until 7.1.2 (correct me if I’m wrong) is jailbreakable (7.1.x with Pangu Jailbreak).

This is not the focus point of the article, so I’ll move on.

Step 2: Install Cydia

Cydia (by Saurik) is the main repository of jailbroken apps.
Most of the time the jailbreak process includes the installation of Cydia as default.

iDevice Jailbroken = Your New PenTesting Tool.

Icon pack M’Flat Winterboard

Step 3: Add iNinjas Repository (And Else)

The porting of the above mentioned pentesting tools was achieved thanks to members of the iNinjas website, credits go to them.

To add the iNinjas repository in Cydia, open the app and go to the “Sources” tab, click “Edit” and then “Add”.
http: //
Hyperlink to the official page:

iDevice Jailbroken = Your New PenTesting Tool.

More: Nmap is not available here, but you can get a GUI with the repo:
http: //
http: //

iDevice Jailbroken = Your New PenTesting Tool.

So that when the process will end you’ll have to click on the repository to show a list of all the packets available, where you can find the above mentioned tools.

Naturally, like on our dear Kali Linux, most of those packets are Terminal packets. This means that in order to run them you have to either SSH into your iDevice or run an application that is able to gain root privileges (like Mobile Terminal).

Disclaimer: Cydia will tell you that this repo it’s an unofficial repo, and because of this, it is not secure. And that’s true. Even if when I did this everything went good and all the tools did only what they had to do, it doesn’t mean that, for example, a XSS attack could have compromised it. Do it at YOUR OWN risk.

Step 4: Download Mobile Terminal

To accomplish the aforementioned step you’ll need to download form Cydia a tweak (Cydia app) called “Mobile Terminal”. You can simply find it by going in the “Search” tab and typing “Mobile Terminal”.

iDevice Jailbroken = Your New PenTesting Tool.

This icon is part of an icon pack, but looks the same
Download the one from the BigBoss Repository.

Step 5: Run Your New Tools

Here’s a list of some useful tools and how to run them.
Most of them need root access. This means that when you open Mobile Terminal you have to first write
and then
alpine (default password)
then you can run commands with root access.

Metasploit: when metasploit is installed, you can run it by typing:
cd /var/root/pentest/exploits/framework (eventually “framework 3″)
(the loading takes some time)

iDevice Jailbroken = Your New PenTesting Tool. iDevice Jailbroken = Your New PenTesting Tool.

Social Engineering Toolkit:
cd /var/root/pentest/exploits/set
(accept everything it requires to be installed)

iDevice Jailbroken = Your New PenTesting Tool. iDevice Jailbroken = Your New PenTesting Tool.

Nmap has a GUI, so download it and run the app, then type the ip address and the arguments , the output will be shown in the panel below.


If getting your tools with apt-get looks easier, then you can do it.
Searh in Cydia for “APT 0.7 Strict” (that should be installed as default).

iDevice Jailbroken = Your New PenTesting Tool. iDevice Jailbroken = Your New PenTesting Tool.

Odert Tools Available

Last, a list of some common tools that are also available in the iNinja repo, or Cydia in general: Aircrack-ng, Beef (I didn’t test it), Dsniff Suite (a “collection of tools for network auditing”), Ettercap (but I couldn’t make it work), Evil Grade, iPwN (a collection of tools for Arping and Dns Spoofing which you should definitely chek out), John the Ripper, Medusa, Metasploit, mysql, network-cmds (for ifconfig utility), Prini and Derv (automated scripts for MITM packet sniffing), python, ruby, SET, SSLstrip (I couldn’t make it work), and THC Hydra.

I hope this post was helpful and if this will get positive feedback, I’ll talk about Android devices too.

NOTE: if talking about jailbreak here is somehow illegal, then remove this post as soon as possible. I read the rules, but I can’t say if this is part of piracy or not.

As I always say: my english is not perfect and I don’t pretend it. If I repeat some grammar or concept errors or something is not clear, please tell me in the comments.

Also feel free to correct me if I’m wrong somewhere in the post.

Thanks for reading.

How to Hack Wi-Fi: Choosing a Wireless Adapter for Hacking

Welcome back, my budding hackers. So many of you are interested in hacking Wi-Fi that I have decided to revisit my Wi-Fi Hacking series with some updated and more in-depth material. Continue reading

Hackers Have 92% Success Rate Hacking Gmail on Android

Researchers at the University of California, Riverside and the University of Michigan announced recently that they have developed a hack that works 92% of the time on Google’s Gmail system on Android, as well as with the H&R Block app. In addition, this hack worked 86% of the time on Newegg, and 83% of the time at Chase Bank and That’s a highly reliable hack as far as hacks go Continue reading

Hack Like a Pro: How to Hack a Computer & Spy on Anyone, Part 1

Welcome back, my rookie hackers! Now that nearly everyone and everyplace has a computer, you can use those remote computers for some good old “cloak and dagger” spying. No longer is spying something that only the CIA, NSA, KGB, and other intelligence agencies can doyou can learn to spy, too. In this brand new series, we will explore how we can use the ubiquity of the computer to peek in on just about anyone and anyplace Continue reading

Advice from a Real Hacker: How to Create Stronger Passwords

People who know that I am a professional hacker often ask me what they can do to make their computers and personal information safe from people like me. Continue reading

Subterfuge: MITM Automated Suite That Looks Just Lame.

Remember when MITMing people to pentest webapps and log-ins you had to fire Ettercap,Arpspoof, SSLstrip, then look for credentials in the captured packets No more thanks to (or fault of) “Subterfuge”. Continue reading

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 21 (GRUB Bootloader)

Welcome back, my aspiring hackers! Many of you have installed Kali Linux as a virtual machine (VM) using VMware or VirtualBox, while others have installed Kali (or BackTrack) in a dual-boot system. The drawback to installing these hacking systems as a VM is that it then requires an external wireless adapter (your wireless adapter is piped through the VM as a wired device, eth0), but it makes for a great place to test your hacks while honing your skills. Continue reading

View a Live DDoS Map

This is a live map feed to current DDoS Attacks globally. Live DDoS MAP Thought I would post this to give you an idea of the size and scope of DDoS Attacks at any given moment Continue reading

Hack Like a Pro: How to Crack Passwords, Part 4 (Creating a Custom Wordlist with Crunch)

Welcome back, my apprentice hackers! In this series on password cracking, I have been attempting to develop your skills in the age-old art of password cracking. Although it might seem like a simple and straightforward exercise, those of you who have attempted password cracking know that there are many subtleties to this art Continue reading

Hacking an Airliner from Coach?

Welcome back, my greenhorn hackers! Have you ever wanted to fly an airliner from your seat in coach Well, now you can! Last week, security researcher, Ruben Santamarta, showed how he could interfere with a airplane’s navigation and safety systems while sitting in coach. Continue reading