**** Requires Android Terminal
Network Mapper Installer is an Installer of Nmap for android.
It is a cross complied binary for android
Network Mapper Installer is a security scanner that installs nmap,nping and ncat to your device.
nmap is utility for network discovery and security auditing. it use for such as network inventory, managing service upgrade schedules, and monitoring host or service uptime and it can provide further information on targets, including reverse DNS names, device types, and also Ncat for flexible data transfer, redirection, and debugging tool and a packet generation and response analysis tool Nping.
it can scan host discovery, port scanning (Both), OS detection and version detection and much more.
nmap originally written by Gordon Lyon licensed under the GNU GENERAL PUBLIC LICENSE
*Installation takes 40 to 50 seconds
*if you found a bug, please email firstname.lastname@example.org with details.
Remember to +1 and rate this!
This application also comes with a Port Encyclopedia, enabling the user to quickly look up what a certain port's function is. A local database is stored on the phone for defining ports, however there is also an option to look it up online for the most recent information.
For more information, questions, or concerns, leave a comment below or contact me via email.
It supports 3G, protocol recognition, and many other features.
If you don't understand how to use it, just send me an email, I'll explain it more precisely.
This app is simply a wrapper around a cross-compiled Nmap binary built for your Android phone.
Source available at http://nmap.wjholden.com/src/ in accordance with the GNU Public License.
Q: I want to run Nmap myself from a terminal. Where are the binaries?
A: The binaries are (usually) saved in /data/data/com.wjholden.nmap/bin/.
Q: Is this a GPL violation?
A: I'm not a lawyer, but I don't think so. My sources are freely available and also licensed by the GPL. You are free to modify and redistribute my code provided you share those changes back, IAW the GPL. Free software is not always zero cost.
Q: Where is the source code?
A: Distributing source code along with Android applications is a bit impractical. Download the source code from http://nmap.wjholden.com/src/.
Q: Wait, you're not Fyodor!
A: This is NOT an official release from http://nmap.org, this is simply a front-end that calls to a precompiled Nmap binary.
Q: Do I need root?
A: No! You can use this program with or without root, although there are a few advantages to having root. I've seen a few problems with -O for Operating System fingerprinting (this would happen on desktop Linux as well). Non-root users will usually need to use the --system-dns argument.
Q: What's up with Atrix?
A: I don't know why, but this program has never worked with the Motorola Atrix, despite extensive efforts toward compatibility.
Q: Is NSE supported?
A: No, NSE/LUA are not supported for now, but it's definitely on the radar for a future revision. Some command-line arguments will not be available until then.
WiFinspect is a multi-tool intended for Computer Security professionals and other advanced users that wish to monitor the networks they own or have permission, i.e. the app is a security audit tool and not a hacking tool. The functions include:
* Network Information
* UPnP Device Scanner
* Host Discovery
* Network Sniffer
* Pcap Analyzer (three options)
* PCI DSS Menu
- Access Point Default Password Test (requirement 2.1.1.c)
- Access Point Security Test (requirement 4.1.1)
- Access Point Scanner (requirement 11.1)
- Internal Network Vulnerability Scanner (requirement 11.2.1)
- External Network Vulnerability Scanner (preparation for requirement 11.2.2)
* Host Information
* Port Scan
* Host Vulnerability Scan
This app is a student dissertation by Andreas Hadjittofis as part of his MSc in Computer Security at the University of Birmingham. The project is supervised by Dr Tom Chothia. The developers of this app cannot be held responsible for how this app is being used. The app comes with no guarantees.
* Based on your reports, Nmap WILL NOT WORK on devices running Android 2.1 and 2.2. You will get the "Some binaries could not be installed" error message and will be presented with the non-root mode. If you are using a newer Android version, please email me.
* Network Information (ROOT): Information about the connected network like MAC and IP addresses, gateway etc
* UPnP Device Scanner: Lists all UPnP devices on the network that are within the view of your device
* Host discovery (ROOT): Uses nmap to discover all devices on the network that are within the view of your device
* Network Sniffer (ROOT): Uses tcpdump to sniff on all packets that are within the view of your device. The resulting pcap files can be analyzed with Wireshark or the built-in Pcap Analyzer
* Pcap Analyzer: Uses jNetPcap to parse a pcap file. Three options: Packet Distribution, Bandwidth Distribution or Communicating Hosts analysis
* Access Point Default Password Test: Checks a pre-set list of default router passwords against your router’s control panel and notifies you if your router is using a default password
* Access Point Security Test: Displays the access points that are within the view of your device with a note whether they are secure (WPA/WPA2) or not (WEP or unlocked)
* Access Point Scanner: Displays the access points that are within the view of your device
* Internal Vulnerability Scanner (ROOT): Uses nmap to find all devices on the network that are within the view of your device. A note is given whether exploits exists for a given device based on its operating system and open ports
* External Vulnerability Scanner (ROOT): Runs Host Information, Port Scan, Host Vulnerability Scan, Traceroute, Ping or Sniffer functions on a given IP address or hostname
* Host Information (ROOT): Uses nmap to retrieve the device’s hostname, MAC address, vendor, operating system, device name and workgroup
* Port Scan (ROOT): Uses nmap to retrieve the device’s open ports. Click on a port to view the Metasploit results for the device's operating system and port
* Host Vulnerability Scanner (ROOT): Uses nmap to retrieve information about the host along with a note stating whether exploits exists for the device based on its operating system and open ports
* Traceroute (ROOT): Uses nmap to traceroute to a host
* Ping (ROOT): Uses nping to ping a host
* ACCESS_WIFI_STATE, CHANGE_WIFI_STATE, ACCESS_NETWORK_STATE: Used to determine if the device is connected to a Wi-Fi network and to retrieve the data displayed in Network Information function
* CHANGE_WIFI_MULTICAST_STATE: Used by the UPnP Device Scanner function
* INTERNET: Used to retrieve the device’s external IP address in Network Information function, for Metasploit search, and for the optional error reporting.
* WRITE_EXTERNAL_STORAGE: Used to store the nmap and pcap files
- Scan your Wifi local area network connection to search for machines connected your network while displaying them using their IP address, MAC address & Vendor. Powerful results allow you to keep check on which device is currently connected to your network.
- Search for all devices currently connected to your Local Area Connection Network allowing you to verify there are no unwanted connected users or connections to your wifi.
- Customize the name to your liking by tapping on the IP, for each connected device for easy recognition for later scans using network scanner.
- Fast and extremely accurate scanner to ensure proper results.
- Scan Ports using the built-in port scanner for each individual device or the router itself. Allows you to connect to certain ports.
- Export wifi results to SD card using the export feature in XML format for universal use.
- Helps keep an eye on unwanted usage on school night hours. A must have wifi scanner for parents for parental control.
- Wireless Discovery made easy for your android device.
PLEASE USE DEBIAN INSTED OF UBUNTU !!! (Support only for Debian, Ubuntu only for real advanced users).
The GUI is handled by "Linux Installer Advanced" version !
Please, if you encounter any issue, send a bug report. Click on console, wait 1mn for the console to appear, then Menu, Mail, and send.
This application will allow you to install a complete Debian distribution in your Android device. Based on chroot, it will perform a standard debootstrap and install a legacy Debian so that you can install, and run any classic Linux command, tool, daemon or service.
The package has few limitations; it is not restricted to Debian; we already offer the choice to use Ubuntu, and will add more distributions in close future. Each distribution is available in several tastes (stable, testing ...). It will not require to reboot; chroot is run inside Android. Installation can be done on any storage device, either on SD card, or inernal memory; no need to repartition any thing, run mkfs or fdisk. We do with what you let use. If you have almost nothing, the package will manage with almost nothing; if you can afford for a large ext4 partition on your SD card, the package will be happy to use it.
It will allow you to install all classic LAMP services like Apache, MySql, PHP, Samba, Netatalk, or just any classic Linux tool like vim, xterm, aterm, Abiword, Firefox, dillo, wget, cron, Perl, Python ... just everything.
Package utilisation will require a rooted device.
Reasons to install this package can not be listed. Just too many: want a cron daemon ? want to have gcc inside your phone ? want to recompile some kernel driver because the legacy Android driver for your Wi-Fi card has is bogus or limited ? want to use vim, or the real full featured desktop ls, ip, nmap, or top commands ? this package will give you all this for free, and much much more.
- an Android device based on some Linux kernel
- a rooted environment
- 300M free space
Only 50MiB to download for a basic Debian, and down to 180MiB space used if you select the Directory method.
Optionnal registration on our website, http://android.galoula.com/LinuxInstall/Register.php , will allow you to use advanced management features, and install package from within the application interface. You will not need to type any strange command in any terminal. And you will be able to make some services start automaticly at phone boot, and/or application start.
Online documentation: http://android.galoula.com/en/LinuxInstall/
Quick installation guide: http://android.galoula.com/en/LinuxInstall/QuickTutorial.html
The interface have been completely redesigned, and the English language have been rewritten. Any one who feels like translating is welcome to contact us. Even the French language part should be re-translated from English.
linux installer debian ubuntu gentoo knoppix android HTC samsung ssh LAMP apache lighttpd mysql php installation netatalk vim nano joe xterm aterm eterm screen
perl python php-cli ruby firefox iceweasel dillo rox-filer pidgin thunderbird icedove abiword nautillus epiphany prompt shell bash interface block loop distribution command emulator terminal xterm x xorg x.org terminal busybox shell debootstrap chroot tux penguin PC laptop make
Find me on Google+: https://plus.google.com/+JaredBurrows
Send all suggestions to email@example.com
** Works on Google Glass **
✔ Android Terminal Emulator Application
After having a rooted phone for years, I know that there are plenty of applications that allow users to customize their phones; however, when I recently bought a brand new phone this year, I decided not to root it and I realized the main reason for rooting my phone was simply to obtain more linux tools. I made this simple application in order to help users simply install BusyBox without the hassle of being rooted!
All binaries are installed in: /data/data/burrows.apps.busybox/app_busybox/
In Terminal Emulator, Preferences: Initial command: export PATH=$PATH:/data/data/burrows.apps.busybox/app_busybox/
Provided extra Binaries:
How to use BusyBox Non-root:
✔ Step 1: Click on "Install" to install BusyBox
✔ Step 2: Open your Terminal and change directory to the path!
✔ Internet: Download BusyBox (make sure you are on WiFi!)
✔ Script: Add PATH to Terminal
More from developer
If you send your information, your device will be listed on http://www.securiteinfo.com/divers/android_bogomips_benchmark.shtml
Your device information will be included after manual validation.