Showing posts with label others. Show all posts
Showing posts with label others. Show all posts

Hack Saved Password in Windows and Linux PC using LaZagne Project

The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords for the most commonly-used software. At this moment, it supports 22 Programs on Microsoft Windows and 12 on a Linux/Unix-Like OS.

First download LaZagne project from here


Launch all modules type laZagne.exe all


Launch only a specific module

laZagne.exe browsers

Android Reverse Engineering : See Source Code of Android Apps

I am going to discuss how we can see the source code of the android apps and may be modify/hack according to our own convenience. Various attackers use this technique to inject their own malicious code in the app and the again compiling it and spreading the app.

Tools Required
·         Dex2jar: It is a tool which is used when working with android .dex and java .jar files.
·         Jd-gui: This tool opens up the entire coding of .apk file.

You can Download both these tools from here.

In this article I will be taking example of faceniff.apk, but you can take any app of your choice.
Steps involved in reverse engineering android app:
Change the extension of android app to "faceniff.apk.zip".


 Unzip the file using any unzipping software.
 Now open the command prompt and type "cd \".
 Then type "cd c:\android\dex2jar-0.0.9.7". (Here "C:\android\dex2jar-0.0.9.7" is the path of          dex2jar tool in my drive, this may be different for you). Press enter.



 Now type "dex2jar c:\android\Faceniff\classes.dex". Here "c:\android\Faceniff\classes.dex" is the path of the classes.dex file which your will surely be in the extracted folder of the android app.


 You will notice a new executable jar file in the unzipped folder of app. Now open that app with "jd.gui" and you will be able to see the source code of android app.


About the Author - Shikhil Sharma is an engineering student who is pursuing his engineering in Computer Science. He has great interest in Cyber Security, Hacking, Penetration Testing, SEO and Vulnerability Assessment and loves to write about them.
Website: www.hackingtweaks.com