Does FreeBSD have such a thing as a phone explorer?

I've just been watching a documentary about Pegasus, where people would connect a phone to a (presumably Windows) computer and be able to do an analysis on communications the phone has been engaged in, and wondered if such a program was available for FreeBSD...
 
Please forgive me if im wrong:
Check Kali Linux or Black Arch or what ever OS for pen-testing and check packages , check what these packages do and then check if you can get them on FreeBSD if you found one.
But forget about Pegasus :D
 
Are you looking for:
  • The software that communicates with a copy of Pegasus which installed on a phone, but you want the command-and-control software to run on FreeBSD. If that's what you want, you should contact the makers of Pegasus (it's an Israeli military/security software company) and ask them. I'm sure they'll be delighted to answer your question. Serious answer: That software is only used by Pegasus and their customers (which are the security agencies of nation states), so you will never be able to find out.
  • Software similar to Pegasus, which collects data about a FreeBSD system, such as logs of calls made (???), IP connections, SMS sent and received (???), or location (???). This would typically be called a "root kit", and is what (black hat) hackers use to break into systems. I have no idea where to find those, but if they even exist, I don't think anyone would tell you.
 
Please forgive me if im wrong:
Check Kali Linux or Black Arch or what ever OS for pen-testing and check packages , check what these packages do and then check if you can get them on FreeBSD if you found one.
But forget about Pegasus :D
I'm not really interested in Pegasus, I only want to know what sort of programs are available for analyzing a phone's contents as seen in this film from the 44'th minute...

As far as Black Arch is concerned, all the tools are listed here. There are almost 3000 of them.

One which caught my eye was hexyl, which amazingly is available on FreeBSD - sysutils/hexyl

Maybe quite a few others are also available...
 
Watching this opened up a whole new world...

I could do with finding/installing something like an Android Midnight Commander clone on the phone to find my way around.
Alternatively, is there any way to mount the root directory of the phone on FreeBSD?
 
After a number of searches I came across this Thread 87775 which suggested mounting the phone at a mount point using
jmtpfs -o allow_other [mountpoint]

This works reasonably well although I'm not really sure what I'm mounting since /mnt/phone doesn't bear much of a resemblance to
ls -al / when I run adb shell
 
Not sure what to make of all this:-

Code:
shell@android:/ $ ls -al
drwxr-xr-x root     root              2012-01-01 01:00 acct
drwxrwx--- system   cache             2014-03-24 23:36 cache
dr-x------ root     root              2012-01-01 01:00 config
lrwxrwxrwx root     root              2012-01-01 01:00 d -> /sys/kernel/debug
drwxrwx--x system   system            2012-01-01 01:00 data
drwxr-xr-x root     root              1970-01-01 01:00 debug
-rw-r--r-- root     root          116 1970-01-01 01:00 default.prop
drwxr-xr-x root     root              2012-01-01 01:00 dev
drwxrwxr-x radio    system            2012-11-07 01:21 efs
lrwxrwxrwx root     root              2012-01-01 01:00 etc -> /system/etc
-rw-r----- root     root         1168 1970-01-01 01:00 fstab.samsunggolden
-rwxr-x--- root     root       138188 1970-01-01 01:00 init
-rwxr-x--- root     root         3614 1970-01-01 01:00 init.bt.rc
-rwxr-x--- root     root         2344 1970-01-01 01:00 init.goldfish.rc
-rwxr-x--- root     root        21378 1970-01-01 01:00 init.rc
-rwxr-x--- root     root        27590 1970-01-01 01:00 init.samsung.rc
-rwxr-x--- root     root         9669 1970-01-01 01:00 init.samsung.usb.rc
lrwxrwxrwx root     root              1970-01-01 01:00 init.samsunggolden.rc -> ./init.samsung.rc
lrwxrwxrwx root     root              1970-01-01 01:00 init.samsunggolden.usb.rc -> ./init.samsung.usb.rc
-rwxr-x--- root     root         1637 1970-01-01 01:00 init.trace.rc
-rwxr-x--- root     root         3915 1970-01-01 01:00 init.usb.rc
drwxr-xr-x root     root              1970-01-01 01:00 lib
-rw-r--r-- root     root         3616 1970-01-01 01:00 lpm.rc
drwxrwxr-x root     system            2012-01-01 01:00 mnt
drwxrwx--x radio    radio             2012-01-01 01:00 modemfs
drwxr-xr-x root     root              1970-01-01 01:00 preload
-rw-r--r-- root     root         3754 1970-01-01 01:00 prerecovery.rc
dr-xr-xr-x root     root              1970-01-01 01:00 proc
-rw-r--r-- root     root         1847 1970-01-01 01:00 recovery.rc
drwxr-xr-x root     root              1970-01-01 01:00 res
drwx------ root     root              2013-10-21 13:48 root
drwxr-x--- root     root              1970-01-01 01:00 sbin
lrwxrwxrwx root     root              2012-01-01 01:00 sdcard -> /storage/sdcard0
dr-xr-x--- system   sdcard_r          2012-01-01 01:00 storage
drwxr-xr-x root     root              2012-01-01 01:00 sys
drwxr-xr-x root     root              2013-11-30 10:30 system
drwxr-xr-x root     root              2012-01-01 01:00 tmp
-rw-r--r-- root     root          272 1970-01-01 01:00 ueventd.goldfish.rc
-rw-r--r-- root     root         3879 1970-01-01 01:00 ueventd.rc
-rw-r--r-- root     root         1580 1970-01-01 01:00 ueventd.samsung.rc
lrwxrwxrwx root     root              1970-01-01 01:00 ueventd.samsunggolden.rc -> ./ueventd.samsung.rc
drwxr-xr-x root     root              2012-01-01 01:00 var
lrwxrwxrwx root     root              2012-01-01 01:00 vendor -> /system/vendor

compared to this:-
Code:
root@X1:/mnt/phone $ ls -al Phone
total 0
drwxr-xr-x  28 root  wheel  0 Mar 29  3536056 .
drwxr-xr-x   3 root  wheel  0 Jan  1  1970 ..
drwxr-xr-x   2 root  wheel  0 Nov  3  2013 Alarms
drwxr-xr-x   3 root  wheel  0 Nov  3  2013 Android
drwxr-xr-x   2 root  wheel  0 Feb 15  2015 Bluetooth
drwxr-xr-x   4 root  wheel  0 Jun 19  2015 DCIM
drwxr-xr-x   2 root  wheel  0 Nov  3  2013 Documents
drwxr-xr-x   2 root  wheel  0 Jun 10  2015 Download
drwxr-xr-x   3 root  wheel  0 Sep 24  2014 Facebook Messenger
drwxr-xr-x   2 root  wheel  0 Nov  3  2013 Movies
drwxr-xr-x   2 root  wheel  0 Nov  3  2013 Music
drwxr-xr-x   2 root  wheel  0 Aug 16  2016 Nearby
drwxr-xr-x   2 root  wheel  0 Aug 16  2016 Notifications
drwxr-xr-x   3 root  wheel  0 Aug 30  2016 Pictures
drwxr-xr-x   2 root  wheel  0 Mar 24  2014 Playlists
drwxr-xr-x   2 root  wheel  0 Nov  3  2013 Podcasts
drwxr-xr-x   2 root  wheel  0 Mar 16  2015 Ringtones
drwxr-xr-x   5 root  wheel  0 Nov  3  2013 Samsung
drwxr-xr-x   2 root  wheel  0 Aug 20  2015 ShareViaWiFi
drwxr-xr-x   3 root  wheel  0 Aug 20  2015 SmartSwitch
drwxr-xr-x   2 root  wheel  0 Jan  2  2012 Sounds
drwxr-xr-x   5 root  wheel  0 Dec  8  2019 WhatsApp
drwxr-xr-x   2 root  wheel  0 Nov 12  2013 adhub
drwxr-xr-x   3 root  wheel  0 Jan 11  2014 com.axentra.hipserv
drwxr-xr-x   3 root  wheel  0 Jul 21  2018 com.facebook.katana
drwxr-xr-x   3 root  wheel  0 Sep 24  2014 com.facebook.orca
drwxr-xr-x   3 root  wheel  0 Jul 10  2014 media
drwxr-xr-x   2 root  wheel  0 Nov 12  2013 samsungapps
 
I have a SONY XPERIA which I'm trying to restore. It has Android 4.1.2 installed and adb won't list it, so I can't run shell, at least I haven't figured out how so far. However I can mount it using jmtpfs -o allow_other /mnt/phone and can see this:-
Code:
root@X1:/mnt/phone/Internal Storage $ ls -al
total 0
drwxr-xr-x  31 root  wheel     0 bad date val .
drwxr-xr-x   3 root  wheel     0 Jan  1  1970 ..
drwxr-xr-x   2 root  wheel     0 Jan  6  1980 .android_secure
-rw-r--r--   1 root  wheel    33 Aug 31  2013 .bugsense
drwxr-xr-x   2 root  wheel     0 Nov  7  2012 .demovideo
-rw-r--r--   1 root  wheel    18 Aug 27  2013 .tapcontext
drwxr-xr-x   3 root  wheel     0 Jan  6  1980 Android
-rw-r--r--   1 root  wheel   160 Nov  7  2012 CDAInfo.txt
drwxr-xr-x   5 root  wheel     0 Jul 27  2013 DCIM
drwxr-xr-x   2 root  wheel     0 Jul  6  2015 Download
drwxr-xr-x   2 root  wheel     0 Sep  1  2013 Edited
drwxr-xr-x   2 root  wheel     0 Jan  6  1980 LOST.DIR
-rw-r--r--   1 root  wheel     0 Nov  7  2012 MEMSTICK.IND
-rw-r--r--   1 root  wheel     0 Nov  7  2012 MSTK_PRO.IND
drwxr-xr-x   2 root  wheel     0 Nov  7  2012 Music
drwxr-xr-x   2 root  wheel     0 Jan  6  1980 Notifications
drwxr-xr-x   2 root  wheel     0 Aug 28  2013 PlayStation-Android
drwxr-xr-x   4 root  wheel     0 Aug 29  2013 ROMs
drwxr-xr-x   2 root  wheel     0 Jun 17  2013 Scoreloop
drwxr-xr-x   3 root  wheel     0 Apr  9 09:55 System
drwxr-xr-x   7 root  wheel     0 Oct 26  2013 WhatsApp
drwxr-xr-x   2 root  wheel     0 Nov  7  2012 alarms
drwxr-xr-x   2 root  wheel     0 Sep 26  2013 bluetooth
-rw-r--r--   1 root  wheel   146 Jun  8 11:03 customized-capability.xml
-rw-r--r--   1 root  wheel  8215 Jun  8 11:03 default-capability.xml
drwxr-xr-x   2 root  wheel     0 Nov  7  2012 demovideo
drwxr-xr-x   4 root  wheel     0 Jun 17  2013 e-booki
drwxr-xr-x   3 root  wheel     0 Jul  8  2013 gameloft
drwxr-xr-x   3 root  wheel     0 Aug 27  2013 games
drwxr-xr-x   2 root  wheel     0 Mar 28  2016 image
drwxr-xr-x   5 root  wheel     0 Aug 31  2013 jjwallpapers
-rw-r--r--   1 root  wheel  3464 Aug 30  2013 justin.txt
drwxr-xr-x   3 root  wheel     0 Jun 17  2013 media
drwxr-xr-x   4 root  wheel     0 Nov  7  2012 others
drwxr-xr-x   2 root  wheel     0 Aug 27  2013 ppy_cross
drwxr-xr-x   2 root  wheel     0 Jun 18  2013 recovery
drwxr-xr-x   2 root  wheel     0 May 12  2014 ringtones
drwxr-xr-x   2 root  wheel     0 Sep  9  2013 video
drwxr-xr-x   3 root  wheel     0 Aug 31  2013 wpcollection

I can recover all the photos in DCIM, but was wondering if there was any way to discover what was the original number used in the phone. I'm unable to recover the original Google account because the password has been forgotten, but If I can find the original phone number I may be able to use that as a means of verifying the identity of the Google account holder, but don't know where such data may be held...
 
1. Turn on Developer mode.
2. Turn on stay awake and USB Debugging.
3. plug USB cable.
4. run adb shell as root.
I've just discovered that running su within the shell gives you root access.

I couldn't figure out a way of logging in as root, even though root is mentioned in the help screen.
 
I've just discovered that running su within the shell gives you root access.

I couldn't figure out a way of logging in as root, even though root is mentioned in the help screen.
After further tests, I've found that KingoRoot sometimes manages to root a phone and sometimes it doesn't.

Too many variables to figure out why it works sometimes... If it doesn't then su doesn't work... or maybe BusyBox didn't get installed...It's all so complicated.
 
I've never heard of Black Arch Linux, but will look into it.
I have experience with black arch and their repositories are okay. They contain around 4000 utilities, most of which work and are the latest version.

However the most used pentesting packages are already available on the AUR these days. So there's not much need for the black arch repositories.

As for their prebuilt iso images, I tried them once but they felt buggy and unpolished.
 
Back
Top