Skip to main content

Posts

Hacking Android Smartphone using Metasploit

Nowadays mobile users are increasing day by day, the security threat is also increasing together with the growth of its users. Our tutorial for today is how to Hacking Android Smartphone Tutorial using Metasploit. Why we choose android phone for this tutorial? simply because lately android phone growing very fast worldwide. Here in China you can get android phone for only US$ 30 it's one of the reason why android growing fast. What is android? according to  wikipedia : Android is an operating system based on the Linux kernel, and designed primarily for touchscreen mobile devices such as smartphones and tablet computers. Initially developed by Android, Inc., which Google backed financially and later bought in 2005, Android was unveiled in 2007 along with the founding of the Open Handset Alliance: a consortium of hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices. and what is APK? according to wikipedia: And

________ATM HACKING_______

ATM HACKING  is no longer a news or a new trend. With the advancement in ATM devices like diebold atm, defcon atm and wincor nixdorf atm, it is not really easy to cheat an ATM machine. Though there are certain tutorial, tricks and techniques online about atm hacking but none of them actually works. The real atm ATM hackers won’t share their trick with you. FALSE STORIES ABOUT ATM HACKING Like I said earlier, there are lots of write ups online about atm hacking but most of them are out of context. They don’t exist and will never work. Here are few: ATM HACKING USING CANDLE WAX Someone on tor network told me he downloaded a pdf file about atm hacking and atm  security passwords . I asked if it worked for him and he said No. The atm candle wax trick is actually implemented with cards that uses chip by covering the chip or gold panel on the card. This is awkward and doesn’t work . HACKING ATM WITH USB There’s no such trick!. Where would you put the USB ? ATM HACKING US

SS7 hack explained: what can you do about it?

A vulnerability means hackers can read texts, listen to calls and track mobile phone users. What are the implications and how can you protect yourself from snooping? Hackers can read text messages, listen to phone calls and track mobile phone users’ locations with just the knowledge of their phone number using a vulnerability in the worldwide mobile phone network infrastructure. But how can this happen, is it currently being used and what can you do about it? What is being hacked into? Signalling System No 7 (SS7), which is called Common Channel Signalling System 7 (CCSS7) in the US or Common Channel Interoffice Signaling 7 (CCIS7) in the UK, is a system that connects one mobile phone network to another. It was first developed in 1975 and has many variants. Most networks use protocols defined by the American National Standards Institute and the European Telecommunications Standards Institute. What does SS7 normally do? SS7 is a set

EMAIL HACKING : The story of “Congratulations you have won a lottery” like spam emails

Open your Gmail account and compose your message and save in draft Now open this  Google sheet  and choose the  Initialize  option under the  Email Tracker  menu Now you’ll have to  authorize  the sheet to send your Gmail messages. Once the script is authorized, choose  Email Tracker  ->  Send Mail , select your Gmail draft from the drop-down, enter your Google Analytics Profile ID* and hit the Send button. Your mail will be delivered to the recipient. Now open  Google analytic  and find  Events   under the   Standard Reports  group Original Source:  http://www.labnol.org/ Email spoofing: The story of “Congratulations you have won a lottery” like spam emails Mail vs E-mail Back in old days when internet was not so common, we had to rely only on the postal/courier services. The only thing that bugs me about the traditional mail is their speed. This is when email comes. It offers numerous benefits, like its blazing fast, most of the time its

Hack the Box Challenge: Brainfuck Walkthrough

Hello friends!! Today we are going to solve another CTF challenge “Brainfuck” which is retired vulnerable lab presented by Hack the Box for making online penetration testing practices according to your experience level. Although in this challenge you can test your expertise by WordPress penetration testing and how much knowledge you have in cryptography by decrypting any encryption that you will get in this lab. Level:  Hard Task:  find  user.txt  and  root.txt  file in victim’s machine. Since these labs are online available therefore they have static IP and IP of sense is  10.10.10.17  so let’s begin with nmap port enumeration. nmap -A 10.10.10.17                   From given below image, you can observe we found so many ports are open such as 22,25 and so on in victim’s network and moreover I got three domain names as highlighted in below image. Now the next option was to  add target IP  inside  /etc/host  file since port 443 was open containing three domain names obt