Tag Archives: Hardware

Android Exploitation Setting up the Lab

I will be demonstrating today how to setup drozer and inseucrebankv2 for android exploitation. Prerequisites: I’m going to assume you have Kali Linux setup in a virtual machine, and you know the basics of Kali. Let’s Begin Type in the following command to install drozer. apt-get install drozer Now type in this command to install ABD (Android Debug Bridge). apt-get install

Read more

How To ROOT Almost Any Android Phone

Rooting is a process that allows you to attain root access to the Android operating system code (the equivalent term for Apple devices id jailbreaking). It gives you privileges to modify the software code on the device or install other software that the manufacturer wouldn’t normally allow you to. Putting Your Phone In Developer Mode? In order for this to work your phone

Read more

Activating Somebody’s Webcam Through Mitmf + beEF-xss + Metasploit.

Hi friends, I’m going to talk about how a hackers can remotely access your computer to spy on you. Man In The Middle Attacks This picture above shows you how a man in the middle attack works, In order to do a middle in the man attack, you need to have 3 clients the gateway – attacker – target. You simply

Read more

Exploiting Android Phones – Gaining Remote Access With A Rat

There are various options to hack any cell phone remotely in 2019. Use of Metasploit and Antivirus bypassing software you can create a spy app to eavesdrop on your targets.

Read more

Top 6 Tools A Hacker Needs

Hi Friends, this post Is just going to be a quick one I’m going to talk about what tools a hacker needs in order to carry out an attack. Penetration Testing Distribution So What is a Penetration Testing Distribution Well, the easiest way to explain this is the following. A Penetration Testing Distribution is a Linux distribution that has a set of

Read more