If you have read my previous articles on man-in-the-middle attacks then you know how powerful they can be. But many people kept asking me if this could be done on their android phones without having to use kali Linux. Well, …
Today we are going to do a very movie-style stagefright exploit hack. We are going to demonstrate a remote exploit to take control of an android device with a reverse shell. This exploit is commonly known as the stagefright exploit. …
In this article, I am going to show you how easy it is to hacking android phones using only one tool which is the Android Debugging bridge. ADB is meant for developers to test and make new android apps and …
Hacking Android is not difficult but it is tricky. Today we are going to a unique hack tutorial that exploits the WebView (WebView Exploit) and JavaScript vulnerability allowing hackers to hack an android device with a single link. We are …
Welcome to the android hacking series. In today’s article, you will learn how to hack android with a pdf file. Do note that this is an old vulnerability that was fixed and does not work on newer phones. But old …
Phishing is one of the oldest methods used for hacking social media and bank accounts. Today we are going to review the phishx tool. An easy-to-use script for all the complicated tasks of making a phishing page and setting it …
If you have not heard of net creds, then do not worry. It is not a mysterious hacking tool. It is just a Python-based sniffing tool which is ideal for sniffing plaintext passwords and password hashes from a network. If …
Today we will be showing you an information gathering tutorial with the harvester tool. We will see how to run a harvester and what are the ways a hacker can use the harvester tool for pentesting and information gathering purposes. …
I am sure you have heard numerous news articles telling about websites and servers that suffer from DDOS attacks. Today we will review one such tool called LOIC (Low orbit ion cannon). Now before we start out the review, make …
Before getting into how blackeye works, I would like to refresh your knowledge regarding phishing and how it works. So let’s first understand “what is phishing“, “how does phishing work exactly“, and if you already know how phishing works skip …