Search

Phone ko hacking android kaise banaye

tutorial I will teach  you how to changeandroid smartphoneinto hacking device using someandroid hacking apps.Mobile devices is now very common now a days and mobiledevices has changed the way of bi-directional communication.There are many operating system forandroid devicesavailable but the most common and the best operating system for mobile isAndroid,it is an OS means you can install other applications (software's)on it. InAndroid applicationusually called apps orandroid apps.Also Read: How To Hack Android PhonesThe risk ofhackingby using  android devices is very common and people are developing and using different apps (application) for theirhacking attack.Androidhas faced different challenges from hacking application and below is the list of application forandroid hacking
1.Spoof AppHere is an app that spies at heart could use –Spoof App.It allows you to use a fakeCaller ID– a number that you are free to specifyyourself, in order to protect your privacy or to pull a prank on someone. Sounds likefun, doesn’t it? Well, Apple didn’t thinkso, which is why it never allowed the app to enter its App Store. Google, however, didn’t mind, which is whySpoof Appwas available on theAndroid Marketfor about two and a half years. However, it was banned from there last year as it allegedly was in conflict with The Truth in Caller ID Act of 2009.This can be useful insocial engineering.Also Read: Hack Wifi Networks FromAndroid in 20162. FaceNiff -Download Faceniff 2016For this faceniff app android 2.1 plusrooted is requirement.Allows you to sniff and intercept web session profiles over theWiFithat your mobile is connected to. It is possible to hijack sessions only whenWiFiis not using EAP, but it should work over any private networks.Please note that if web user uses SSL this application won’t work.This application is foreducational purposes only. Do not try to use it if it’s not legal in your country. I do not take any responsibility for anything you do using this application. Use at your own risk
3.Penetrate ProFor this penetrate proappandroid 2.1 plus rooted is requirement. The most of the times you scan theWi-Finetworks available around, they’re protected with key. Penetrate is an app that help you out with that. If the routers of thatWi-Fi networksare encrypted withWEP/WPAit will bringyou the keys to access them. This seems a sort of cracking, but the developers says it isn’t, because it’s supposed to get the keys for penetration testing and you should use it only with permission from network owners. Well, apart from thoseregardings,it does what it says. Check the developer description to know which routersare supported.Also Read: Download Windows 10Take in accountthat if you have an antivirus installed in yourandroid device,it will warn you about this app. The developer says it’s normal because it’s a security-related tool. Penetrate isn’t a danger for yourandroid phone
4. Anti Android Network Toolkit

Anti-Android Network Toolkitis an app that usesWiFi scanningtools to scan networks. You can scan a network you have theandroid phoneconnected to or you can scan any other nearby open networks. Securityadmins can use Anti to test network host vulnerabilities toDoS attacksandother threats.Working-:Upon opening the app, users are required to enter theusername and passwordused for registering.Once logged in, a message pops up indicating how manyAnti creditsyou have and gives you the option to purchase more.The next screen shows you the local network targets. I had my phone connected to my WLAN and Anti automatically mapped my network. You can only connect to networks you can authenticate into or of course, unsecured, open ones.I could see mysubnet informationas well as all connected hosts on the network. It also showed an icon of what the various hosts were on my network; for instance, a connectedWindows 7laptop was displayed withthe Window icon and myAndroid phonewith theDroidbot logo.From this screen, additional networkscan be added simply by entering theirsubnet information. Clicking the bottom of the screen on theWiFilogobrings up all WLANs in the proximity, so Anti also performswireless networkdiscoveryWhen first displaying the local target screen where you can view your network, Anti asks to run an intrusive scan. This scan checks for open ports and other vulnerabilities on the network. The app scanned 256 possible IP addresses in my test network (which only has four connected devices) in 11.07 seconds. In that time, the app discovered a connected machine with 8 open ports.There are several other tasks the appcan do. Users can run apassword crackeragainst hosts using various crack protocols. Apassword crackon my test network revealed theusernameandpasswordto an unsecured network switch—theusernameandpassworddisplayed was correct, as I was able to use the credentials Anti found to Telnet into the command line interface of the switch.With Anti, you can also connect to network devices legitimately, with proper credentials. The report feature will list all of thevulnerabilitiesfound, giving network admins a way to perform a threatassessment


 Andosid

Andosidfills that gap, allowing security professionals to simulate aDOSattack (An http post flood attackto be exact) and of course adDOSona web server, from mobile phones. Andosidis actively being developed and I welcome feedback from the security community as to how you would like the application to evolve.

Share this

Related Posts

Previous
Next Post »

Thnx