GPS spoofing: How to become a satellite

Date: 25/01/2025

Each of us uses satellite navigation to get anywhere outside our backyard. But what if GPS, as of a sudden, stops working and cannot be used to determine your location anymore? This article presents an efficient technique enabling you to fool GPS.
Read full article →


Blindfold game. Manage your Android smartphone via ABD

Date: 02/06/2022

One day I encountered a technical issue: I had to put a phone connected to a single-board Raspberry Pi computer into the USB-tethering mode on boot. To do this, I used Android Debug Bridge (ADB), a handy debugging interface for Android devices. There are several ways to automate the work of apps on an Android smartphone using ADB, and this paper examines one of them.
Read full article →


Controlling Android. Dangerous APIs enable hackers to intercept data and reset smartphone settings

Date: 27/11/2021

In addition to traditional permissions, Android has three metapermissions that open access to very dangerous APIs enabling the attacker to seize control over the device. In this article, I will explain how to use them so that you can programmatically press smartphone buttons, intercept notifications, extract text from input fields of other apps, and reset device settings.
Read full article →


Duck tales. How to create a wireless analogue of Rubber Ducky

Date: 29/05/2021

Hackers and pentesters consider BadUSB an efficient attack vector; it emulates the keyboard and performs operations on the attacked computer under the disguise of user input. Such attacks are very difficult-to-detect because neither the OS nor antiviruses suspect the keyboard of any wrongdoing. Today, I will show how to create your own BadUSB tool – a wireless device looking like a memory stick.
Read full article →