This article explains how to detect intrusions into your wireless network. Almost all mainstream attacks on Wi-Fi have distinctive features, and you can identify them by listening to the airwaves.
CONTINUE READING 🡒 Category: Mobile
Creating a Custom Android ROM from Stock Without Modifying Source…
Building your own firmware from source code is a complex process that requires deep subject knowledge, a powerful computer, and lots of gigabytes of hard drive space. However, it's not always necessary to follow the standard approach.…
CONTINUE READING 🡒 Unlocking and Accessing Data on iOS Devices
In this article, we will delve into what happens to an iPhone in a forensic lab. We will explore the feasibility of bypassing iOS security across different versions and what tools or methods might be needed in…
CONTINUE READING 🡒 Running Android Apps on Linux with Anbox: A Guide to…
There are numerous Android emulators for all sorts of operating systems. The worst ones barely function, while the best run quickly and even allow gaming. The latter are typically only available for Windows, and their performance on…
CONTINUE READING 🡒 Hacking Wi-Fi Networks Using a Smartphone: Reconnaissance and Initial Attack…
You've probably tried hacking wireless networks using a laptop and noticed that it's not very convenient to carry around, plus it attracts attention. But why use a laptop when you have a real pocket-sized computer that lets…
CONTINUE READING 🡒 Console Android. 50 ADB Commands Everyone Should Know
There are many tools available for working with a smartphone connected via USB cable or Wi-Fi. Advanced tools allow you to move files, install and uninstall software, view contacts, take screenshots, and even send SMS, but no graphical tool can match the power that…
CONTINUE READING 🡒 From the Dead in 80 seconds. Bringing the bricked smartphone…
Most of the articles in the X-Mobile section are devoted to hacks and tweaks that require rooting, modifying the firmware, or replacing it with a custom one. However, not every reader is ready to subject their smartphone to such operations, fearing that they can turn the device into…
CONTINUE READING 🡒 Battle dolphin. My achievements with Flipper Zero inside of a…
Flipper Zero, a hacker multitool created by Russian developers, has become quite famous by now. At the beginning of 2021, the project raised almost 5 million USD on Kickstarter, and the community keenly followed production-related twists and turns and subsequent difficulties with its distribution…
CONTINUE READING 🡒 Advanced cyberphone. Charge your mobile phone with hacker power!
In the hands of a hacker, an ordinary Android smartphone can become a formidable weapon – either on its own or in combination with other devices. But hardware is only one component of hacker’s success: to transform a phone into a hacker tool, special software is required.
CONTINUE READING 🡒 Dissecting Viber. How to analyze Android apps
Once, while being on a job search, I received an interesting test assignment: analyze Viber for Android, find vulnerabilities in it, and exploit them. Using this episode as an example, I will demonstrate you an efficient approach that can be used to analyze real apps…
CONTINUE READING 🡒 GPS spoofing: How to become a satellite
Each of us uses satellite navigation to get anywhere outside our backyard. But what if GPS, as of a sudden, stops working and cannot be used to determine your location anymore? This article presents an efficient technique enabling you to fool GPS.
CONTINUE READING 🡒 Cyberphone. Transforming an Android smartphone into a hacker tool
From a hacker’s perspective, a mobile phone is the most handy tool for computer attacks, especially for attacks that require semiphysical access and are delivered over a radio channel. In this article, I will explain how to transform an ordinary Android smartphone into a powerful hacker…
CONTINUE READING 🡒 Playful Xamarin. Researching and hacking a C# mobile app
Java or Kotlin are not the only languages you can use to create apps for Android. C# programmers can develop mobile apps using the Xamarin open-source platform. Today, I will explain how to research such apps and find ways to hack them.
CONTINUE READING 🡒 Blindfold game. Manage your Android smartphone via ABD
One day I encountered a technical issue: I had to put a phone connected to a single-board Raspberry Pi computer into the USB-tethering mode on boot. To do this, I used Android Debug Bridge (ADB), a handy debugging interface for Android devices. There are several…
CONTINUE READING 🡒 Controlling Android. Dangerous APIs enable hackers to intercept data and…
In addition to traditional permissions, Android has three metapermissions that open access to very dangerous APIs enabling the attacker to seize control over the device. In this article, I will explain how to use them so that you can programmatically press smartphone buttons, intercept…
CONTINUE READING 🡒 Fake address. How to change geolocation on Android devices and…
Android has a wonderful feature: you can make any program the provider of geocoordinates, so that the entire system will use the latitude and longitude provided by it. In this article, I will show how to exploit this feature and how to write a program spoofing GPS coordinates.
CONTINUE READING 🡒 Duck tales. How to create a wireless analogue of Rubber…
Hackers and pentesters consider BadUSB an efficient attack vector; it emulates the keyboard and performs operations on the attacked computer under the disguise of user input. Such attacks are very difficult-to-detect because neither the OS nor antiviruses suspect the keyboard of any wrongdoing. Today, I will show…
CONTINUE READING 🡒 Battle smartphone. How to transform your Android device into ‘hackerphone’…
In sci-fi movies, hackers use cellphones to compromise heavily protected networks. Up until recently, it was just a fantasy, but now this fantasy becomes a reality. In this article, I will explain how to transform your phone into a powerful hacking tool.
CONTINUE READING 🡒 Android security: evolution from version 1 to version 11
For a long time, Android was known as a slow and insecure OS for losers unable to afford an iPhone. Is this still true, and was Android really so bad? Leaving aside the interface smoothness and OS capacity, I am going to briefly discuss the evolution of the worst…
CONTINUE READING 🡒 Android SSL Pinning
Introduction Modern requirements to mobile data processing apps designed for work with personal and financial data include secure data transfer over the Internet. SSL pinning is a mechanism used to satisfy this requirement: it enables the user…
CONTINUE READING 🡒 














