Mobile Hacking Tricks for Penetration Testing : During Penetration tests we often need to conduct social engineering attacks on the Mobile phones of user . Social engineering is where any attack in a penetration test begins . This post is about how mobile tricks can be used for conducting the penetration tests .
2. During registration, remember to insert Victim mobile number in “Phone number
“field .
3. Complete registration and confirm your email id and then login to your account.
click on “Direct WebCall”.
4. You will arrive at page shown below. In “Enter a number” box, select your country
and also any mobile number(you can enter yours). Now, simply hit on “Call Now”
button to call your friend with his own number.
5. That’s it. Your friend will be shocked to see his own number calling him. I have
spent last two days simply playing this cool mobile hack prank.
Trace Mobile Location
This can be very useful when you need to identify the Geographic area of the Victim . This can give on an Idea about the location of the victim and more targeted attacks can be done on the victim in a penetration test .

On the Contrary , feel free to use the added features in this website :

SpoofTooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain site. Bluetooth scanning software will only list one of the devices if more than one device in range shares the same device information when the devices are in Discoverable Mode (specifically the same Address)
Change Log v0.5:
– Fixed segmentation fault in manual assigning of Device Name and Class of Device
– Modified flags
– Depreciated
-r: Assign random NAME, CLASS, and ADDR
-l : Load SpoofTooph CSV logfile
-d : Dump scan into SpoofTooph CSV logfile
– New
-w : Write to CSV file
-r : Read from CSV file
-R: Assign random NAME, CLASS, and ADDR
-m: Specify multiple interfaces during selection
-u: USB delay. Interactive delay for reinitializing interfaces
Download Link : Click Here to download from Sourceforge
Here is a list of what you can do when you have hacked the other phone!
Mobile Hacking Tricks :
Mobile Hacking Tricks 1 : Call Forging
To call someone from their own number or any number.
1. Go to http://www.mobivox.com and register there for an account.
Mobile Hacking Tricks – Call Forging
“field .
3. Complete registration and confirm your email id and then login to your account.
click on “Direct WebCall”.
4. You will arrive at page shown below. In “Enter a number” box, select your country
and also any mobile number(you can enter yours). Now, simply hit on “Call Now”
button to call your friend with his own number.
5. That’s it. Your friend will be shocked to see his own number calling him. I have
spent last two days simply playing this cool mobile hack prank.
Mobile Hacking Tricks 2 :
Trace MObile Location:
Click On Below Link To Trace Unknown Number ->Trace Mobile Location
This can be very useful when you need to identify the Geographic area of the Victim . This can give on an Idea about the location of the victim and more targeted attacks can be done on the victim in a penetration test .

On the Contrary , feel free to use the added features in this website :

Mobile Hacking Tricks 3 :
Spoof Tooph 0.5: To Automate Cloning of Bluetooth devicesSpoofTooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain site. Bluetooth scanning software will only list one of the devices if more than one device in range shares the same device information when the devices are in Discoverable Mode (specifically the same Address)
Change Log v0.5:
– Fixed segmentation fault in manual assigning of Device Name and Class of Device
– Modified flags
– Depreciated
-r: Assign random NAME, CLASS, and ADDR
-l : Load SpoofTooph CSV logfile
-d : Dump scan into SpoofTooph CSV logfile
– New
-w : Write to CSV file
-r : Read from CSV file
-R: Assign random NAME, CLASS, and ADDR
-m: Specify multiple interfaces during selection
-u: USB delay. Interactive delay for reinitializing interfaces
Download Link : Click Here to download from Sourceforge
Here is a list of what you can do when you have hacked the other phone!
- Read Messages.
- Read Contacts.
- Change Profile
- Play Ringtone even if the phone is silent
- Play songs from the hacked phone in the same phone.
- Restart the phone
- Switch off the phone
- Restore Factory Settings
- Change Ringing Volume
0 comments:
Post a Comment