Monday, 1 August 2016

Mobile Hacking Tricks for Penetration Testing

Mobile Hacking Tricks for Penetration Testing : During Penetration tests we often need to conduct social engineering attacks on the Mobile phones of user . Social engineering is where any attack in a penetration test begins . This post is about how mobile tricks can be used for conducting the penetration tests . 

Mobile Hacking Tricks :

Mobile Hacking Tricks 1 : Call Forging

To call someone from their own number or any number.
1. Go to http://www.mobivox.com and register there for an account.
Mobile Hacking Tricks
Mobile Hacking Tricks – Call Forging
2. During registration, remember to insert Victim mobile number in “Phone number
“field .

3. Complete registration and confirm your email id and then login to your account.
click on “Direct WebCall”.
4. You will arrive at page shown below. In “Enter a number” box, select your country
and also any mobile number(you can enter yours). Now, simply hit on “Call Now”
button to call your friend with his own number.
5. That’s it. Your friend will be shocked to see his own number calling him. I have
spent last two days simply playing this cool mobile hack prank.

Mobile Hacking Tricks 2 :

Trace MObile Location:

Click On Below Link To Trace Unknown Number ->
Trace Mobile Location
This can be very useful when you need to identify the Geographic area of the Victim . This can give on an Idea about the location of the victim and more targeted attacks can be done on the victim in a penetration test .
trace-phone-number-location

On the Contrary , feel free to use the added features in this website :
trace

Mobile Hacking Tricks 3 :

Spoof Tooph 0.5: To Automate Cloning of Bluetooth devices
SpoofTooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain site. Bluetooth scanning software will only list one of the devices if more than one device in range shares the same device information when the devices are in Discoverable Mode (specifically the same Address)
Change Log v0.5:
– Fixed segmentation fault in manual assigning of Device Name and Class of Device
– Modified flags
– Depreciated
-r: Assign random NAME, CLASS, and ADDR
-l : Load SpoofTooph CSV logfile
-d : Dump scan into SpoofTooph CSV logfile
– New
-w : Write to CSV file
-r : Read from CSV file
-R: Assign random NAME, CLASS, and ADDR
-m: Specify multiple interfaces during selection
-u: USB delay. Interactive delay for reinitializing interfaces
Download Link : Click Here to download from Sourceforge
Here is a list of what you can do when you have hacked the other phone!
  • Read Messages.
  • Read Contacts. 
  • Change Profile
  • Play Ringtone even if the phone is silent 
  • Play songs from the hacked phone in the same phone.
  • Restart the phone 
  • Switch off the phone 
  • Restore Factory Settings 
  • Change Ringing Volume 
#Use only for legit Purposes  .

Related Posts:

0 comments:

Post a Comment