ANDROID & LINUX HACKING
TYPES OF HACKS
Did you
know that computers are not the only devices that you can hack? You can hack
into almost every smart device that you see around you. Be it your mobile
phone, your TV and even your smart fridge. That’s right you can now hack into
your enemy’s fridge and melt all his ice cream.
Let’s look
into a few hacks including android hacking and Linux hacking in the following
lessons.
ANDROID HACKING
Android
hacking or mobile hacking refers to accessing a mobile phone remotely without
the consent or knowledge of the owner. Yes, it is different than taking a quick
peek while your data goes to the washroom.
Hacking
someone’s phone can grant you access to their entire contact list, webcam as
well as to sensitive information such as their bank account details. You can
even open their Instagram and follow you…. We are just kidding, that would be
taking it too far.
This video
explains you exactly how hacking into an android phone works and commands you
can use in the Kali machine.
LINUX HACKING
Now that
you know all about windows hacking, it’s time to advance a little and hack a
LINUX system.
Linux systems are used throughout computing which means learning to hack them will help you gain access to the most advanced systems.
In this
video, we will go through the procedure of hacking a LINUX system using Kali
LINUX and Metasploit Moreover, the video covers:
·
Finding
open ports
·
Exploiting
those open ports to gain access to the entire system
·
Modifying
system files like creating a folder as well as deleting one
1. What is the first thing you need to
do while hacking a phone using Kali Linux?
a. Enter IP address of victim
b. Check the open ports
c. Create a payload
Ans- c. Create a payload
2. Which of the following returns the
open ports?
a. NMAP scan
b. Port scan
c. FTP scan
Ans- a. NMAP scan
KEY TAKEAWAYS!
·
Once
the hack is successfully completed, the hacker should erase all traces by
deleting log files and entries.
·
The
hacker must protect his identity at all times to prevent getting caught
hacking.
·
The
operating system logs every entry and changes made on in. Hence it is of upmost
importance to erase all log files.
0 Comments