Ticker

"WEBSITE UNDER MAINTENANCE"

ANDROID & LINUX HACKING

 ANDROID & LINUX HACKING

TYPES OF HACKS

Did you know that computers are not the only devices that you can hack? You can hack into almost every smart device that you see around you. Be it your mobile phone, your TV and even your smart fridge. That’s right you can now hack into your enemy’s fridge and melt all his ice cream.

Let’s look into a few hacks including android hacking and Linux hacking in the following lessons.

ANDROID HACKING



Android hacking or mobile hacking refers to accessing a mobile phone remotely without the consent or knowledge of the owner. Yes, it is different than taking a quick peek while your data goes to the washroom.

Hacking someone’s phone can grant you access to their entire contact list, webcam as well as to sensitive information such as their bank account details. You can even open their Instagram and follow you…. We are just kidding, that would be taking it too far.

This video explains you exactly how hacking into an android phone works and commands you can use in the Kali machine.

LINUX HACKING


Now that you know all about windows hacking, it’s time to advance a little and hack a LINUX system.

Linux systems are used throughout computing which means learning to hack them will help you gain access to the most advanced systems.

In this video, we will go through the procedure of hacking a LINUX system using Kali LINUX and Metasploit Moreover, the video covers:

·        Finding open ports

·        Exploiting those open ports to gain access to the entire system

·        Modifying system files like creating a folder as well as deleting one

 

1.      What is the first thing you need to do while hacking a phone using Kali Linux?

a.      Enter IP address of victim

b.      Check the open ports

c.      Create a payload

Ans- c. Create a payload

2.      Which of the following returns the open ports?

a.      NMAP scan

b.      Port scan

c.      FTP scan

Ans- a. NMAP scan

KEY TAKEAWAYS!

·        Once the hack is successfully completed, the hacker should erase all traces by deleting log files and entries.

·        The hacker must protect his identity at all times to prevent getting caught hacking.

·        The operating system logs every entry and changes made on in. Hence it is of upmost importance to erase all log files.

Post a Comment

0 Comments

Subscribe

We'll send you AWESOME content!