Becoming HACKERS FROM ANDROID: PART 3

WARNING: SOME PROCESS THAT WILL SEE BELOW ARE CONSIDERED ILLEGAL IN SOME COUNTRIES. FROM THE MOMENT YOU ARE RESPONSIBLE FOR THE USE THEM DES. 

Thank you all for such a great support they have given me to keep writing these articles. 

Well since we are here in the third much more complex part than the previous one so I will explain safety only some functions, but remember that we can more hacerca googling the topic;) we need the following tools 

be superuser Busy Box (Play Store)  We will serve to install add- ons and processes normally run other apps like zanti. Without this toolbox we can not use zanti. Zanti (Mediafire)  This is the main application, we will use to "hack" on the network to which we are connected. This is the most comprehensive app of its kind. First we will download and execute BusyBox and install everything you ask us. It is sometimes necessary torestart the mobile. After zanti install and run it Entering the app first thing he asked us will associate an email. We will use the one currently in use and accept the terms to start using the application as shown below;)









Well now you start scanning the WiFi network to which we are connected in order to see how many and which devices are connected in my case I below these
In the first option " Entire Network"  indicates that is the main connection or complete connection can attack this in order to affect all devices BUT! that includes ours so I recommend attacking each separately. Sometimes appear to us the IP device names and thus identify them faster. 

The IP addresses that appear with a yellow line and with one or more ports are those that are vulnerable because they can connect remotely from port 80 or 8080 and could sometimes even abduct and do untold damage;) abano'll leave them a video of as an intelligent guy did from this app 

vIDEO

Good but we do not want to do that now, because we want to give a shock to our friends so I decided to try my tablet android and select the IP of my tablet and I left these options which we are interested in that has the name of Man in the Middle as shown below;)

And is that access these options Man In The Middle is the cock in the world because we can troll spy and even affect a server oo 
Les summarize what we can do with the man-in-the-middle attack



  • Find and view the websites which are sailing from the network.

  • Determine that images are displayed one IP.

  • Redirect pages viewed from secure protocols HTTPS to HTTP protocol or another page.

  • Attacking a website and replace images displayed in web browsers.

  • Display and intercept files that are downloaded from an IP or network.

  • Capturing a username and password when accessing a web and on the other hand have activated zanti.


  • Remember that we somo friendly hackers and do not want to hurt anyone so only use some options that are not so intrusive in agenas networks in order not to commit any crime C: In the screenshot below I will show you what the configuration of espionagemore effective  
    Now we will go as the ayamos enabled on the device of the victim, then go to an option that I like enough It is called Logged Request and Crisco. I teach with the captureIn Logged Request begins the action of a real cyber criminal as we capture everything and literally all processes that use the Internet, and since we set up the attack to redirect secure https: HTTP a similar but not certain protocol and so can capture users and passwords from any page including insurance domains, Facebook Twitter, Google plus, YouTube  Below I leave an example which shows that campturo google package that is https:IImagine if this happens in a private network that will not be on a public network where many if connected, it looks so do not be the victim of some criminal networks the solution is simple. If you are one of those people who are connected to public networks such as libraries or parks etc and do not want to steal data only need to download an app that believes ina vpn on your Android creates a virtual private network that see to pass data by the network, encrypts and makes invisible connections. These apps also serve to surf anonymously on the Internet; P
    Well guys if you want me to explain more about some function of zanti xD ​​something illegal, do not forget to comment or send me an email. Share this post and do not miss Part 4 of the 5 items I promised where we will trollear level god our friends, we are going to knock down and saturate your Internet connection xDBig greetings and see you soon: D

    Post a Comment

    0 Comments