digital
#326105 / aantal kerenno
Education & Tech » Science Technology Computer & Digital Electronics
digitalisierunginformationinternetdigitalisierunginformationinternet
no
Education & Tech » Science Technology Computer & Digital Electronics
digitalisierunginformationinternetdigitalisierunginformationinternet
We use cookies and similar technologies on our website. Some of them are essential, while others support us by enhancing the website and user experience. Personal data ( e.g. IP addresses) could be processed, e.g. for personalized ads and content or user metrics. Further information about the usage of your data can be found in our Privacy Policy. You can edit or revoke your choice anytime by clicking on the "Manage cookies" link in the footer of any page.
Opmerkingen. (3)
Deleted
That means you need either physical possession of the phone (at which point, it's a free-for-all), or you need to induce them to take some action.
So, if I wanted to compromise a phone, I'd use a spear phishing variant.
Let's say that I'm targeting, oh.... Jonathan Brill. And all I have is his phone number.
I'd apply some social engineering and see if I could acquire the phone numbers of say oh, I dunno - someone who he'd trust. Maybe Marc Bodnick or Adam D'Angelo or any of the senior staff at The Q.
With that in hand, I'd flange up a software suite, designed to install a dropper when opened in a web browser, from which I'd be able to proceed to take over his phone.
Now, how to get it to him? Hmm. Craft a faked-up Quora page, possibly by "stealing" a real Quora page, and then sending a link in an SMS message with fake CallerID making it look like it's from someone he trusts "Hey, Jonathan, read this and consider it for publishing". My link would use the Quora link-shortener, but mis-spelled, he'd miss that, and click on it.
And. His. Ass. Is. Mine.
Maybe.
There's a further supposition in there. That I can figure out how to penetrate his phone from a dropper on a web page. So far, that's not "a thing" except for phones which have been "jail broken" or which have other software installed which make that possible.
So the confidence interval goes from "not at all" if he's rocking a stock iPhone to "pffft. cake" if he's on a older release of Android that's jailbroken.
But if I can somehow get him to install an app I've written.... the odds of my success in hacking him go way up.
Same issue, though. Most iPhone users are really good about only installing stuff from the AppStore, which means I either have to be really, really good at this (and have a pile of time to devote to it), or it's not going to happen. Android, on the other hand, where you can just download and run APK files from literally anywhere (you do have to have the user bypass the "are you sure you want to do this?" warning, but hey by this point you're an old pro at that) it's cake, if the user is willing to do what you want them to do.
And it all starts with a text message, to a phone number...
Well, if you need a professional hacker for any hack reasons, send a mail to: [email protected]
, op January 13, 2019 report post antwoorden applause 0
Deleted
Make foundings about us. You can check us up at hackerone.com
Check our profile on Google to see what we've been up to, where we've worked and what we specialised in.
Ask us questions. I prove myself beyond reasonable doubts on all Hacking jobs. Be sure you are making the right decision. Don't just make payment without knowing what approach specifically. You need a professional hacker? Send a mail to the Email on my bio>>>>[email protected]
Be safe out there!!!
, op January 13, 2019 report post antwoorden applause 0
Member
manfredw, op November 30, 2018 report post antwoorden applause 0