How can I find out if there's a backdoor in my computer or in my iphone or android?? And how do I get rid of it without formatting the computer or restoring the iphone?
- Hot
- Active
-
Forum Thread: How to Install Kali Linux on Iphone or Ipad 25 Replies
5 hrs ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 42 Replies
1 day ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 13 Replies
1 day ago -
Forum Thread: InstaBrute Traceback Error Plz Help 2 Replies
1 day ago -
Forum Thread: Get Victim's Exact Location Using TrackUrl 26 Replies
1 day ago -
Forum Thread: Hacking Facebook,Twitter,Instagram Account Passwords with BruteForce 159 Replies
2 days ago -
Forum Thread: Ext4 File System Error While Installing Kali Linux for Bootable Usb 3 Replies
5 days ago -
Forum Thread: Eml to PST Conversion 3 Replies
5 days ago -
Forum Thread: PORT FORWARDING IN JIOFI 18 Replies
6 days ago -
Forum Thread: How to Hack CCTV Private Cameras 65 Replies
6 days ago -
Forum Thread: Hack Instagram Account Using BruteForce 197 Replies
1 wk ago -
Forum Thread: How to Hack a Website to Edit It 19 Replies
1 wk ago -
Forum Thread: Android Doesn't Connect Back to Metasploit with App Payload? 18 Replies
1 wk ago -
Forum Thread: Kali Linux WiFi Problem? 41 Replies
2 wks ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 173 Replies
2 wks ago -
Forum Thread: How to Start Listening Connections on Metaslpoit (WINDOWS) 8 Replies
2 wks ago -
Forum Thread: Grab Target's Webcam by Link 4 Replies
2 wks ago -
How to: HACK Android Device with TermuX on Android | Part #2 - Over WLAN Hotspot [Ultimate Guide] 24 Replies
2 wks ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 41 Replies
2 wks ago -
Forum Thread: No Wireless Extensions in Linux Debian 3 Replies
3 wks ago
-
How To: Use RedRabbit for Pen-Testing & Post-Exploitation of Windows Machines
-
How To: Boost Your Security with a VPN & Private Email Service
-
How To: Hack Android Using Kali (Remotely)
-
How To: Phish for Social Media & Other Account Passwords with BlackEye
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
Hacking Windows 10: How to Dump NTLM Hashes & Crack Windows Passwords
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: Null Byte's Hacker Guide to Buying an ESP32 Camera Module That's Right for Your Project
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Get an Internet Connection in the Middle of Nowhere to Hack Remotely
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How To: Crack Wi-Fi Passwords with Your Android Phone and Get Free Internet!
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Crack Password-Protected ZIP Files, PDFs & More with Zydra
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
26 Responses
Do you think you have a backdoor? And if you do you should check this post outhttps://null-byte.wonderhowto.com/how-to/find-your-computers-vulnerability-using-lynis-0159322/. Also if you think you have one tell me what is going on with your computer or phone.
Anonymous:
Lynis will not tell him if he has a backdoor installed, it will only tell him the known vulnerabilities on his system.
Hi my ports on my tbinv app zbow that got trogN and backxoor what can I do I thonk my mac address diffwrebt from beforr as well
Greenlemon:
Check out my article on how to know if you have been hacked.
Oh OK. What about installing a rootkit checker?
what about installing a new backdoor through an unsafe tool picked up from the internet ?
Thanks guys. How about on smartphones? How do you know if it has a backdoor or listener?
Greenlemon:
Well it depends on what type of IPhone or smartphone you are talking about.
how about iphone 4G ios 7??
Right now all I can tell you is the government can track you.
I already know that. And I want to get rid of that.
Oh. The solution is to jail break your Iphone.
Done. What's next?
Go to settings now. Then hit privacy. Click the tab that says advertising and then turn on limit ad tracking.
Hmm.. That's new. Anyway, done. After that? Is that it? How can I verify that there are no backdoors on my iPhone or that no one is tracking or can track me anymore??
Greenlemon:
That method, limit ad tracking, only makes certain that advertisers can't track you. Is does not insure that a backdoor has not been installed or the government tracking you.
Ok. Then how can I verify that my iPhone doesn't have backdoors? Or how can I tell that no one's tracking me anymore??
I referred you to my article. Did you read it?
Yes I did. But that's only for computers. How about on iPhone? by the way I have a comment there. Can you please check the photo I attached to my comment. Thanks
So how do you now check if iPhone has backdoors? or how can I prevent hackers or even NSA track me through my phone.
Green:
You can do the same analysis with your phone.
I think you are too worried about the NSA. The NSA can track anybody the want to.
LOL. Not really. Actually I was just amazed about how they're doing those tracking and hacking. And just curious about it.
Just one question. Do you think you can at least level yourself to one of the NSA's IT security department(whatever they call it) members?
Or are they that genius?
They are not genius. They have access to resources that give them access to all traffic. Its not a matter of skill, its a matter of resources and legal authority.
If you have unlimited resources, access to backbones and plus a talent to stock pile and weaponize 0 days you can do anything and even capture and filter YB's of data. If you are a nation state that is.
Well said, CHH.
Clear. That was a very clear explanation. Thanks guys.
Share Your Thoughts