Forum Thread: Hacking

What can i do if i have full acces to a wifi?
What is pineapple?
mitm vs metaspoilt?

What is a goodsmartphone for hacking?i was thinking about htc one m7. If i install an OS suite for hacking on an android phone,can i still use it for calling?

Get The Weekly Null Byte Newsletter

Never miss a Null Byte guide.

4 Responses

MITM, spoofing, the options are countless.
A device/router aimed at hacking.
They are two differenti things, it depends on the situation.
Smartphone for hacking? One that supporta monitor mode and has a good processor...
I don't know if you can still use it, I guess so but I don't know...

Male sure there are hacking kernels for the one you are going to choose!

· I've been trying to figure the same thing lately. There are some things to do with Wireshark, there are exploits with Metasploit that don't require social engineering (but I haven't tried yet), and I believe there's the possibility to make fake login websites (such as Facebook's) and auto-redirect the router to your localhost when someone types facebook.com into their browser. Or you could try to get cookie sessions, that'd be more convenient.

· This is a PineAPle. If I lived in the US (or a country with no closed customs, I'd get one to give it a try.

· I've also heard the Nexus phones are great for hacking, if you can afford one. Personally, I own the less hacker-ish phone, a Lumia 720. As far as I know, they're not as vulnerable as iPhone's and Android's, but maybe that's because no one cared to exploit them yet :P

If you are on the LAN you can do whatever you are capable of. You are in a predatory mode since 9/10 times you are undetected upon first arrival.

It depends on why you wanted into the network in the first place. To get free wifi? To make new zombie friends. To gain personal info on the target. To spy on the users. etc.

I would theorize that you would want to see if logging is enabled on the AP. Use -o switch alot for hard copies. Then footprint the network and all devices connected to it. Look for pivots if needed/possible. That's enough of a rough idea.

Long story short I would just init 0 if I didn't know what to do and go back to the dojo.

I think for the phone you could use nexus 5 and one plus one as they support nethunter I think... ( personally I love one plus one)

As for the wifi.. as everyone said their are countless things... think of what u want to do and their is a 80% chanve it can be done :):)

Ill explain easily as easy language is what I know lol:):).. mitm is as its full form says u sit in the middle of user and internet and all things go through you... metasploit is for getting control of the pc... ex - with mitm u can spoof a passwors of user when he inputs in a form... with metasploit u can keylog him... or more easily u can extract the saved password list from his pc!! :):)

Share Your Thoughts

  • Hot
  • Active