Showing posts with label phone hacks. Show all posts
Showing posts with label phone hacks. Show all posts

Saturday, June 30, 2018

We have consistently seen various vectors of attack rear their head when it comes to Android smartphones. We’ve seen Shattered Trust, Cloak and Dagger, and Rowhammer, just to name a few. RAMpage is the latest one on the block, and while it is a hardware vulnerability, it doesn’t necessarily need physical access to your device to exploit. How it works is relatively simple.

A group of university researchers have discovered that this vulnerability could theoretically work on any device with LPDDR memory, which includes virtually every smartphone released since 2012, including some Apple devices.

When a CPU reads or writes a row of bits in the RAM module present on the device, the neighbouring rows are slightly affected due to a tiny electric discharge. This isn’t usually a problem as we know RAM does this and that’s why it’s periodically refreshed to make sure nothing goes wrong. But what if we start “hammering” the same “row”? What if we continuously read or write to the same row in order to disrupt neighbouring rows? This can cause a bit-flip in a memory row that we shouldn’t own or have access to at all. That’s what Rowhammer is, and it’s being used as part of a larger vulnerability called RAMpage. The CVE is CVE-2018-9442 and it affects devices shipped with LPDDR2, LPDDR3, or LPDDR4 RAM.

RAMpage can be used to gain root access on a device, but the researchers managed to get it to do a whole lot more as well. It could be used to bypass JavaScript sandboxes and even perform an attack running on another virtual machine on the same computer on x86 devices. ARM-based devices are also vulnerable, and that’s where our Android phones come in. DRAMMER stands for “Deterministic Rowhammer Attacks on Mobile Devices”.

The attack allows a hacker access to the entire operating system. This includes accessing the data stored by other applications, which the Android security model is meant to prevent. An attacker can gain full control of a device allowing them to obtain stored passwords, personal photos, emails, instant messages and even business-critical documents.
get the latest hacking gist here


Yet another stunning fact on MS17-010 vulnerability surfaces forcing the cyber security experts to concentrate on the ways and means to counter the threat that deepens on every passing day. Top researchers claimed to have found out that NSA Cyber weapon DoublePulsar has every possible chance to exploit the Windows embedded devices.
After the Shadow Brokers stood exposed last year, it has come to light that the hackers or attackers used the windows system when the NSA Tool, known as DoublePulsar---provided an exclusive and backdoor entry into it. That was what the conclusive findings of the research which involved a team of top cyber experts. During the research, the experts minutely examined DoublePulsar functioning on an Embedded Windows device. Only then, they got to know all about the DoublePulsar authors who never supported to an embedded device and instead the exploit was meant for Windows OS. The cyber security experts checked target here to ascertain the vulnerability and finally, deploying SMBTouch, they jumped into the conclusion that the target was really vulnerable to EternalBlue. After installing the backdoor on the target the cyber scientists came to discover that the modules of the MSF exploit authors failed to fix the support for windows embedded version. According to researchers, initially they created a DLL to the target host and then injected the DoublePulsar exploit into the embedded system. The research provided the scientists more facts on how the Windows Embedded devices exploit. According to what a researcher engaged in it said, a graphical view was allowed to play a crucial role in it. He said that the experts assumed that as the target machine starts running Windows7, it took the left course. Then it took the turn to ascertain whether the entire architecture system that kept running was indeed x64 or x86, which one was correct. On the contrary, the system keeps taking the right course if the target is far from being Windows 7. Then in right side, it perform OS checks. The system ends up on an error machine in the absence of any check for the windows embedded. In fact, the error takes place only for not checking the windows embedded devices as the exploit was found to have been functioning against target. Only after these crucial but interesting happenings, the researchers made a slew of modifications in the exploit to counter the threat.
get the latest hacking gist here

Bleeping Computer today revealed that they discovered a type of “clipboard hijacker” malware that monitors over 2.3 million bitcoin addresses.

A clipboard hijacker malware works by tricking users by switching the bitcoin address from their clipboard to another address that the attacker control. Since bitcoin addresses are long and hard to remember, this method works easily for hackers since users simply copy paste addresses from one application to another when sending cryptocoins.

The malware reportedly comes as a part of the All-Radio 4.27 Portable malware affecting Windows computers and monitors the Windows clipboard for a bitcoin address. Unless the user double-checks the address after pasting it, the bitcoin will go to the attackers’ address.

“While we have covered cryptocurrency clipboard hijackers in the past and they are not new, most of the previous samples monitored for 400-600 thousand cryptocurrency addresses,” their report on the malware read. They also posted a video showing how the malware works: 


Bitcoin users are advised to always double-check the address before making a transaction and to have a trusted antivirus program installed on their device.

get the latest hacking gist here

Friday, June 29, 2018

Vulnerability threat to WordPress core

Top cyber security experts have talked of an impending vulnerability that could put WordPress in a fix and unless the renowned content management system releases a patch to counter it a serious consequences is in the offing. 
In a recent disclosure, the experts claimed to have got wind of the vulnerability in November last year forcing them to write to the WordPress authority and suggested a patch to negate the possibility of a mess in the system. 
But the things refused to progress. Those doing research on it claimed to have found out the bug in question in PHP where images uploaded on the WordPress site is deleted. 
Thus, the attackers could takes the rein of the content management system of the WordPress. 
According to what they say, the cyber criminals can attack the system deploying a malicious code in a WordPress owned site and as a result, the WordPress core containing crucial data and files would be deleted. 
Only the bug could be exploited by the users with the ability to get a post created with images. 
This is what the mechanism to minimise the impact of the vulnerability, say the researchers. 
In doing so, even if somebody attempts to attack registering an user account in a site, he or she could cash in on the vulnerability before hijacking a site.
Hijacking site is not impossible since vulnerability is there for the attackers who would delete the config file of a site. 
Usually, the attackers then would install the file and the site afresh. But this time they would use the database settings of their own. 
The researchers are, more or less, agree that the vulnerability in question would leave the WordPress CMS versions affected along with v4.9.6, the updated WordPress version. 
The WordPress team members are tightlipped on the issue even six months after they received the sets of suggestion to deploy a patch. But they never denied the authenticity of the findings. 
The vulnerability, it is said, has little chance to be exploited in a big way since there is no author level account on a WordPress-owned site. 
The team of researchers has released a hotfix, which indeed, is a PHP code for those who own sites to enable them to add it to the .php file to remain unharmed.

This surveillance van can hack your iPhone or Android device from 500 meters away

A Cyprus-based surveillance startup WiSpear, founded by Israel's surveillance market players Tal Dilian, has built a spy car that is full of 'next-generation snooping' tools which can hack Apple and Android devices from 500 meters  (547 yards) away.

The new vehicle is named SpearHead 360,  and was displayed for the first time at ISS World and Eurosatory trade show.  The car is for sale between  $3.5 million and $5 million.

The SpearHead 360 vehicle has 24 antennas to help it reach out to nearby devices. Once a device has been chosen to be targeted, the automobile has four different kinds of methods to force a device to connect to its Wi-Fi-based interceptors to gather intel from the device.

 It also has four different kinds of malware for various operating systems,  including Apple’s iOS or Google’s Android devices, that could be installed remotely.

According to Dilian,  the van is capable of hacking multiple devices running on the same or different OS, at the same location, all at the same time.

The company claims that they have an access  to a range of publicly-unknown Android and iOS vulnerabilities (known as zero-days) both in Google and Apple Operating systems,  which can be easily used by hackers to target the devices simultaneously; imagine if you have three different devices (a Mac Laptop, an Android phone, and a Windows tablet) with you at a point in time,  and it is in range of spy van, then all three could be infected at once.

"This takes customers from detection all the way to full interception. I think it’s a game changer."-Tal Dilian, founder, WiSpear

Cisco patches critical vulnerabilities

Cisco released patches for 34 vulnerabilities that include 5 critical, 20 high and 9 medium vulnerabilities. The 5 critical vulnerabilities are in FXOS and NX-OS and NX-API software and could allow an attacker to execute remote arbitrary code that could cause a buffer overflow or in other cases may lead to a DoS attack.

You'll need to wade through Cisco's advisories to work out if the software you're running is vulnerable or already fixed.

All of the critical flaws have a CVSS score of 9.8 out of 10 and four of them affect the FXOS and NX-OS Cisco Fabric Services because FXOS/NX-OS "insufficiently validates header values in Cisco Fabric Services packets," according to the security notice. The last critical flaw affects the NX-API feature of NX-OS.

The critical Smart Install flaw has affected 8.5 million devices till now.

The Cisco patch will fix the issues CVE-2018-0308, CVE-2018-0304, CVE-2018-0314 and CVE-2018-0312.

 ▬ MDS 9000 Series Multilayer Switches
▬ Nexus 2000 Series Fabric Extenders
▬ Nexus 3000 Series Switches
▬ Nexus 3500 Platform Switches
▬ Nexus 5500 Platform Switches
▬ Nexus 5600 Platform Switches
▬ Nexus 6000 Series Switches
▬ Nexus 7000 Series Switches
▬ Nexus 7700 Series Switches
▬ Nexus 9000 Series Switches in a standalone NX-OS mode
▬ Nexus 9500 R-Series Line Cards and Fabric Modules
▬ Firepower 4100 Series Next-Generation Firewalls
▬ Firepower 9300 Security Appliance
▬ UCS 6100 Series Fabric Interconnects
▬ UCS 6200 Series Fabric Interconnects
▬ UCS 6300 Series Fabric Interconnects

The NX-API vulnerability is caused by an incorrect input validation in the authentication module of the NX-API subsystem which can be exploited if an attacker were to send a crafted HTTP or HTTPS packet to the management interface of an affected system with the NX-API feature enabled.

The four affecting Cisco Fabric Services are because FXOS/NX-OS "insufficiently validates header values in Cisco Fabric Services packets".
get the latest hacking gist here

Thursday, June 28, 2018

Så här återställer jag mitt Facebook-konto när jag inte längre kan logga in

Så här återställer jag mitt Facebook-konto när jag inte längre kan logga in

Glömde du ditt lösenord och kan du inte logga in längre? Eller var ditt konto hackat?

Du är inte ensam! Hundratals människor vänder sig till oss med liknande frågor varje dag. Lyckligtvis erbjuder Facebook flera automatiska sätt att återvinna ditt konto. Oavsett om du har glömt ditt lösenord eller inte längre kan logga in eftersom en hacker ändrat den, har du flera alternativ. Vi visar dig hur du återställer ditt Facebook-konto, steg för steg.

Obs! Den här artikeln omfattar allt jag vet om återställning av Facebook-konto. Läs den här artikeln, läs kommentarerna, och om du fortfarande har frågor, lämna din egen kommentar och hoppas på det bästa. Det finns inget mer jag vet eller kan göra för att hjälpa

1. Är du fortfarande loggad någonstans?
Innan du försöker återställa ditt konto, kontrollera om du fortfarande är inloggad på Facebook på någon av dina enheter. Det här kan vara en annan webbläsare eller webbläsarprofil på din dator, din Facebook Android eller iOS-app eller en mobilwebbläsare, till exempel på din surfplatta.

Om du kan komma åt Facebook var som helst, fortsätt till steg 1a i vår artikel om vad du ska göra när ditt Facebook-konto har hackats

Obs! Om du ställer in tvåfaktorsautentisering och har tappat åtkomst till din kodgenerator kan du här återställa ditt konto.

2. Har du försökt alternativa alternativ för återställning av konton än?
OK, så du kunde inte hitta en enhet där du fortfarande var inloggad på Facebook. Låt oss fortsätta med återhämtningen då. Om möjligt, använd ett nätverk eller en dator från vilken du har loggat in på ditt Facebook-konto innan.

Först måste du identifiera ditt konto. Gå till Facebook-återställningssidan och använd en e-postadress eller ett telefonnummer som du tidigare lagt till på ditt Facebook-konto. Även om det inte säger så kan du också använda ditt Facebook användarnamn.

Så här återställer du ditt Facebook-konto när du inte längre kan logga in Hitta ett Facebook-konto

När du lyckats identifiera ditt konto lyckades du se en sammanfattning av din profil. Innan du fortsätter, kontrollera noga om det här är ditt konto och om du fortfarande har tillgång till den eller de e-postadresser eller mobiltelefonnummer som anges.

Så här återställer du ditt Facebook-konto när du inte längre kan logga in på Facebook Återställ lösenord

Ska du inte längre ha tillgång till dessa? Fortsätt till punkt 3 i denna artikel.

Om allt ser bra ut med de kontaktuppgifter som Facebook har på filen för dig klickar du på Fortsätt. Facebook skickar dig en säkerhetskod. Hämta det, skriv in det och gläd dig att ha återställt ditt konto.

Så här återställer du ditt Facebook-konto när du inte längre kan logga in i Facebook Säkerhetskod 1

Om koden aldrig kommer fram klickar du på Fick inte en kod?, Som tar dig tillbaka till föregående skärmbild för Återställ ditt lösenord. Du kan försöka igen eller kanske kommer du inse att du inte har tillgång till kontot / s trots allt.

Tillbaka till ditt konto
Om du lyckades få tillgång till ditt konto och om du misstänker att ditt konto hackades ändras omedelbart ditt lösenord (använd ett starkt lösenord!) Och uppdatera din kontaktinformation. Det här är viktiga steg för att säkra ditt Facebook-konto. Var noga med att ta bort eventuella e-postadresser eller telefonnummer som inte är egna eller att du inte längre kan komma åt.

Vi rekommenderar starkt att du aktiverar tvåfaktors autentisering, så detta kommer inte att hända igen.

3. Ändrade din kontaktinformation?
Ofta är det inte möjligt att återställa ett konto med alternativen ovan. Kanske har du inte längre tillgång till den e-postadress (er) och telefonnummer (er) du en gång har lagt till i din profil. Eller kanske en hacker ändrade den här informationen. I så fall tillåter Facebook dig att ange en ny e-postadress, som de kommer att använda för att kontakta dig om att återställa ditt konto.

För att starta processen, klicka på länken Har du inte längre tillgång till dessa? längst ned till vänster på återställ lösenordssidan för att starta återställningsprocessen. Facebook kommer att fråga dig om en ny e-postadress eller ett telefonnummer, så att de kan nå ut till dig om det behövs. Klicka på Fortsätt för att fortsätta.

Så här återställer du ditt Facebook-konto när du inte längre kan logga in på Facebook

Om du har konfigurerat Trusted Contacts får du chansen att använda dessa för att återställa ditt konto i nästa steg.

Så här återställer du ditt Facebook-konto när du inte längre kan logga in på Facebook Trusted Contacts

Du måste komma ihåg minst ett fullständigt namn på dina tre till fem pålitliga kontakter för att avslöja dem alla. Observera att du bara behöver tre koder för att återställa ditt konto.

Om du inte konfigurerat betrodda kontakter kan du få möjlighet att besvara ett av dina säkerhetsfrågor och återställa ditt lösenord på plats. Som en extra försiktighet kommer detta med en 24-timmars väntetid innan du kan komma åt ditt konto.

Annars kanske du måste vänta tills Facebook kommer i kontakt för att verifiera din identitet. Ha tålamod!

4. Var ditt konto hackat och skickar ut spam?
Om ditt konto hackats och skickar spam till

Monday, June 25, 2018

make your battry last longer Block Ads in All Your Android Apps Without Root or Extra Battery Drain
If you're in the market for a non-root ad-blocker, developer Julian Klode has an app that you'll definitely want to check out. It uses Android's VPN system in a similar manner to alternative apps like NetGuard and AdGuard, but it's got a new twist that should save lots of battery life in the process.
Unlike its competitors, Klode's ad-blocking app works at the DNS level, meaning that it only filters traffic for a brief moment when connections are first made, which is where all of the battery saving comes into play. To top that off, it's completely free and open-source, so it's an instant contender for best no-root ad-blocker.

Requirements

Step 1Install DNS66

The app that will block all ads on your non-rooted device without excess battery drain is called DNS66, and it's available for free on the F-Droid Repository. This site is a trusted home for free and open-source Android apps, so tap the following link from your Android phone or tablet to begin:
From there, scroll down to the Packages section on the page, then tap the link that says "download apk." Next, simply tap the Download complete notification to launch the APK, then press "Install" when prompted.

Your Old Phone Number Can Be Used To Hack Facebook Account

Facebook
We all know that in most cases,Facebook users are required to submit their phone number while registering with the social network. This is how they can link their phone with the profile so that when a user forgets the password, they can prove his authenticity and receive a new password on their smartphone.
However, in case the user stops using the phone number linked to their Facebook profile and changes it to another one, there are chances that the previous number can be assigned to someone else. This is where the problem begins.
According to the research conducted by a computer programmer James Martindale, Facebook accounts can be easily hacked using your old phone number. Because if the new owner of your previous number performs password reset while attempting to logging in to Facebook, it is very much possible to gain full control of your account.
The account recovery system of Facebook is to be blamed for this mishap. When a user forgets his/her password, it becomes the responsibility of Facebook’s account recovery system to help the user access the account by sending an SMS message on their phone number containing a unique code. This code allows the user to regain access to the account and set a new password. So, when your old number is acquired by someone else, using the unique code the new owner of your previous phone number can hijack the Facebook account. It does not require any social engineering skills to perform the hack.
Martindale himself tried this trick by buying a new SIM and was surprised to receive a message from Facebook as soon as he inserted the SIM into his phone. He shared his findings in a blog post on Medium, where he wrote:
“I was curious. I knew Facebook by default lets people find your account with your phone number, so I typed the number into the search bar and see what came up.”
To receive the password recovery option, he typed in a password and then received a code on his newly bought phone number to login to the account. As per the analysis of Martindale, this trick is fairly simple, but its consequences are quite drastic since hackers can use Facebook accounts for spreading various kinds of scams or may sell the accounts on the black market. They can also blackmail the original user for money in exchange of profile.
This also poses a threat to other contacts of the hacked account as every friend of the user can be threatened, specifically extorted for money. Another startling revelation made by Martindale was that FreedomPop VoIP carrier that he uses allows him to modify his phone number by showing him a list of available number for just $5. All you have to do is to try all the numbers to log in to Facebook and once a match is found the hacker can hijack a Facebook account, explained Martindale.
What’s even more troubling is that Facebook, despite considering it a real threat, did not include this issue in its bug bounty program. “Facebook doesn’t have control over telecom providers who reissue phone numbers or with users having a phone number linked to their Facebook account that is no longer registered to them” is the excuse provided by their website.
However, the trick can only work if your account is still linked to your old phone number. If you keep on updating your contact details, your account will remain protected. To keep your account safe, you need to remove any old phone number(s) and email IDs from your account and also use two-step login authorization feature.

How to hack android device network using Network Spoofer

Network Spoofer lets you change websites on other people’s computers from an Android phone.
You can you network Spoofer to
  • Flip pictures upside down
  • Flip text upside down
  • Make websites experience gravity
  • Redirect websites to other pages
  • Delete random words from websites
  • Replace words on websites with others
  • Change all pictures to Trollface
  • Wobble all pictures / graphics around a bit
  • A few custom modes for you to have your own fun!
Download and prank your friends!
It is a very easy app to use if you are looking to prank your friends the app will just run fine if you have rooted your android Mobile.

Requirements to use Network Spoofer

  • All your friends must be connected to the same WiFi network.
  • Around 500Mb Free Space in your SD Card
  • Rooted Android Phone
  • BusyBox
  • NetworkSpoofer APK
Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you.

How to use Network Spoofer App

  • Install Network Spoofer in your android Phone using the Above Link.
  • After installation open the App and if the app asks the Root permissions(Super User) grant it.
  • Now Click on the start button on this app.
12316165_437500826439328_2782765352634313033_n1-169x300
  • Now There are series of options on what you can do with the app.
12509711_437500806439330_1795888359938525365_n1-169x300
  • In this example I have selected to Flip the content of the Screen.
12573952_437500773106000_5680286015072994820_n1-169x300
  • Now select all the devices in your Wifi according to the IP address or MAC (Media Access control) Address.
145340600030931-169x300
  • Once you are done Select the Start button and that’s it all the content in our friends phone will be flipped just like the screenshot below.
12556975_437507619771982_344465762_o1-169x300

If you are developer Download the Source Code from this LINK.

Watch the Video Down below

Take your time to comment on this article.

Popular Posts

Recent Posts

Text Widget