Skip to content

Mobile Hacker

  • SAPSAN CYBERSEC SHOP
  • Blogs
    • NetHunter Hacker
      • Introduction to Kali NetHunter hacker series and which NetHunter fits you best
      • NetHunter Hacker I: Installation of rootless Kali NetHunter
      • NetHunter Hacker II: How to install Kali NetHunter on rooted OnePlus 7 Pro
      • NetHunter Hacker III: How to build Kali NetHunter for OnePlus 7 Pro
      • NetHunter Hacker IV: Introduction to NetHunter system
      • NetHunter Hacker V: How to use MAC Changer, KeX and setup USB Arsenal
      • NetHunter Hacker VI: Ultimate guide to HID attacks using Rubber Ducky scripts and Bad USB MITM attack
      • NetHunter Hacker VII: Wi-Fi compatibility check and setup on Android
      • NetHunter Hacker VIII: Wi-Fi hacking using wifite, deauthentication and wardriving
      • NetHunter Hacker IX: Use MANA Toolkit to create Wi-Fi rogue access point and intercept traffic
      • NetHunter Hacker X: WPS attacks
      • NetHunter Hacker XI: Bluetooth arsenal
      • NetHunter Hacker XII: Master Social Engineering using SET
      • NetHunter Hacker XIII: Overall guide to MITM framework
      • NetHunter Hacker XIV: Find exploits using SearchSploit and setup Wi-Fi Pineapple connector
      • NetHunter Hacker XV: Use Nmap for network scanning
      • NetHunter Hacker XVI: Metasploit payload generator in your pocket
      • Kali NetHunter 101: Your Path to Mobile Ethical Hacking
    • Bluetooth
      • Spoof iOS devices with Bluetooth pairing messages using Android
      • Spam iOS, Android and Windows with Bluetooth pairing messages using Flipper Zero or Android smartphone
      • Android Kitchen Sink: Send BLE spam to iOS, Android and Windows at once using Android app
      • Exploiting 0-click Android Bluetooth vulnerability to inject keystrokes without pairing
      • Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speakers
      • BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code execution
      • Uncover Bluetooth Vulnerabilities with BlueToolkit
    • Flipper Zero
      • How to detect Flipper Zero and Bluetooth advertisement attacks using Android app
      • How to increase radio range of Flipper Zero yourself beyond 100 meters
      • Bluetooth and Wi-Fi Jamming using Flipper Zero
      • Boost Your Flipper Zero with FEBERIS: 3-in-1 SubGhz, NRF24, and WiFi board
    • RFID
      • RFID Hacking with Proxmark3: Cloning, Emulating, and Standalone Mode
      • Cybercriminals Use NFC Relay to Turn Stolen Credit Cards into Cash without a PIN
    • M5StickC
      • M5StickC Plus 2 running Nemo firmware: WiFi evil portal attacks
    • TicWatch Pro
      • How to install NetHunter on TicWatch Pro
      • TicWatch Pro: Returning to Factory Firmware
      • Install NetHunter on TicWatch Pro after flashing factory firmware
      • TicWatch Pro as a Keystroke Injector
      • How to install Kali NetHunter on TicWatch Pro 3
    • Vulnerabilites
      • Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability
      • WhatsApp trick: Android malware can impersonate PDF file
    • Malware
      • WhatsApp trick: Android malware can impersonate PDF file
      • Locate smartphones using Advertising ID without spyware or exploit
      • Smartphone scareware: cracked screen as a result of virus
    • Cheap Yellow Display
      • Exploring Marauder, Bruce, and Ghost ESP on Cheap Yellow Display
      • Run Firmware Anywhere: Flexibility of M5Stick Launcher
    • Get persistent reverse shell from Android app without visible permissions to make device unusable
    • Detect Wi-Fi deauthentication attack using ESP8266 and receive notification on smartphone
    • Automated local DNS cache poisoning using Android while charging via computer
    • How charging your phone can compromise your data using Juice Jacking attack
    • Monitoring Android file system with fsmon
    • USB Army Knife: The Ultimate Close Access Penetest Tool
  • About me
Detect ARP spoofing attack using Android app

Detect ARP spoofing attack using Android app

mhDecember 16, 2024December 16, 2024Leave a comment
ARP (Address Resolution Protocol) spoofing is many times initial phase of Man-In-The-Middle (MITM) attack that allows an attacker to intercept...
Read More
Bluetooth and Wi-Fi Jamming using Flipper Zero

Bluetooth and Wi-Fi Jamming using Flipper Zero

mhDecember 12, 2024December 12, 2024Leave a comment
Jamming is a technique used to disrupt wireless communications by overwhelming the signal with interference. This blog post explores the...
Read More
Cybercriminals Use NFC Relay to Turn Stolen Credit Cards into Cash without a PIN

Cybercriminals Use NFC Relay to Turn Stolen Credit Cards into Cash without a PIN

mhDecember 2, 2024February 11, 2025Leave a comment
ThreatFabric has identified a new cash-out tactic that wasn’t seen before called “Ghost Tap”, which cybercriminals use to exploit stolen...
Read More
Smartphone scareware: cracked screen as a result of virus

Smartphone scareware: cracked screen as a result of virus

mhNovember 27, 2024November 27, 2024Leave a comment
Scareware is a type of malicious advertisement designed to frighten users into believing their device is infected with a virus...
Read More
Locate smartphones using Advertising ID without spyware or exploit

Locate smartphones using Advertising ID without spyware or exploit

mhOctober 25, 2024October 25, 2024Leave a comment
This blog is actually a video that explains how it is possible to locate Google and Apple smartphones legally by...
Read More
Portable Hacking Lab: Control The Smallest Kali Linux With a Smartphone

Portable Hacking Lab: Control The Smallest Kali Linux With a Smartphone

mhOctober 4, 2024October 4, 20242 Comments
Running Kali Linux on a Raspberry Pi Zero is a fantastic way to create a portable, powerful testing device. This...
Read More
WiFiPumpkin3 integrated into NetHunter: Powerful Duo allows malware distribution via Captive Portal

WiFiPumpkin3 integrated into NetHunter: Powerful Duo allows malware distribution via Captive Portal

mhSeptember 27, 2024September 27, 20241 Comment
WiFiPumpkin3 is a powerful framework designed for rogue access point attacks and network security testing. It allows security researchers, and...
Read More
How to install Kali NetHunter on TicWatch Pro 3

How to install Kali NetHunter on TicWatch Pro 3

mhJuly 25, 2024July 25, 2024Leave a comment
In previous series of blogs I focused on installation of Kali NetHunter on older model of TicWatch Pro 2018 (catfish)...
Read More
WhatsApp trick: Android malware can impersonate PDF file

WhatsApp trick: Android malware can impersonate PDF file

mhJuly 23, 2024July 23, 2024Leave a comment
On July 14th 2024, a malware analyst @0x6rss discovered and shared on X a security issue in WhatsApp Messenger for...
Read More
TicWatch Pro as a Keystroke Injector

TicWatch Pro as a Keystroke Injector

mhJuly 18, 2024August 3, 2024Leave a comment
If you successfully installed NetHunter as described in previous blogs, we can start use its tools. In this blog, I...
Read More

Posts pagination

1 2 3 … 7

Archives

  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023

Categories

  • Bad USB
  • bettercap
  • Bluetooth
  • Cheap Yellow Display
  • Evil Crow RF
  • Flipper Zero
  • M5StickC
  • Malware
  • NetHunter Hacker
  • Privacy
  • Radio Frequency
  • Raspberry Pi
  • RFID
  • Scareware
  • SDR
  • Termux
  • TicWatch
  • Uncategorized
  • Vulnerability
  • Wi-Fi

Social Media

Facebook
Twitter
YouTube
Instagram
Tiktok
Mobile Hacker
mobile-hacker.com
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}