Skip to content

Mobile Hacker

  • SAPSAN CYBERSEC SHOP
  • Blogs
    • NetHunter Hacker
      • Introduction to Kali NetHunter hacker series and which NetHunter fits you best
      • NetHunter Hacker I: Installation of rootless Kali NetHunter
      • NetHunter Hacker II: How to install Kali NetHunter on rooted OnePlus 7 Pro
      • NetHunter Hacker III: How to build Kali NetHunter for OnePlus 7 Pro
      • NetHunter Hacker IV: Introduction to NetHunter system
      • NetHunter Hacker V: How to use MAC Changer, KeX and setup USB Arsenal
      • NetHunter Hacker VI: Ultimate guide to HID attacks using Rubber Ducky scripts and Bad USB MITM attack
      • NetHunter Hacker VII: Wi-Fi compatibility check and setup on Android
      • NetHunter Hacker VIII: Wi-Fi hacking using wifite, deauthentication and wardriving
      • NetHunter Hacker IX: Use MANA Toolkit to create Wi-Fi rogue access point and intercept traffic
      • NetHunter Hacker X: WPS attacks
      • NetHunter Hacker XI: Bluetooth arsenal
      • NetHunter Hacker XII: Master Social Engineering using SET
      • NetHunter Hacker XIII: Overall guide to MITM framework
      • NetHunter Hacker XIV: Find exploits using SearchSploit and setup Wi-Fi Pineapple connector
      • NetHunter Hacker XV: Use Nmap for network scanning
      • NetHunter Hacker XVI: Metasploit payload generator in your pocket
      • Kali NetHunter 101: Your Path to Mobile Ethical Hacking
    • Bluetooth
      • Spoof iOS devices with Bluetooth pairing messages using Android
      • Spam iOS, Android and Windows with Bluetooth pairing messages using Flipper Zero or Android smartphone
      • Android Kitchen Sink: Send BLE spam to iOS, Android and Windows at once using Android app
      • Exploiting 0-click Android Bluetooth vulnerability to inject keystrokes without pairing
      • Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speakers
      • BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code execution
      • Uncover Bluetooth Vulnerabilities with BlueToolkit
    • Flipper Zero
      • How to detect Flipper Zero and Bluetooth advertisement attacks using Android app
      • How to increase radio range of Flipper Zero yourself beyond 100 meters
      • Bluetooth and Wi-Fi Jamming using Flipper Zero
      • Boost Your Flipper Zero with FEBERIS: 3-in-1 SubGhz, NRF24, and WiFi board
    • RFID
      • RFID Hacking with Proxmark3: Cloning, Emulating, and Standalone Mode
      • Cybercriminals Use NFC Relay to Turn Stolen Credit Cards into Cash without a PIN
    • M5StickC
      • M5StickC Plus 2 running Nemo firmware: WiFi evil portal attacks
    • TicWatch Pro
      • How to install NetHunter on TicWatch Pro
      • TicWatch Pro: Returning to Factory Firmware
      • Install NetHunter on TicWatch Pro after flashing factory firmware
      • TicWatch Pro as a Keystroke Injector
      • How to install Kali NetHunter on TicWatch Pro 3
    • Vulnerabilites
      • Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability
      • WhatsApp trick: Android malware can impersonate PDF file
    • Malware
      • WhatsApp trick: Android malware can impersonate PDF file
      • Locate smartphones using Advertising ID without spyware or exploit
      • Smartphone scareware: cracked screen as a result of virus
    • Cheap Yellow Display
      • Exploring Marauder, Bruce, and Ghost ESP on Cheap Yellow Display
      • Run Firmware Anywhere: Flexibility of M5Stick Launcher
    • Get persistent reverse shell from Android app without visible permissions to make device unusable
    • Detect Wi-Fi deauthentication attack using ESP8266 and receive notification on smartphone
    • Automated local DNS cache poisoning using Android while charging via computer
    • How charging your phone can compromise your data using Juice Jacking attack
    • Monitoring Android file system with fsmon
    • USB Army Knife: The Ultimate Close Access Penetest Tool
  • About me

Tag: Kali services

NetHunter Hacker IV: Introduction to NetHunter system

NetHunter Hacker IV: Introduction to NetHunter system

mhJuly 27, 2023July 27, 20231 Comment
In previous posts we went through installation of NetHunter on almost any non-rooted and supported rooted Android device. If your...
Read More

Archives

  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023

Categories

  • Bad USB
  • bettercap
  • Bluetooth
  • Cheap Yellow Display
  • Evil Crow RF
  • Flipper Zero
  • M5StickC
  • Malware
  • NetHunter Hacker
  • Privacy
  • Radio Frequency
  • Raspberry Pi
  • RFID
  • Scareware
  • SDR
  • Termux
  • TicWatch
  • Uncategorized
  • Vulnerability
  • Wi-Fi

Social Media

Facebook
Twitter
YouTube
Instagram
Tiktok
Mobile Hacker
mobile-hacker.com
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}