10 Methods of Phone Hacking

Discussion in 'Misc Hacking Hardware' started by Mr. Penguin, 11 Dec 2012.

  1. Mr. Penguin

    Mr. Penguin Administrator
    Staff Member VIP Admin

    Joined:
    18 May 2012
    Messages:
    3,093
    Likes Received:
    1,268
    Watch this video on YouTube.

    Caller ID Spoofing
    A system which masks the caller from its recipient by displaying a different phone number on the caller ID. Similar to e-mail spoofing which uses different e-mail address as a mask.

    Location Eavesdropping
    Commonly used in social medias like Facebook and Foursquare which allows location check-ins. Hackers may target checked in locations and eavesdrop the conversations. In a worst case scenario, a hacker may work with burglars after confirmation that the target is not home and the house is vacant.

    SMS Spoofing
    New hacking technology to mobile technology which allows the sender to replace his/her mobile number with alphanumeric text. SMS spoofing have legitimate uses but can cause great damage to the recipient.
    a. The recipient of the SMS spoofing my incur termination charges as if received from a foreign network
    b. The SMS spoofing may use a real subscriber's number incurring sending charges as if they were in a foreign country
    c. Recipients may complain about spamming and possibly deflects sending of messages unless repaired

    Malicious Software
    Still being used by hackers as a technique to break security and cause multiple illegal functions such as intercepting calls or sending information (SMS, emails and passwords) and then transmitting it to another device. Having security software installed increases protection to user's private information stored in the smartphone.

    Identity Stealing
    Apps are very popular in smartphones and users may have tens to thousands of this installed. Fake apps give hackers the opportunity to access and steal all sorts of information about the phone, messages and data. Security programs are highly encouraged to prevent malwares and apps but should only be downloaded from trusted sources.

    Pretexting or Blagging
    Act of creating invented scenario such impersonation to engage targeted victim to divulge information or perform actions unlikely to happen in ordinary circumstances. Data that can be divulged includes addresses, phone bills, bank statements and health records.

    Wireless Hijack
    Wireless devices are great ways for transferring data files and can also be used for hacking. Wi-Fi and Bluetooth are vulnerable to hacking which can expose personal information of the target.

    Cloning
    Phone cloning allows hackers to receive calls and messages of the original device once turned-off. It requires special kits and techniques; it is not easy but can be done.

    FlexiSpy and Phone Tapping
    Normally, landlines are hacked by physical connection through terminal boxes and cables. However, more modern methods use a software called FlexiSpy to eavesdrop messages and voice calls to a Web site which allows access to stored data. Although banned in some networks, it has been used by parents to monitor their kids' calls.

    Mobile Phone Tap
    Various software allow remote listening to all phone conversations which are picked up through broadcast signals. Hackers may find these software difficult to obtain but it definitely exist.

    Mobile Phone Pinging
    Pinging a cell phone traces what cell tower the device is in. It is used by an agency by triangulating the approximate location of the mobile phone. It is not open for public use but hackers can tap into it and GPS makes it more dangerous for it can be used to trace a mobile phone even the device is turned off.

    Original Source ibtimes: http://au.ibtimes.com/articles/4104...ds-cyber-hacking-smartphones.htm#.UMc6Q4PqkiE
     
    • Like Like x 1
  2. jem

    jem Member

    Joined:
    7 Sep 2012
    Messages:
    14
    Likes Received:
    0
    is there a download kink ??
     
  3. oleshka

    oleshka Member

    Joined:
    11 Feb 2013
    Messages:
    1
    Likes Received:
    0
    totally useless post!
     
  4. rempit

    rempit Well-Known Member
    VIP

    Joined:
    4 Jun 2012
    Messages:
    237
    Likes Received:
    51
    FREE CALLS around the world for everyone, oh yes ! :)
     
  5. STeVeN PauL JoBS

    Joined:
    20 Feb 2013
    Messages:
    1
    Likes Received:
    0
  6. drandyjh

    drandyjh New Member

    Joined:
    7 Apr 2014
    Messages:
    16
    Likes Received:
    1
  7. William Dsouza

    Joined:
    6 Jul 2018
    Messages:
    1
    Likes Received:
    0
    Yes, Those are some of the ways to hack devices, These days People are using cocospy to intercept the text messages(SMS). people these days want to know what their children are watching and with whom they are contacting or in touch. so these type of apps is useful too.
     
    #7 William Dsouza, 7 Jul 2018
    Last edited: 7 Jul 2018
  8. Chris James

    Chris James Member

    Joined:
    3 Dec 2020
    Messages:
    1
    Likes Received:
    0
    • ClickJacking Attacks.
    • Virus, Trojan, etc. ...
    • Phishing. ...
    • Eavesdropping (Passive Attacks) ...
    • Fake WAP. ...
    • Waterhole attacks. ...
    • Denial of Service (DoS\DDoS) ...
    • Keylogger. A keylogger is a simple software that records the key sequence and strokes of your keyboard into a log file on your machine. ...
     

Share This Page

Loading...