10 Methods of Phone Hacking

Discussion in 'Misc Hacking Hardware' started by Mr. Penguin, 11 Dec 2012.

  1. Mr. Penguin

    Mr. Penguin Administrator
    Staff Member VIP Admin

    18 May 2012
    Likes Received:
    Watch this video on YouTube.

    Caller ID Spoofing
    A system which masks the caller from its recipient by displaying a different phone number on the caller ID. Similar to e-mail spoofing which uses different e-mail address as a mask.

    Location Eavesdropping
    Commonly used in social medias like Login or Signup to view links / downloads and Foursquare which allows location check-ins. Hackers may target checked in locations and eavesdrop the conversations. In a worst case scenario, a hacker may work with burglars after confirmation that the target is not home and the house is vacant.

    SMS Spoofing
    New hacking technology to mobile technology which allows the sender to replace his/her mobile number with alphanumeric text. SMS spoofing have legitimate uses but can cause great damage to the recipient.
    a. The recipient of the SMS spoofing my incur termination charges as if received from a foreign network
    b. The SMS spoofing may use a real subscriber's number incurring sending charges as if they were in a foreign country
    c. Recipients may complain about spamming and possibly deflects sending of messages unless repaired

    Malicious Software
    Still being used by hackers as a technique to break security and cause multiple illegal functions such as intercepting calls or sending information (SMS, emails and passwords) and then transmitting it to another device. Having security software installed increases protection to user's private information stored in the smartphone.

    Identity Stealing
    Apps are very popular in smartphones and users may have tens to thousands of this installed. Fake apps give hackers the opportunity to access and steal all sorts of information about the phone, messages and data. Security programs are highly encouraged to prevent malwares and apps but should only be downloaded from trusted sources.

    Pretexting or Blagging
    Act of creating invented scenario such impersonation to engage targeted victim to divulge information or perform actions unlikely to happen in ordinary circumstances. Data that can be divulged includes addresses, phone bills, bank statements and health records.

    Wireless Hijack
    Wireless devices are great ways for transferring data files and can also be used for hacking. Wi-Fi and Bluetooth are vulnerable to hacking which can expose personal information of the target.

    Phone cloning allows hackers to receive calls and messages of the original device once turned-off. It requires special kits and techniques; it is not easy but can be done.

    FlexiSpy and Phone Tapping
    Normally, landlines are hacked by physical connection through terminal boxes and cables. However, more modern methods use a software called FlexiSpy to eavesdrop messages and voice calls to a Web site which allows access to stored data. Although banned in some networks, it has been used by parents to monitor their kids' calls.

    Mobile Phone Tap
    Various software allow remote listening to all phone conversations which are picked up through broadcast signals. Hackers may find these software difficult to obtain but it definitely exist.

    Mobile Phone Pinging
    Pinging a cell phone traces what cell tower the device is in. It is used by an agency by triangulating the approximate location of the mobile phone. It is not open for public use but hackers can tap into it and GPS makes it more dangerous for it can be used to trace a mobile phone even the device is turned off.

    Original Source ibtimes: Login or Signup to view links / downloads
    • Like Like x 1
  2. jem

    jem Member

    7 Sep 2012
    Likes Received:
    is there a download kink ??
  3. oleshka

    oleshka Member

    11 Feb 2013
    Likes Received:
    totally useless post!
  4. rempit

    rempit Well-Known Member

    4 Jun 2012
    Likes Received:
    FREE CALLS around the world for everyone, oh yes ! :)
  5. STeVeN PauL JoBS

    20 Feb 2013
    Likes Received:
  6. drandyjh

    drandyjh New Member

    7 Apr 2014
    Likes Received:
  7. William Dsouza

    6 Jul 2018
    Likes Received:
    Yes, Those are some of the ways to hack devices, These days People are using Login or Signup to view links / downloadsto intercept the text messages(SMS). people these days want to know what their children are watching and with whom they are contacting or in touch. so these type of apps is useful too.
    #7 William Dsouza, 7 Jul 2018
    Last edited: 7 Jul 2018
  8. Chris James

    Chris James Member

    3 Dec 2020
    Likes Received:
    • ClickJacking Attacks.
    • Virus, Trojan, etc. ...
    • Phishing. ...
    • Eavesdropping (Passive Attacks) ...
    • Fake WAP. ...
    • Waterhole attacks. ...
    • Denial of Service (DoS\DDoS) ...
    • Keylogger. A keylogger is a simple software that records the key sequence and strokes of your keyboard into a log file on your machine. ...

Share This Page

  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.

    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K