Jump to content

Search the Community

Showing results for tags 'phone'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 17 results

  1. Hey everyone, I am new, but i have a general android question and i am looking for pointers. You can run Kali, Debian and some other Distros in a chroot or proot in Android devices. My question is could i do it the otherway around? Like have /e/ running as Main system and run Android in a chroot. Or have it handled in some manner so that i could have a contained googlefied Android and a more anonymous Main system?
  2. Anyone know how to clone a phone number?
  3. This is my first post, but I've had some trouble finding much searching myself, so i thought i'd maybe give it a shot here. I have been trying to find an android phone, thats cheap, yet stable enough to use with WIFI pineapple nano and as a display device for RPI 3, as well as powering a nodemcu. Now finding a cheap android smart phone, is as easy as walking into any gas station. The issue at hand is the stabilty of these devices. Sometimes they work well for a few weeks, and sometimes i have issues right off the get go. I've had a phone that continued to crash during setup, I never got pa
  4. I recently read an article about an employee who was detained in US customs and was asked to unlock his phone. The article specified that he was a US citizen. http://www.theverge.com/2017/2/12/14583124/nasa-sidd-bikkannavar-detained-cbp-phone-search-trump-travel-ban *Puts on paranoia hat* Now I run the possibility that homeland security/TSA/CIA/{Insert other federal agencies here} will attempt to gain easy access to rootkit my phone by simply demanding that I unlock my phone for them. I am sure agencies already have the capabilities of doing this in the US, but I can see the sam
  5. (01) i was curious if there was a product somewhere that was a rubber ducky like device that was disguised as a USB charger (the logic board could possibly be in the Brick or a modified charger cord) and worked as one as well with the addition of the rubber ducky features if not i think that would be a useful innovation for someone capable of creating such a device to take advantage of this would be used to get info off of a phone that was connected to the rubber ducky like device if there are any downsides to this idea please let me know as well as if there are any pros to this mental exercis
  6. How to make free internet calls ? (VoIP) from computer? Anybody knows that?
  7. Hey all, Pleas see http://thehackernews.com/2016/04/spy-phone-call-location.html "In BriefThe famous ‘60 Minutes’ television show shocked some viewers Sunday evening when a team of German hackers demonstrated how they hacked into an iPhone used by U.S. Congressman, then recorded his phone calls and tracked his movement through Los Angeles. Hackers leverage a security flaw in SS7 (Signalling System Seven) protocol that allows hackers to track phone locations, listen in on calls and text messages." My question is basically; how would this be possible? What methods/coding/programs would be u
  8. Hi all, Is there a way to load multiple payloads for different mobile phones on to one Rubber Ducky, and then get the payload to recognise the model of the phone it has been plugged in to and run the appropriate payload? Thank you, Haze
  9. Hi all, Apologies if this has been asked before, I'm new here and I had a good look around the forum but couldn't find anything related. When using the Rubby Ducky to run commands on a mobile phone, you have to of course use the equivilent of keyboard shortcuts, for example the shortcuts found here; http://www.pcworld.com/article/184656/android_keyboard_shortcuts.html Is there a website or resource available that lists the shortcuts for multiple phones, so regardless of which mobile phone I wanted to create a payload for, I could easily look up the shortcuts required to type up the payload?
  10. hello everyone, i was wonder about support regard security issues/exploits. so like most of you guys i also carry a "smartphone" (android in this case). what do you guys think the support on a "smartphone" should be? 2 years, 3 year, 5 years? and should it receive security updates even a year after the mentioned years? also i own a HTC One M7 (android) should in this case HTC (and or any other brand) make a security update for a phone regarding the fact that it is 3 years old because of the stagefright exploit? Thank in advance and sorry if the reading is wonky
  11. Hi guys, I plan to install a new in-house PBX, but I'm not secure in my knowledge, so I need some confirmation. I've done some research and I feel an IP PBX would be my primary choice. I run a small trade company that needs 12 telephones (including hardphones and mobile devices as well). We use them for both of internal and external communication. In addtition to the basic PBX features (as well as call routing, conference calling, voicemail, call queuing, etc.) I have some special requirements related to the new phone system: I have only one office, but my employees (especially t
  12. I prepared this payload for a kind of a social engineering test. It basically changes the idle text of the SIP phone to whatever you want. The payload may not work in the older firmware versions of 1140e. //idle text has a limit of 24 chars max. REM This payload changes the idle screen text REM of the Nortel/Avaya 1140E SIP phone DELAY 1000 ESC DELAY 150 CTRL F4 DELAY 150 CTRL F4 DELAY 150 CTRL F2 DELAY 200 STRING 1 DELAY 200 STRING 2 DELAY 200 BACKSPACE REPEAT 24 DELAY 300 REM Some delay between words. Phone isn't as fast as rubber ducky STRING You DELAY 100 STRING are DELAY 100 STRIN
  13. Hi ! I know that you can already find a small number of payloads on Github, but there are many more that have been created by the community. For example, we found none for Android on GitHub. And, I have experienced the difficulty to find exactly what I need ;) That's why I think it would be a good initiative to gather as much as possible payloads on this topic. If you have created an effective and fun on, or if you use regularly one made by another member, why not post it below to share it ? (select those who are not already on GitHub for the moment please) If you are interested, try to
  14. So I just watched this video, and its amazing. The idea of having a phone that does this is simply incredible, however, it seems it has some flaws on how it works. How would you just be able to put the charge port in another place? With WLAN and Bluetooth modules, this could be possible because the OS (Android ftw) could detect a new device on the bus and deploy the correct kernel mod, Put CPU and Power, wat? Please share your thoughts on this :D PhoneBloks
  15. So, here is the scenario: after receiving a contract to pen test a network, I often start on the outsides. Find their wifi and try to crack it. I think that is more impressive a pentester who don´t have to enter physically the company, so this is my first try. After getting the keys using backtrack / pineapple / etc I want to use my phone to show to the company how insecure is to use protocols like pop3, imap, and some sites like facebook and other sites suscetible to cookies hijack. My choosen tool is droidsheep, that runs on my Galaxy S3. but I need to improve its signal. So here is the qu
  16. I know this is a long shot (since it's 2012), but we don't have any Phone Phreaks in the house, do we? There's an older guy I have known for a couple of years from a Commodore club -- a real old school phone phreak. I respect the heck out of him and we normally get along really well, but we're having a little friendly disagreement right now, which has given way to him phone phreaking me a bit. He somehow made my calls forward to an adult bookstore and their calls forward to me. It's in good fun, but obviously I want to hit him back. I have read old proto-hacker stories about phone phreaking,
  17. I know this is basic, but I'm drawing a blank, please help me out. When I call a cell phone from VOIP and hold the cell near the comp there's some sort of feedback noise that occurs in a frequent rhythm (the noise comes and goes every second or so). Is this an example of some kind of recursive process / feedback loop? By the way, I was using Skype for this experiment but I kind of hate Skype. I once had a VPS with Cent OS + PBX as an option for the OS and that made me wonder if I can just run my own VOIP service somehow so that I can make calls and maybe even have an associated phone number w
×
×
  • Create New...