Ben_salam

How to hack someone’s phone

Apr 3rd, 2021 (edited)
526
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 6.06 KB | None | 0 0
  1. Hacking someone’s phone without touching it. Does it happen in real life or it is just a myth that we see in the movies? NO, it is not a myth. It is very much possible to hack someone’s phone without touching it. Here we will discuss ‘How to hack someone’s phone’.
  2.  
  3. But remember real-life hacking does not happen the way see in the movie. In movies we see a person hacking a satellite with a mobile phone and he takes only 1 minute to do so. But in real life hacking is a much more complicated job.
  4.  
  5. How to hack someone’s phone?
  6.  
  7.  
  8. Here are some ways hackers use to hack someone’s phone.
  9.  
  10.  
  11.  
  12. 👉1. Midnight Raid
  13.  
  14.  
  15. This is a popular and easy method to complete the hacking. This method does not any spyware installation. You will need regular hacking tools for this method, a laptop with WiFi connectivity, and two cellphones.
  16.  
  17.  
  18.  
  19. The method suits the name as the attack is usually pulled off at night when the victim is asleep or the phone is left unattended.
  20.  
  21.  
  22.  
  23. The attack starts with a text message. Hacker sends a text message to the victim’s phone. The message invokes the Internet Explorer on the target device when it receives the text message.
  24.  
  25.  
  26.  
  27. Then an application is run on the victim’s phone to grab the data. The SMS returns to the hacker’s phone but this time int comes with the phone’s unique ID, its IMSI number. The hacker can steal any information from the mobile using this technique. If required hacker can push a virus too.
  28.  
  29.  
  30.  
  31. This method is suited for professional hackers only.
  32.  
  33.  
  34.  
  35. Scarry news? Let’s find the next technique
  36.  
  37.  
  38.  
  39. 👉2. How to hack someone’s phone with a spam message?
  40.  
  41.  
  42. This is a ‘black hat’ technique to access the google account of the target. People tend to do everything online using their google account.
  43.  
  44. People use their google account for accessing social media, bank accounts, online shopping everything.  So, if you can access their google account you have access to their every online activity.
  45.  
  46. You have to fool the target to initiate this method. Here is how it is done:
  47.  
  48. The first thing you have to do the Google log in page and type the phone number you want to hack and hit forgot password
  49. The user will get a verification code
  50. The tricky part is to get your hand on the verification code. If you do not have physical access to the phone you will have to use a spam message trick
  51. Send a message to the victim’s phone like this, “This is Google and we are finding somebody is trying to hack your email. Please reply with the verification code we just send to protect your account”
  52. Wait some time to check if you have been successful in fooling the target. If you have the target will reply to you with the code Google just sent
  53. After receiving the code change the password
  54. Now you can check all of the victim’s online activity
  55. Beware of spam messages. NEVER reply or tell anybody the verification code from any service. The verification code is like a password. Nobody asks for your password, right?
  56.  
  57.  
  58.  
  59.  
  60.  
  61. 👉3.Hack someone’s phone with a keylogger app
  62.  
  63.  
  64. Keylogger is a kind of spyware app that records all the activity going on the phone. A keylogger app records all the keyboard strokes from the victim before the strokes get encrypted.
  65.  
  66.  
  67.  
  68. After installing the keylogger app will record all the information from the other app. Apps on our phone has all the information, right? They know our login credentials, they can access our media, they know our browsing history.
  69.  
  70.  
  71.  
  72. What the keylogger app does is record all the activities of other apps and sends the data to the hacker. To install this app the hacker will need physical access to your phone or you have to download the keylogger yourself. Remember, hackers, know many tricks to convince you to download bait apps.
  73.  
  74.  
  75.  
  76. ⚠️So, DO NOT install an app without being sure.
  77.  
  78.  
  79.  
  80. 👉4.Control message attack to hack someone’s phone
  81.  
  82.  
  83. This attack involves sending a control message to the victim’s phone. After sending the control message hacker gets access to the setting menu of the phone. Here hackers will only be able to hack the settings of the phone without any concern for the victim. If the hacker has access to the setting the device becomes vulnerable to other kinds of hacks.
  84.  
  85.  
  86.  
  87. The problem with this kind of hacking is that it depends on the security of the device. So, before starting the proceeding the hacker must know the kind of smartphone he or she is trying to hack.
  88.  
  89.  
  90.  
  91. 👉5. Use the phishing technique to hack someone’s phone
  92.  
  93.  
  94. People are becoming smarter these days and they do not install anonymous apps on their smartphones. But with phishing techniques, you can fool even a smarter guy.
  95.  
  96.  
  97.  
  98. In this method, the hacker lures the target with fake versions of legitimate sites to extract credentials. Phishing websites are becoming more sophisticated and seem just like the original sites.
  99.  
  100.  
  101.  
  102. If the hacker can fool a target to give his credentials to a fake site then accessing their phone will be a piece of cake.
  103.  
  104.  
  105.  
  106. ⚠️Be careful and check the URL before giving your credentials!
  107.  
  108.  
  109.  
  110. 👉6.How to hack someone’s phone using free WiFi
  111.  
  112.  
  113. People like free WiFi. Anybody can set up a free WiFi hotspot and whoever operates the network can access can easily see the unencrypted traffic that goes through it. Although free WiFi is set by a legit company anybody can set this without any legal problem. Let’s know the process.
  114.  
  115.  
  116.  
  117. First, follow the target for some time. Set up free WiFi at the place they visit frequently. It can be a café, hotel, or any other public place. After the target connects his or her device to your network you can hack into the phone.
  118.  
  119.  
  120.  
  121. As a result, You will get all the unencrypted data of the victim’s cellphone.
  122.  
  123.  
  124.  
  125. Conclusion
  126. There are no standard ways to hack someone’s phone. The hacking depends on the model, security, O/S, and many other things. And, keep in mind that if the target knows about the hacking then that is not a successful hack.
  127.  
  128. #thanks
  129. Share with your friends
Add Comment
Please, Sign In to add comment