Hacking into Android in 32 seconds | HID attack | Metasploit | PIN brute force PoC

Поделиться
HTML-код
  • Опубликовано: 15 окт 2020
  • Samsung S7 is connected to Pixel as HID device (keyboard) that tries to brute force lock screen PIN (PoC) and then download, install and launch Metasploit payload
    How to prevent such scenario
    1) Charge you smartphone using you own adapter when possible
    2) Don't use trivial PIN or password lock screen protection
    3) Use mobile security software that will detect Metasploit payload
    Tutorial & link to HID script: github.com/androidmalware/and...
  • НаукаНаука

Комментарии • 3,1 тыс.

  • @mobilehacker
    @mobilehacker  3 года назад +1214

    [Video is published] How to unlock PIN protected Android device using ADB or HID method
    ruclips.net/video/x5Rt93jshC8/видео.html

    • @basheerhassan1576
      @basheerhassan1576 3 года назад +9

      What are the right orders for the tool

    • @abhishekbhai7632
      @abhishekbhai7632 3 года назад +4

      Chanel name

    • @nezunish-898
      @nezunish-898 3 года назад +11

      Ah ADB , frequently heard when I used it to unlock bootloader ( known process to download custom ROM or root ) . Didn't know you can do this

    • @hbadekhanavar4223
      @hbadekhanavar4223 3 года назад +3

      Send me RUclips link

    • @atharbombaywala
      @atharbombaywala 3 года назад +5

      Bro hacking sikhaav pls bro it's request bro pls bro

  • @joeJVT
    @joeJVT 3 года назад +8089

    Exactly what one could expect when the pin code is 1111

  • @ajaygocher4685
    @ajaygocher4685 2 года назад +1870

    That's what you feel when you learn "HTML" for first time

    • @cookedpotato
      @cookedpotato 2 года назад +11

      Lmfao

    • @cookedpotato
      @cookedpotato 2 года назад +82

      More like when you run
      print ("hello world")

    • @jem7665
      @jem7665 2 года назад +22

      so you havent seen
      var me = "bad ass";
      XD

    • @kiring1085
      @kiring1085 2 года назад +4

      Home is for website creatin...

    • @vassili7572
      @vassili7572 2 года назад +8

      @@jem7665 alert("i am a " +me);

  • @dev_insights783
    @dev_insights783 Год назад +318

    Pov: You haven't enabled USB debugging 😂

    • @uh-nx5rr
      @uh-nx5rr 10 месяцев назад

      😂😂

    • @DmitriNesterov
      @DmitriNesterov 9 месяцев назад +20

      No need. You are emulating HID. Keyboard at the moment

    • @SamsonBoss-lj6qf
      @SamsonBoss-lj6qf 7 месяцев назад

      Hi

    • @user-gb2qn6mq9p
      @user-gb2qn6mq9p Месяц назад +3

      ​@@DmitriNesterovso please correct me if im wrong. the victim phone sees the otg connector and the attacker phone just as A keyword 😮. so you don't need the usb debug promotion anyway. that is brilliant and scary actually 😮😂

    • @DmitriNesterov
      @DmitriNesterov 29 дней назад +4

      @@user-gb2qn6mq9p nobody knows how many wrong attempts are allowed.

  • @prich0382
    @prich0382 2 года назад +431

    So it bruit forced a password which in reality is slow af as there is a lock out screen after too many attempts that gets long and longer everytime you fail

    • @ashishkulkarnii
      @ashishkulkarnii 2 года назад +51

      Not in Android, it's only 30s every 5 incorrect attempts, but yeah brute force would be terribly inefficient.

    • @Elsass68Powaa
      @Elsass68Powaa 2 года назад +38

      @@ashishkulkarnii it's longer Everytime on Android, the maximum is 30 minutes

    • @lsupreme
      @lsupreme 2 года назад +7

      @@Elsass68Powaa mine just makes it to 30 seconds hmmmmmm

    • @gtnikolasch400
      @gtnikolasch400 2 года назад +3

      How it looked like he used hydra

    • @funkepop
      @funkepop 2 года назад +14

      Some brute force tactics use something that it will bypass time limit

  • @manishholla
    @manishholla 3 года назад +3843

    For this attack, USB debugging should be enabled and normies generally don't do that.

    • @AmeerulZ99
      @AmeerulZ99 3 года назад +567

      glad someone knows

    • @bablibunty9766
      @bablibunty9766 3 года назад +161

      You knew it already😅

    • @manishholla
      @manishholla 3 года назад +25

      @@AmeerulZ99 😃

    • @sobhaks7231
      @sobhaks7231 3 года назад +250

      the connected device act as a keyboard which does not require usb debugging. any otg enabled device can be vulnerable i may be wrong

    • @manishholla
      @manishholla 3 года назад +166

      @@sobhaks7231 but as shown in video it didn't use the digitiser. So the device knows that the input isn't from any human touch. That means if the device is to be unlocked the way it's shown here, usb debugging must be enabled...
      But you may be right and I may be wrong.🙂

  • @bravo________87372
    @bravo________87372 3 года назад +2103

    Ya imagine brute forcing a pin when it locks you out every 5 trys

    • @zinxlo
      @zinxlo 3 года назад +35

      Ikr😂

    • @raymonddeaniii6837
      @raymonddeaniii6837 3 года назад +27

      This is a valid prevention method tho

    • @mobilehacker
      @mobilehacker  3 года назад +308

      this is a prove of concept, unlocking device without exploit is difficult and long lasting process....however, for unlocking I would advice to use the most used PINs (there is a list) or use custom PIN list with lucky number, dates, birthday, years etc. of user

    • @Penutupan
      @Penutupan 3 года назад +2

      @X ?

    • @prakashreddy773
      @prakashreddy773 3 года назад +1

      May be we should start(the process again ) from the beginning.....😜

  • @zexwareoldaccount
    @zexwareoldaccount Год назад +86

    1. This won't work if USB Debugging is disabled on target device - which is by default and normal people don't enable it either.
    2. Multiple failed pin attempts block the device lock for 30 seconds, now unless your second attempt is the phone's original pin, this won't work.
    3. Even if USB Debugging is enabled, the android's authorization dialog wont be shown unless the device is unlocked, in which you case, you can't access device from adb.

    • @sees747
      @sees747 Год назад +5

      There are multiple bypasses for that its a fucking android

    • @someDumb
      @someDumb Год назад

      ​@@sees747no

    • @someDumb
      @someDumb Год назад +1

      @@thusisibonelo641 how i searched everywhere how can this work?

    • @project77977
      @project77977 Год назад

      ​@Thusi Sibonelo 🤓 stop lying

    • @user-zs8eg4mu8t
      @user-zs8eg4mu8t Год назад +1

      This is a USB HID attack, not ADB

  • @femaleleader1693
    @femaleleader1693 2 года назад +274

    Working with you is an honor, working without you is an absolute horror. Working under you is a pleasure, an experience that I will truly treasure. Thanks, for getting my disabled account back

    • @femaleleader1693
      @femaleleader1693 2 года назад

      Really thankful I found you and your content. I feel like you are talking to men and women in a way that humanity has missed for a very long time... I feel that so many human beings are so flawed in their understanding because of so much trauma and confusion and even instructors on the matters around relationship are for a great part not so clean even with the best of intentions, Thank you so much for your video. I was in bed crying trying to figure out a solution to a losing situation and your video just popped up and clarified everything Thank you for your guidance THESPACEHACKERS🧿COM I've been praying for direction and you have helped me see things more clearly!!..

    • @femaleleader1693
      @femaleleader1693 2 года назад

      Really thankful I found you and your content. I feel like you are talking to men and women in a way that humanity has missed for a very long time... I feel that so many human beings are so flawed in their understanding because of so much trauma and confusion and even instructors on the matters around relationship are for a great part not so clean even with the best of intentions, Thank you so much for your video. I was in bed crying trying to figure out a solution to a losing situation and your video just popped up and clarified everything Thank you for your guidance THESPACEHACKERS🧿COM I've been praying for direction and you have helped me see things more clearly!!..

    • @femaleleader1693
      @femaleleader1693 2 года назад

      Really thankful I found you and your content. I feel like you are talking to men and women in a way that humanity has missed for a very long time... I feel that so many human beings are so flawed in their understanding because of so much trauma and confusion and even instructors on the matters around relationship are for a great part not so clean even with the best of intentions, Thank you so much for your video. I was in bed crying trying to figure out a solution to a losing situation and your video just popped up and clarified everything Thank you for your guidance THESPACEHACKERS🧿COM I've been praying for direction and you have helped me see things more clearly!!..

    • @LegendaryITA
      @LegendaryITA 2 года назад +21

      @@femaleleader1693 Bot comments be like

    • @yo-ir8xw
      @yo-ir8xw 2 года назад +3

      @@LegendaryITA lol lmfaoo

  • @TheMorpheusbn
    @TheMorpheusbn 3 года назад +1047

    An attack like this is not possible on recent devices. After ten unsuccessful attempts the attack is once every thirty seconds. On some devices there is a risk of erasing the data.

    • @gopronomad4381
      @gopronomad4381 3 года назад +59

      Exactly my thought

    • @msc4308
      @msc4308 3 года назад +60

      Everyone is a gansta untill this man tries to hack in iphone.

    • @deniz1967
      @deniz1967 3 года назад +130

      @@msc4308 Or any phone released in the past couple of years.

    • @rawblander8442
      @rawblander8442 3 года назад +4

      It's possible bro I have tried

    • @hyperfluff_folf
      @hyperfluff_folf 3 года назад +18

      This attack is actually possible considering the usual reuse off passwords
      Its not a one size fits all attack but it may be successful on some victims

  • @Nonobsolete
    @Nonobsolete 3 года назад +559

    Imagine planting a backdoor and have access by accessing it one time

    • @0cramoi
      @0cramoi 3 года назад +31

      If a vulnerability requires physical access, it's already exploiting a vulnerability

    • @GarviHere
      @GarviHere 3 года назад +5

      Having access by accessing hah

    • @solcan4235
      @solcan4235 3 года назад +2

      Imagine understanding this- tf how do you guys know? From where)))

    • @microjigging
      @microjigging 3 года назад +7

      @@solcan4235 you learn fundamentals from cyber security education. I think most popular is using Kali Linux and using metasploit to get into older OS PC's. I remember using NSAs eternal blue in class.

    • @andreaskase1391
      @andreaskase1391 3 года назад +2

      @@microjigging Oh good old Eternalblue, works like a charm

  • @abrazbashar
    @abrazbashar Год назад +43

    My friend watching me as I attempt this on his phone 👁👄👁

    • @StephenOwoyemi
      @StephenOwoyemi 10 месяцев назад

      What's cord his this 😮😮

  • @er12c89
    @er12c89 3 года назад +705

    can you make video how to erase TikTok from INTERNET ??? i will be happy if you do :D have a nice day

    • @hirushanrandima4053
      @hirushanrandima4053 3 года назад +50

      🤣🤣🤣highly recommended

    • @usmanbadshah411
      @usmanbadshah411 3 года назад +17

      🤣🤣🤣🤣

    • @sc2692
      @sc2692 3 года назад +30

      golden idea

    • @hmmhmm5431
      @hmmhmm5431 3 года назад +23

      The idea that should be implemented now .....

    • @taqiuddinwahab5912
      @taqiuddinwahab5912 3 года назад +19

      Yeah please do it!! You will achieve biggest reward ever from the people like us!!

  • @ctnflameing
    @ctnflameing 3 года назад +591

    Imagine putting a video in the phone and he rickrolled us 😂

    • @tomtituswinter
      @tomtituswinter 3 года назад +10

      😂true bro

    • @mobilehacker
      @mobilehacker  3 года назад +80

      unfortunately not, this is actually an old technique to inject keyboard to connected device

    • @andrejscepanovic1347
      @andrejscepanovic1347 3 года назад +5

      @@mobilehacker make something that rick roll us

    • @mobilehacker
      @mobilehacker  3 года назад +8

      @@andrejscepanovic1347 what would rock 'n roll you?

    • @andrejscepanovic1347
      @andrejscepanovic1347 3 года назад +2

      :|
      Hmmmmmmmmmmmm

  • @Vivianite02
    @Vivianite02 2 года назад +9

    This was on Android 7.1... We're on Android 12 now, coming on 13 in a few months. As fancy as this is, people with a recent phone shouldn't have anything to worry about

    • @Gagaboubou
      @Gagaboubou 2 года назад

      If the bruteforce attack was realistic, it would still be possible, hes probably using adb

  • @Dowesk
    @Dowesk 4 месяца назад +1

    Perfect, in one word, perfect, amazing. I congratulate you.

  • @Jobsmines
    @Jobsmines 3 года назад +293

    Moral of the story: if you plan on getting thrown in the back of a cop car, *DONT BRING YOUR PHONE*

    • @khappekhappe133
      @khappekhappe133 3 года назад +15

      Buy an iphone

    • @TheoParis
      @TheoParis 3 года назад +4

      @@khappekhappe133 bruh😂

    • @Matt-xx7dy
      @Matt-xx7dy 3 года назад +8

      Just bring an old Nokia

    • @deejbop264
      @deejbop264 3 года назад +10

      @@khappekhappe133 iPhone are the easiest u remebr when fbi had hacked into one?

    • @deejbop264
      @deejbop264 3 года назад +5

      @@Matt-xx7dy or a old slide up samsung that had a keyboard that dnt used android

  • @genzdevslog
    @genzdevslog Год назад +2

    I want to see you hack a pattern protected android 🤩🤩

    • @Zee_hacks
      @Zee_hacks Год назад +1

      Contact me on WhatsApp for quick help ❤

  • @SheikhAmeen
    @SheikhAmeen 2 года назад +146

    I bet the first few pins were intentionally wrong and before getting locked for a few seconds, the correct pin was given. Would've been much real if the attacker didn't know the pin already. Anyway, nice one to trick our friends..

    • @berkeguzel5979
      @berkeguzel5979 2 года назад +5

      you don't need to bet, if you slow down the video the pin is literally 1111 :D

    • @unpopularopinions6974
      @unpopularopinions6974 2 года назад

      to brute force a 4 digit pin is ez

    • @unpopularopinions6974
      @unpopularopinions6974 2 года назад

      @R R hashcat, john the ripper or any other brute force tool

    • @L_Lawliet1907
      @L_Lawliet1907 2 года назад

      @@unpopularopinions6974 works only when there’s no time limit that exponentially get longer each failed attempt

  • @clydealcott3379
    @clydealcott3379 3 года назад +142

    I think This is practically impossible cuz, the device(victim) will delay the time you'll make your next attempt when the device (attacker) generate a wrong code. Uless you throw a right key code in the script (1st to 6th attempt) you want be able to unlock the device.

    • @chiragparmar26000
      @chiragparmar26000 3 года назад +10

      He won't be able to go for 6th attempt.
      Beause on the 6th attempt, phone will reset automatically.
      The person who have set to reset it the mobile after 5th attempts.

    • @mobilehacker
      @mobilehacker  3 года назад +12

      unlocking device without exploit is difficult and long lasting process....but, if you forget your pin and you want to access your data, there is no other method

    • @littleregrets8810
      @littleregrets8810 3 года назад +21

      @@mobilehacker stfu.

    • @diegodouglas7972
      @diegodouglas7972 3 года назад

      Hackerdone22 on IG get it done for me

    • @mnahimsh1
      @mnahimsh1 2 года назад

      @@mobilehacker it can be unlocked with miracle box etc
      Need some knowledge about chip level repairing

  • @artman3
    @artman3 2 года назад +6

    One of the reasons I don't use "PIN" 😅

  • @aymiabuelayt
    @aymiabuelayt 2 месяца назад +1

    When the FBI hacks you:

  • @nottsoserious
    @nottsoserious 3 года назад +46

    Funniest shit I've ever seen. Normal phone will lock you out in 5 tries, and plus the pin was 1111 😂

    • @dan_6915
      @dan_6915 2 года назад

      It there is an actual legit unlock software, i dont think it would matter if the combination is 1111 or other numbers

    • @killertigergaming7395
      @killertigergaming7395 2 года назад

      @@romanmrozek dude admit you don’t know wtf your talking about lmao you sound like a ten year old

  • @noone6437
    @noone6437 3 года назад +12

    The "connectors" makes it like the scene I've seen in movies 😯....

  • @kavanjadeja9460
    @kavanjadeja9460 2 года назад +3

    no words for this ☺

  • @noelangela2553
    @noelangela2553 2 года назад +95

    Dan and I met in a way even romantic comedy writers would roll their eyes at (you can read more about it here). In 2013, I was studying abroad in England for a year, and he was a British student at the same university. We met through mutual friends at a Halloween party and started dating after that. That eight month time span was the only time we’ve lived in the same town, during our almost seven year relationship! Since then, we’ve been in a long distance relationship. I’m not going to lie, it was rocky at the start, and we actually broke up for a few months. A 5 hour time difference is tough for anyone, and at 20 years old, that was a huge commitment. We weren’t very good at being broken up, though, and after only a few months we got back “together” - even though we were 4,000 miles apart. In 2015 I moved back to England, where I lived for the next three years, but we were still long distance. With an hour’s drive between us, though, that didn’t seem bad at all. Due to visa, health, and career reasons, I decided to move back to the USA in 2018. It’s been a lot easier doing the 4,000 mile distance now that we are older and more experienced at this whole crazy thing! Moreover I was able to track his phone activities using EAGLESPY.NET Totally untraceable, cheap and anonymous. Let him know I referred you

  • @gauravdabholkar7631
    @gauravdabholkar7631 3 года назад +35

    Me trying random things after learning python for one semester!

    • @cobra20g
      @cobra20g Год назад

      Lol same. Only thing I learned in the whole class??? Build a super simple fork bomb. No clue to code "hello world"

    • @AAA-ej2jz
      @AAA-ej2jz Месяц назад

      😂
      😢

  • @realcartoongirl
    @realcartoongirl 3 года назад +5

    this hack is absolute best case scenario. for those iphone users who thought androids are this easily hacked are stupid.
    1. the script already knows the password (or guessed the exact pin out of pure luck)
    2. the pin is only 4 digits which significantly decreases security regardless of software used
    3. this hack will not work for long and reliably as the device will have a cool down for 30 seconds and some phones will even erase the entire device if too many incorrect attempts
    4. not all android device allow otg from lock screen, or even have otg support.
    5. most phones you will have to unlock to allow usb access same for usb debugging.
    6. on newer android versions, the password entry field for unlocking the phone can not be entered by a non system app keyboard

  • @pawankumar-qz5vc
    @pawankumar-qz5vc 2 года назад +1

    Kitne tejsavi log hai hamare vich 👍👍👍🔥🔥

  • @DistroStudios
    @DistroStudios 2 года назад +18

    Prerequisites in victim's phone:
    -> Password should be known

    • @fabiandrinksmilk6205
      @fabiandrinksmilk6205 2 года назад

      Wait, can't you just disguise the attacker phone as an HID?

    • @jackjack3358
      @jackjack3358 2 года назад

      What do you mean password should be known? That's the entire point, he is doing brute-forcing. It's 1111 in example for demo purposes but many people use XXXX or XYXY pattern on their phones - or even worst, they use their card PIN number which is even more worrying.
      And you also don't need 2 and 3 on victim's phone. He is using HID ( Rubber Ducky ) not ADB. Check the source video.

    • @DistroStudios
      @DistroStudios 2 года назад

      @@jackjack3358 Do you know that you will need to wait a minute after first 5 attempts, and the time increases as it goes on? There's no chance you're gonna be able to brute force it... I was wrong about the ADB part though... Hence removed it from the comment now :p

    • @jackjack3358
      @jackjack3358 2 года назад

      @@DistroStudios He actually explains that exact situation in the main video, have a look at it. ruclips.net/video/x5Rt93jshC8/видео.html
      Technically you can hack it in 7 days at worst if password is 4 digit. Even faster if user isn't very "smart" and uses XXXX or XYXY pattern or common passwords.
      So your premise isn't correct, you don't need to know password to hack it. For 100% success, you should steal the phone though, since this cannot be done while person is in bathroom or something.

  • @fransmurdani83
    @fransmurdani83 3 года назад +28

    Yt : hacking phone in 32 sec
    Me : still cant root my device

  • @lexitech-1997
    @lexitech-1997 3 года назад +38

    Works perfectly when the screen is recorded

  • @Idkxd336
    @Idkxd336 3 месяца назад +2

    It's hard for me to believe that this would work in a controlled environment or within the realm of cybercrime, which naturally prompts questioning my opinion. Let me give you three examples:
    1. Nowadays, it's very rare for someone to leave their PIN active without a lockout timer.
    2. The tool you're using seems to be a script that first tries unsaved PINs before attempting the correct one, likely for unauthorized access.
    3. Who would leave their phone unattended in a vulnerable place?
    P.S. While I'm not an expert on the subject, I've worked on several projects related to it.

  • @tasn01
    @tasn01 2 года назад +6

    More like "Mobile Hacking Speedrun"

  • @muhammadnisarashraf8099
    @muhammadnisarashraf8099 3 года назад +45

    Definitely a known password is used here, if you try logging in wrobg credentials, android locks the system for some time

    • @bandanasaikia6048
      @bandanasaikia6048 3 года назад +1

      Time delay

    • @KINGKHAN-fj4tf
      @KINGKHAN-fj4tf 3 года назад

      But Original Hacker Does Not Need Victim`s Cell Phone..

    • @johnjacobvilla6017
      @johnjacobvilla6017 2 года назад +1

      @user Surely some people can. Even the government or the military can be breached/hacked, what makes you think a little cellphone can't?

    • @fotnite_
      @fotnite_ 2 года назад

      @user Not necessarily, hackers can get through with vulnerabilities of existing, legit apps. Normally through browser vulnerabilities. A while ago I remember an arbitrary code execution vulnerability in Firefox leading to a ton of people being hacked just by visiting a website.
      Safe would be browsing with TOR. Safer would be to use a VM. Safer still to boot from a live USB stick instead of your actual OS, preferably with TailsOS. If you're really paranoid, a burner device exclusively for running Tails on a USB stick, exclusively browsing with TOR, and then shredding the USB contents to reinstall Tails after each usage, would get you through the majority of possible vulnerabilities.

    • @fotnite_
      @fotnite_ 2 года назад +1

      @user What I'm saying is 100% fact. Of course, not downloading shit is the best way to avoid hackers, but if you don't understand that browser vulnerabilities exist, you need to read up on this topic.

  • @BigD99384
    @BigD99384 2 года назад +476

    Next video "Picking a lock within 30 seconds using some random keys(the original key is included)."
    And it will be a proof of concept.

    • @comedyclub333
      @comedyclub333 2 года назад +2

      Exactly haha

    • @tmack6416
      @tmack6416 Год назад

      Hahahah redditor?

    • @Sk-in4xj
      @Sk-in4xj Год назад

      Exactly, and that key is in 1st 5 try… otherwise it would lock for 5 minutes…🥴

    • @ForbiddenSigma
      @ForbiddenSigma Год назад

      Bro exactly 😂😂, this is useless

  • @TutorialesPabloFidel
    @TutorialesPabloFidel 2 года назад +1

    Fua brutal...😲 Oye no quieres un aprendia...😆👍

  • @rayforever
    @rayforever Год назад +2

    I did tried metasploit, I think we should consider making our own app to send us data and information cuz play service always detect it

  • @JeandrePetzer
    @JeandrePetzer 2 года назад +8

    Nice, now show one with the bruteforce prevention timeout implemented on all modern smartphones after 5 incorrect attempts

  • @abhishekpandat8174
    @abhishekpandat8174 2 года назад +33

    Just imagine if you use this brute force and you get 30 timer again and again 😂

    • @xFuaZe
      @xFuaZe 2 года назад

      To be honest, 30 seconds for each 5 attempt will still be able to unlock it in a few days, given that you try the most common ones first.
      First timer is 30 seconds, the next one 30 minutes, the next one 30 hours.
      Though then this device would be effective at locking a phone for 30 hours :P

    • @zynthesis
      @zynthesis 2 года назад +1

      @@xFuaZe My pin is 18 numeric characters. You aren't cracking that in a few days.

    • @Keystone8642
      @Keystone8642 2 года назад

      once my friend forgot her pin and kept trying everytime it unlocked (we had gone travelling so we coudnt even go to a service center or wherever you go to fix a device), eventually the lock out time became over 9hrs so she just turned off the phone and took it to to the place she bought the phone at once we came back. this all happened because we where trying to guess each others pins and we kept changing them everytime someone guesses. in the end she itself forgot the pin she put.

    • @Howlzz
      @Howlzz 2 года назад

      @@xFuaZe and u need usb debugging enabled

  • @amarboparai4159
    @amarboparai4159 Год назад +1

    That screenlock cracking was amazing.

  • @calok
    @calok 2 года назад +3

    3 - 4 mill views but only 2 comments?, yt is soo bugged.

  • @m4heshd
    @m4heshd 3 года назад +6

    Noobs watching this: 👁️ 👄 👁️

    • @cobra20g
      @cobra20g Год назад +2

      They don't even get why the computer is in the frame!

  • @mobilehacker
    @mobilehacker  3 года назад +409

    I created a tutorial how to use Android as Rubber Ducky from NetHunter. Feel free to check it out!
    ruclips.net/video/bYfict-752k/видео.html

  • @prajwalwaingankar3636
    @prajwalwaingankar3636 2 года назад +1

    That moment when you boot Kali and play around hacking the college server 😂 old memories

  • @jagatkrishna1543
    @jagatkrishna1543 Год назад +1

    Superb 💓

  • @linux2420
    @linux2420 3 года назад +19

    There are so many things done wrong for this trick, its not a vulnerability you literally enabled it in a "hidden" settings menu thats disabled by default.

  • @DauntlessDL
    @DauntlessDL 3 года назад +22

    Does the phone have a vulnerability that makes it not block for 5s after 5 wrong attempts + 5s after each next attempt? This only works so fast because you had the correct pin as the 5th pin in the list, right?

    • @mobilehacker
      @mobilehacker  3 года назад +16

      Yes, this is my device, so I already know the PIN :) This is a demo video, that show how can this be done. If the PIN had 6 or 8 digits, then this would take very long time to guess. However, if you have device already unlocked, then there is nothing that would stop you from infecting device.

    • @btrgaming9020
      @btrgaming9020 3 года назад

      Yes

    • @HackerboySoubhik
      @HackerboySoubhik 3 года назад

      @@mobilehacker sir can u make a full tutorial video on this....
      Sir it's my humble request

    • @mobilehacker
      @mobilehacker  3 года назад +1

      @@HackerboySoubhik I will post tutorial tomorrow

    • @tarcisiosurdi
      @tarcisiosurdi 3 года назад +1

      @@mobilehacker except from the fact that USB debugging would be disabled on the developer settings of a regular device

  • @eyuelzero
    @eyuelzero 3 года назад +4

    This is how they do it in hollywood movies

  • @anujrawat3626
    @anujrawat3626 3 года назад +5

    Camera Access with Metasploit that Live Stream one.. cuz it never worked for me..😅 Next Short

    • @cobra20g
      @cobra20g Год назад

      Static routing on ur router. That's usually the issue.

  • @-EhsanMalik-
    @-EhsanMalik- 2 года назад +1

    It's not like anyone will plug their phone into another person's phone when they don't even know that person

  • @ghostsso3832
    @ghostsso3832 2 года назад +2

    so nice >:))

  • @anonymous__340
    @anonymous__340 3 года назад +4

    Plz make tutorial
    Capitiv portal attack in Android

  • @realgaming810
    @realgaming810 3 года назад +16

    When you know the Interface of Both phone are Recorded and Playing Them Now 😂😂😂🤣😂

  • @ArjunSureshKumar-eg2yi
    @ArjunSureshKumar-eg2yi 10 месяцев назад

    Love it! This stuff is so easy to do you could do it even in android without root!

  • @shivanshupadhyay1015
    @shivanshupadhyay1015 2 года назад +2

    The thing is android phones gets locked for 30 seconds after 5 tries😂

  • @arishroyals5036
    @arishroyals5036 3 года назад +8

    You dont need to hack a mobile when it's already connected with data cable.

  • @JulioSavio
    @JulioSavio 3 года назад +11

    This is just for entertainment purposes.
    Nice vid tho!

  • @Chris-Weaver
    @Chris-Weaver 2 месяца назад

    Trinity approves! 😅🎬👩🏻‍💻🔌

  • @johnjohnathan6572
    @johnjohnathan6572 3 года назад +5

    15s play that in x2 😂

  • @SilentSpyder
    @SilentSpyder 3 года назад +12

    Make tutorial video of this process ..pls🥺🥺

    • @rossloretta923
      @rossloretta923 3 года назад +1

      Dm Holtlan_94 on lG. He’ll recommend the best place to get it

    • @fritzz1593
      @fritzz1593 3 года назад

      Bruh do you think he will gave you this script 🤣

    • @unlockingtheunique4136
      @unlockingtheunique4136 2 года назад

      @@fritzz1593 it is bot dude

  • @user-cz7rf7iz7k
    @user-cz7rf7iz7k 2 года назад

    Amazing man 😅 i like it .

  • @clifflyonz9923
    @clifflyonz9923 2 года назад +1

    U guy ur the best

  • @nixfatal
    @nixfatal 3 года назад +11

    Just add some dark effect with tons of codes falling down on the screen and it will look like the hacker in movies. 👌🏻

    • @nicolatherriault6734
      @nicolatherriault6734 2 года назад

      That's pretty much what we're looking at already, it's pretty much made up crap without the scrolling text

  • @muhammadshinas1053
    @muhammadshinas1053 3 года назад +3

    Malayali undo evitte ❤️❤️❤️❤️

  • @jordanyoung1836
    @jordanyoung1836 7 часов назад

    Best short ever 😊

  • @jsdawoodahmed2931
    @jsdawoodahmed2931 Год назад

    Which ThinkPad model is that and which is that left phone of Samsung bro your daam cool

  • @deepakkiran6791
    @deepakkiran6791 3 года назад +26

    Need a complete tutorial bro🥺

    • @crazyvibes8332
      @crazyvibes8332 3 года назад

      @@faizansarwar6811 😂😂

    • @crazyvibes8332
      @crazyvibes8332 3 года назад

      @@faizansarwar6811 ooo bhai.. kosna fone

    • @crazyvibes8332
      @crazyvibes8332 3 года назад

      @@faizansarwar6811 4g sahi se chl nahi pata yha...

    • @crazyvibes8332
      @crazyvibes8332 3 года назад +1

      @@faizansarwar6811 lele bhai ..new.. abhi time h 5g aane me.. waise kha se ho..

  • @montielvincivano.8682
    @montielvincivano.8682 3 года назад +4

    Plot twist: in order to have access from laptop to cellphone, you have to connect your phone to internet or turn on data.
    *No connectivity, no hacking. Basic

    • @bence_7616
      @bence_7616 3 года назад +1

      Dont u think if he already cracked the pin code he also can swipe down the notification bar and click on wifi or data?

    • @montielvincivano.8682
      @montielvincivano.8682 3 года назад

      @@bence_7616 yeah but the video is fake.
      The password of his phone is sequence number, 12345.
      In real life, the phone will lock up after 7 or 10 consecutive attempt. But anyways, the hackers can command the phone only when its connect to the internet, it will not execute the said command if no connectivity to communicate.
      It is just your imagination to do like that. Well, if you are using clone phoned, maybe you are at risk.

  • @carlossena1200
    @carlossena1200 3 года назад +3

    great execution

  • @vy9004
    @vy9004 3 года назад +6

    A very long PIN code could help ?
    Or just don't enable USB debugging 👀

    • @vllr9477
      @vllr9477 3 года назад

      Or just use biometrics.

  • @Fl0yd-
    @Fl0yd- 2 года назад +2

    Now try it without knowing the pin and having the phone lock out every 5 wrong tries with hours in between….

  • @knoopx
    @knoopx 2 года назад

    plain dead simple but effective, well thought

  • @antiintruderapp9206
    @antiintruderapp9206 3 года назад +3

    👉 Yes, to do this USB debugging must be turned on.
    I see comments here saying- to connect keyboard through otg we don't need that.
    Just a quick answer- we enable debugging to run system based commands (through adb or terminal) to grant those permission or execute actions/task which phone doesn't allows without debugging or root.
    PS: This video says you can do that when you forget your PIN/Password.
    ✔️ So just don't keep your USB debugging turned on when you actually never use it.
    That's why also android kept it hidden under debeloper section, not in notification panel 😀

  • @tejasw384
    @tejasw384 2 года назад +5

    That music can automatically hack anything

  • @jsdawoodahmed2931
    @jsdawoodahmed2931 2 года назад

    Man u keep really coolest smartphones on earth and I feel like grabbing all those

  • @r8gg
    @r8gg 2 года назад

    this is a listener, it listens to figure out what the key is, then uses it to login. it already knew what the key was because you inputted it

  • @yushie8158
    @yushie8158 2 года назад +6

    This is not how things work in real life. The passcode was set to 1111 intentionally so the bruteforce can crack it quickly. In real life? This does not happen.
    The phone will also automatically lock down at 5 wrong attempts. Continuing on after 15-20 attempts, it will lockdown indefinitely and the actual owner of the phone will have to unlock it by going to a vendor of the phone's company.
    Even if it was a proof of concept, it was a horrible one. As it isn't even nearly what actually happens in real life.
    Please, do not be a script kiddie.

  • @thenaserov
    @thenaserov 2 года назад +6

    If that laptop wasn't there, that was impossible!

  • @teamangtalga
    @teamangtalga Год назад

    this is actually pretty good if not for that one requirements where USB Debug should be enabled

  • @TikhaGamer
    @TikhaGamer 2 года назад

    In some phones, the OTG function is not enabled in default, there's a setting for it to turn on OTG connection.
    So you need to unlock the device first and after turning OTG connection on, it can be useful.
    Or maybe I'm wrong ; it will work on even those devices.

  • @adityapurankar
    @adityapurankar 3 года назад +4

    It's running on outdated android with no latest security patch... One can easy it was already vulnerable to easily hack

    • @Lanxxe
      @Lanxxe 3 года назад

      bro, the password was literally 1111... even a phone from 3020 with that password can be entered. Nothing to do with the OS

  • @SumitKumar-tl7nm
    @SumitKumar-tl7nm 3 года назад +6

    Bro! Please bring tutorial for this video

    • @Zackmortar
      @Zackmortar 3 года назад

      skid xd

    • @Zackmortar
      @Zackmortar 3 года назад

      @HackThatShit he doesnt wanna google it thats why i told him he is a skid

    • @alone_legends
      @alone_legends 3 года назад

      @HackThatShit tell me process please i was used metasploit but i can't understand can you send me information

  • @ummmmmf9712
    @ummmmmf9712 2 года назад

    Well, i will simulate the situation
    Me: *Everything ready. Waiting for the time*
    Friend: I'll be back in 5 mins
    Me: *Its time boi*

  • @mohoshinshakib2877
    @mohoshinshakib2877 2 года назад +2

    Bro i need to talk with you please. 🥺🥺

  • @Dev.Shoaib
    @Dev.Shoaib 2 года назад +3

    Wired haking
    I will say to him give ur phone I will hack it

  • @ericjohnmonsantodiaz3875
    @ericjohnmonsantodiaz3875 3 года назад +7

    Even if impossible due to its time laps.. but this could be really useful when you totally forgot your password, pin code, or even pattern.

  • @emily1
    @emily1 10 дней назад

    this looks and seems like the good ol brute force method of just throwing random strings at it and hoping it unlocks. Only thing is if you don’t get the first 5 or so depending attempts, you’ve just wiped the phone by the failsafe if it was enabled or locked yourself out from trying for a certain amount of time of which I’ve been informed increases at least on android every time you trigger it consecutively
    Also lads, worst thing you could do here is set ur pin as 0000, 1111, 2222 etc.. Probably the first 10 unlucky common guesses people will actually use in some cases.

  • @Rusiputki
    @Rusiputki 2 года назад

    I'm always scared when I see an old IBM Laptop, especially with parallel ports... *ECU tuning flashbacks*

  • @Index_Nine
    @Index_Nine 3 года назад +4

    Okay, I really need a detailed tutorial on this🙏

    • @kinghidden6366
      @kinghidden6366 3 года назад

      Lbnini 🙋🏼‍♂️

    • @xxhakrlast2464
      @xxhakrlast2464 3 года назад

      @@kinghidden6366 كأنك كاتب لبناني ولا فهمان غلط انا

    • @kinghidden6366
      @kinghidden6366 3 года назад

      @@xxhakrlast2464 صح

  • @deleteduser7870
    @deleteduser7870 3 года назад +5

    btw I use a complicated pattern lock + fingerprint so I shouldn't be afraid, right?

    • @justcallmenoah5743
      @justcallmenoah5743 3 года назад +12

      Even a pin like this is WAY more secure than this video implies. An android device will lock itself down for a prolonged period of time after ten guesses, which isn't many when you consider the sheer number of 4 digit pins.
      10 possible values for each position, with four positions. 10^4 possible combinations, 10,000 possible pins.

    • @deleteduser7870
      @deleteduser7870 3 года назад +4

      @@justcallmenoah5743 I know I know, entering wrong password causes cooldown and on my rom even lock forever. also yeah, I don't think someone will leave their phone for such a long time, this video only makes ios users take an offend of android users

    • @grandmakisses9973
      @grandmakisses9973 3 года назад +4

      @@deleteduser7870 the government has a tool to bf IOS pins so...

    • @Ag89q43G0HyA
      @Ag89q43G0HyA 3 года назад

      @@deleteduser7870 every device has a backdoor for the gouverment under federal order of investigation, but no any mortal can get that acces, cuz the manufacturer is the only one having the keys to decrypt the data, and... iif you are not a bad person, you dont need to hide anything... proveme wrong and ill teach you a few politics and security lessons.

    • @thezombieguy426
      @thezombieguy426 3 года назад

      @@Ag89q43G0HyA what if it's stored in the cloud?

  • @medmohamed1416
    @medmohamed1416 День назад

    Poc : exactly is that your feeling when you install KALILINUX😂❤

  • @bekolois38
    @bekolois38 2 года назад +1

    I wonder how long will it take if the pin code was 9999

  • @jaisaini8460
    @jaisaini8460 3 года назад +3

    Not possible. Coz we only get 5 attempts tu unlock then we have to wait for 30 sec (in brute force attack) and so on....

  • @ashuyadav7263
    @ashuyadav7263 3 года назад +3

    Bro. Plz give me a reverse engineering of android app course .....🥺

    • @mobilehacker
      @mobilehacker  3 года назад +2

      unfortunately, I don't provide any courses

  • @UnlockBoot
    @UnlockBoot Год назад

    Android 7? Cool waiting for Android 12 video 🙂

  • @mdabdurrahimkorayshistuden5703
    @mdabdurrahimkorayshistuden5703 2 года назад

    wow, that's feeling great boss

  • @doublesnake18
    @doublesnake18 Год назад +1

    Everytime i hear bruteforce i see something like this video...

  • @cericx7962
    @cericx7962 15 дней назад

    I love the classic Thinkpad for Linux

  • @SP.Learning
    @SP.Learning 2 года назад

    Surprisingly i haven't seen a IPHONE is the best comment yet 😂