IP

Showing posts with label Mobile Hacking. Show all posts
Showing posts with label Mobile Hacking. Show all posts

Thursday, May 26, 2011

Bluetooth Security – The Tools,the Rules and stuff


Everybody is having a Bluetooth phone nowadays,and we are merely concerned about the safety of these vulnerable and penetrable devices. BE it Nokia,Sony or any other brand,the technology remains same and provides whackers (wireless malicious hackers) new playground for their experiments.In this article,I will be listing some Bluetooth tools for security – both breaking and making.


Bluediving
It is a security and Bluetooth penetration testing suite and implements attacks like BlueSnarf,BlueSnarf++ and BlueSmack.Bluediving running on Linux - rdhacker.blogspot.comIt features Bluetooth address spoofing,socket shells like AT and RFCOMM and also implements tools like L2CAP packet generator and connection resetter and RSCOMM scanner which are a must for any Bluetooth security enthusiastic.

Download BlueDiving


Blooover
Blooover (and Blooover 2) is a tool that is intended to run on J2ME enabled cell phones that appear to be comparably seamless.It serves as an audit tool that people use to check if their phones and phones of friends :P are vulnerable or not.
Bloover running on S40 - rdhacker.blogspot.com Bloover running on S40 - rdhacker.blogspot.com
Also there is also a tool “Super Bluetooth Hack” which is quite popular nowadays to hack into Bluetooth devices.

Download Blooover

Medieval Bluetooth Network Scanner
This program can analyze and scan your Bluetooth network, giving detailed information about local and remote devices found. You can also browse supported services of each device in a clear and straightforward user-interface. If you have a Bluetooth dongle installed on your PC, download "Medieval Bluetooth Network Scanner" now, it's totally free of charge and very handy!
Bluetooth Network Scanner running on Win Vista - rdhacker.blogspot.comBluetooth Network Scanner running on Win Vista - rdhacker.blogspot.comIt can deep scan all services of your Bluetooth device using this software.

Download Medieval Bluetooth Network Scanner

These software are free to use and quite handy to audit.However you,you ought to follow some basic rules of Bluetooth security for maximum protection-
  • Switch off Bluetooth when not in use.
  • Purchase only devices having long PIN codes.
  • Refrain from entering the PIN into Bluetooth device for pairing.
  • Limit the electric power itself to keep range of network within physical area (for Bluetooth enabled routers and devices other than cell phones).
  • Always generate initialization keys when 2 Bluetooth devices meet for the first time.
  • Never allow auto connection (Big loophole in Cell phone devices,easily exploited by a bit of social engineering).

Thursday, May 12, 2011

Phone Call Spoofing



Earlier there was a call spoofing method but its not working now, But I have come across a new method fully working. Use it to call anyone using anybode else's number. You can also change your voice pitch so that the other person can't recognize you.

Warning-Only for educational purposes.


  • 1. Open http://www.crazycall.net
  • 2. Select your country and wait for the page to load.
  • 3. Enter the number you want to display in the first big box (Dont change the contents of small box if the fake number is of same country).
  • 4. Enter the number you wish to call in
    second big box.
  • 5. Choose voice pitch as normal (for same
    voice) or high or low pitch to change your
    voice.
  • 6. Click Get me a code.
  • 7. Dial the number shown on right and
    enter the shown code when asked.
  • ###################

Saturday, December 4, 2010

How to trace any mobile number of the WORLD !!




With the rapid growth of mobile phone usage in recent years, I have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar.

Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia.

 Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller. All you need for this is only the first 4-digit of the mobile number. In this Wiki page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.
If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this link from Numbering Plans. Using this link, you can trace any number in the world.
By using the information in this article, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you ”who” the caller is. So if you’re in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of police. I hope this information has helped you!