Search
Mobile or Cellular Hacking
Mobile devices are critical to modern communication and are increasingly targeted by attackers


Mobile Hacking: How the Mexican Drug Cartels Built their Own Cellular Infrastructure to Avoid Surveillance
Welcome back, my aspiring cyberwarriors! Mobile hacking can take many forms. Most novices focus on the handset, but in reality, there are...
6 min read
9,083 views


Chinese State-Sponsored Hackers Inside the US Mobile Telecom System: Mobile Telecom Companies Vulnerable to SS7 Vulnerability
Welcome back, my rookie cyberwarriors! In recent weeks, a series of sophisticated cyber attacks has once again exposed critical...
5 min read
835 views


Mobile Telecom Networks for Hackers, Part 2
Welcome back, my aspiring cyberwarriors! In our modern digital era, mobile or cellular networks are the dominant mode of communication....
5 min read
1,024 views


Mobile Telecom Networks for Hackers, Part 1: Getting Started with Mobile Networks
Welcome back, my aspiring cyberwarriors! The world is rapidly becoming dominated by mobile cellular networks. Not long ago, telecom...
5 min read
1,432 views

What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?
Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital...
5 min read
963 views

Android Hacking: The libwebp Vulnerability (zero-day/zero-click)
Welcome back, my aspiring cyberwarriors! In recent days, a new and severe vulnerability has been found among the Android ecosystem that...
3 min read
8,834 views


Using MultiBlue to Control Any Bluetooth Mobile Device
We recently began an exploration of ways to hack using the Bluetooth protocol. As you know, Bluetooth is a protocol that connects near...
3 min read
5,506 views

Software Defined Radio, Part 6: Building a Cellphone IMSI Catcher (Stingray)
Welcome back, my aspiring RF hackers! Among the multitude of radio signals swirling around us everyday are the mobile telephone signals...
5 min read
67,342 views


Ukraine/Russia War: Mobile Phones and Networks Weaponized to Target on Both Sides
Welcome back, my cyberwarriors! In our digital age, we are blessed with many digital wonders. Among these is the mobile phone. The mobile...
4 min read
4,099 views

Android Hacking, Part 4: A Compendium of Android Remote Administration Trojans (RATS)
Welcome back, my aspiring cyberwarriors! In light of the recent revelations regarding Israel's NSO group and their cellphone malware...
3 min read
19,166 views

Mr. Robot Hacks: How Elliot Hacked the FBI Cellphones
Welcome back, my Mr. Robot aficianados! In Season 2 of Mr. Robot, the FBI is on the trail of Elliot and f/society for the 5/9 hacks that...
3 min read
17,638 views


Metasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)
Welcome back, my budding hackers! The growth of the mobile device market has been dramatic over the past 10 years. From its birth in 2007...
5 min read
70,831 views


Android Hacking, Part 2: How to Embed a Backdoor into an Android APK
Welcome back, my fledgling hackers! Mobile devices--smartphones and tablets--are proliferating around the world and slowly overtaking...
3 min read
46,644 views


Digital Forensics, Part 10: Mobile Forensics (Android)
Over the past decade or so, the growth of the mobile market has been the fastest growing segment of the IT industry. We now have portable...
3 min read
4,429 views


Android Hacking, Part 1: Android Basics
Welcome back, my rookie hackers! Before we delve into this much anticipated section on "Hacking Android", we first need to understand a...
3 min read
10,116 views


Android Hacking: Setting Up an Android Hacking Lab
Each and every day, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only...
4 min read
18,931 views


How to Spy on Anyone's Smartphone
Our smartphones are the reservoirs of our life. They contain so much personal and business information that anyone who can get into our...
5 min read
31,001 views