Search
Mobile or Cellular Hacking
Mobile devices are critical to modern communication and are increasingly targeted by attackers


6 min read
Mobile Hacking: How the Mexican Drug Cartels Built their Own Cellular Infrastructure to Avoid Surveillance
Welcome back, my aspiring cyberwarriors! Mobile hacking can take many forms. Most novices focus on the handset, but in reality, there are...
8,202 views


5 min read
Chinese State-Sponsored Hackers Inside the US Mobile Telecom System: Mobile Telecom Companies Vulnerable to SS7 Vulnerability
Welcome back, my rookie cyberwarriors! In recent weeks, a series of sophisticated cyber attacks has once again exposed critical...
739 views


5 min read
Mobile Telecom Networks for Hackers, Part 2
Welcome back, my aspiring cyberwarriors! In our modern digital era, mobile or cellular networks are the dominant mode of communication....
921 views


5 min read
Mobile Telecom Networks for Hackers, Part 1: Getting Started with Mobile Networks
Welcome back, my aspiring cyberwarriors! The world is rapidly becoming dominated by mobile cellular networks. Not long ago, telecom...
1,176 views

5 min read
What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?
Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital...
909 views

3 min read
Android Hacking: The libwebp Vulnerability (zero-day/zero-click)
Welcome back, my aspiring cyberwarriors! In recent days, a new and severe vulnerability has been found among the Android ecosystem that...
8,662 views


3 min read
Using MultiBlue to Control Any Bluetooth Mobile Device
We recently began an exploration of ways to hack using the Bluetooth protocol. As you know, Bluetooth is a protocol that connects near...
5,442 views

5 min read
Software Defined Radio, Part 6: Building a Cellphone IMSI Catcher (Stingray)
Welcome back, my aspiring RF hackers! Among the multitude of radio signals swirling around us everyday are the mobile telephone signals...
66,432 views


4 min read
Ukraine/Russia War: Mobile Phones and Networks Weaponized to Target on Both Sides
Welcome back, my cyberwarriors! In our digital age, we are blessed with many digital wonders. Among these is the mobile phone. The mobile...
4,078 views

3 min read
Android Hacking, Part 4: A Compendium of Android Remote Administration Trojans (RATS)
Welcome back, my aspiring cyberwarriors! In light of the recent revelations regarding Israel's NSO group and their cellphone malware...
19,039 views

3 min read
Mr. Robot Hacks: How Elliot Hacked the FBI Cellphones
Welcome back, my Mr. Robot aficianados! In Season 2 of Mr. Robot, the FBI is on the trail of Elliot and f/society for the 5/9 hacks that...
17,527 views


5 min read
Metasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)
Welcome back, my budding hackers! The growth of the mobile device market has been dramatic over the past 10 years. From its birth in 2007...
70,710 views


3 min read
Android Hacking, Part 2: How to Embed a Backdoor into an Android APK
Welcome back, my fledgling hackers! Mobile devices--smartphones and tablets--are proliferating around the world and slowly overtaking...
46,518 views


3 min read
Digital Forensics, Part 10: Mobile Forensics (Android)
Over the past decade or so, the growth of the mobile market has been the fastest growing segment of the IT industry. We now have portable...
4,389 views


3 min read
Android Hacking, Part 1: Android Basics
Welcome back, my rookie hackers! Before we delve into this much anticipated section on "Hacking Android", we first need to understand a...
10,079 views


4 min read
Android Hacking: Setting Up an Android Hacking Lab
Each and every day, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only...
18,894 views


5 min read
How to Spy on Anyone's Smartphone
Our smartphones are the reservoirs of our life. They contain so much personal and business information that anyone who can get into our...
30,741 views