Some routers allow you to have no password on your Wifi and 'secure' it by only allowing certain mac addresses. Well, as long as you are not being stupid and using MAC based security. In my next post, I will try to cover some basic concepts of it.Īs for him being able to hack your network because he knows your mac address.
There are tons of software which are avilable for free on the internet like the raspberry pi v3 and kali Linux. The main part of their attack was the Wi-fi pineapple which costs $100. They actually proved their point by entering some of the students mobiles, accessing their Facebook accounts, reading their emails, this was a test just to show what they could do. They used two laptops, and Maltego CE Transformers to create a MiTM (Man-in-The-Middle) attack.
However, their attack method was outdated compared to present one. How to Hack a Phone (Android)?Ī while ago, I watched a documentary on two white hat hackers, hacking about 12 students mobiles. In this article, I will try to tell you almost everything about how to hack a phone. In order to prevent this situation from occurring, one of the best ways is to track them and their phone. For example, as a parent or head of a company, we can have a fear of getting our child in wrong hands or getting cheated by our employees. So, there are several advantages and several problems with smartphones which may affect our life. But everything in this universe has it’s pro and cons as well. Most importantly, we use smartphones to connect with people. We all know that the smartphones have become an important part of our life. To begin with a day till the night, we all are busy with our smartphones.