What can a hacker do with a cell phone?

0 17
Avatar for spring2go
4 years ago

In today's rapid development of smartphones and mobile Internet, mobile phones have also become a sharp weapon for hackers, it is even more invisible than computers, and its tracking difficulty may even exceed the computer - a powerful hacker can break the system vulnerability of an enterprise within five minutes, through a borrowed phone.

So what can a hacker do with a phone?

Termux is an Android terminal emulator, Termux is open source and do not need to root, support apt management package, also perfectly support Python, PHP, Ruby, Go, Nodejs, MySQL and other scripting languages. In particular, Termux supports Python very well, and almost all security tools written in Python are perfect for running, and there are many hacking tools that Termux can run on mobile phones, such as -

Metasploit is a vulnerability framework with hundreds of known software vulnerabilities, which is very popular among hackers.

Hydra is an open-source password attack tool that supports multiple protocols; it is often used by unscrupulous hackers to crack passwords violently.

Nmap is a network connector scanning software that scans the open network connector of an online computer. System administrators can use NMAP to detect unauthorized servers in the work environment. Still, several hackers use NMAP to gather network settings of the target computer to carry out attacks.

Hackers and penetration testers can use the same mobile tool for different purposes, whether it is a mobile phone or a computer, there is no good or evil in the tool itself, but rather it depends on the purpose of the user.

2
$ 0.00
Avatar for spring2go
4 years ago

Comments