Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,810 --> 00:00:08,730
In previous section we went through how to hack Android device using different exploit and different
2
00:00:08,730 --> 00:00:11,940
weakness and different type of attack.
3
00:00:12,120 --> 00:00:17,490
During the section I'm going to focus about how to hack devices using Android.
4
00:00:17,820 --> 00:00:23,010
So you may install some apps on your device that will allow you to spoof the network redirect the traffic
5
00:00:23,490 --> 00:00:25,590
capture some sensitive data and so on.
6
00:00:25,590 --> 00:00:33,720
So the focus of this section will be how to head the devices using Android.
7
00:00:33,750 --> 00:00:37,260
Now there is a lot of app that allows you to do that.
8
00:00:37,260 --> 00:00:38,700
I'm going to go through a few of them.
9
00:00:38,760 --> 00:00:45,990
But still if you search you'll find many of them but there is two points first for the first point is
10
00:00:45,990 --> 00:00:52,110
that you need to route your Android device to be able to use Josep and routing in Android.
11
00:00:52,260 --> 00:00:57,930
It's like jailbreaking an apple you are breaking the protection of the device.
12
00:00:57,930 --> 00:01:04,230
That's why I strongly strongly suggest that you should not do that on your own or buy.
13
00:01:04,710 --> 00:01:06,150
You should have more buy in.
14
00:01:06,180 --> 00:01:12,510
And I already mentioned that at the introduction of this course but I'm repeating that you should have
15
00:01:12,690 --> 00:01:19,920
a small device that is for testing where you can break the protection you can and install malicious
16
00:01:19,920 --> 00:01:20,420
software.
17
00:01:20,430 --> 00:01:22,320
You can try a different application.
18
00:01:22,320 --> 00:01:28,260
It will not affect the device because you don't have anything on it you don't have any personal information.
19
00:01:28,530 --> 00:01:33,780
If you do that on your own mobile and this is your own responsibility you're going to lose the guarantee
20
00:01:33,780 --> 00:01:34,700
of something by.
21
00:01:35,100 --> 00:01:37,760
Most probably it will affect the performance.
22
00:01:37,950 --> 00:01:42,340
And you never know if it's something that you are using in malicious or not.
23
00:01:42,630 --> 00:01:51,080
So one more time please have your own device by Ishy Mobin routed and tested but do not use your person
24
00:01:51,080 --> 00:01:55,970
on mobile that told your information and your e-mail and your contact and so on.
25
00:01:56,460 --> 00:02:00,500
So this is very important to clarify at the beginning.
26
00:02:00,510 --> 00:02:08,840
Now the first application that we can install is called Network spoofing network spoofer and then to
27
00:02:08,850 --> 00:02:12,070
support network spoofer.
28
00:02:12,070 --> 00:02:14,560
It's a very common application.
29
00:02:14,890 --> 00:02:18,730
And let me show you how it works let me show you first
30
00:02:22,360 --> 00:02:23,530
how it looked like.
31
00:02:23,560 --> 00:02:26,440
And then we're going to I'm going to show you how to install it and how to use it.
32
00:02:26,440 --> 00:02:33,490
It's straightforward very friendly but still this is the application that was built for last one.
33
00:02:33,490 --> 00:02:38,740
Now to be able to install that you have to first through the device and I'm glad if a separate video
34
00:02:38,740 --> 00:02:49,570
on how to run your device using or how to route not Galaxie not for.
35
00:02:49,930 --> 00:02:55,240
But if you have a different device you can search on YouTube you'll find a lot of rules that you and
36
00:02:55,270 --> 00:03:02,290
if you fail to find something that help you please let me know and I'm going to send you the detail
37
00:03:02,440 --> 00:03:04,030
of routing your device.
38
00:03:04,120 --> 00:03:06,770
But one more time it should not be your personal device.
39
00:03:06,790 --> 00:03:09,370
So let me go to the browser and
40
00:03:12,160 --> 00:03:16,400
let me first google it.
41
00:03:16,430 --> 00:03:22,400
Just want to show you from the beginning because the app is already installed on my computer.
42
00:03:22,720 --> 00:03:25,590
So if we go can you really go
43
00:03:29,730 --> 00:03:36,220
and you type don't know what network spool for
44
00:03:39,820 --> 00:03:40,730
you'll find.
45
00:03:40,750 --> 00:03:49,530
But actually this is the ones that you need to download and you go here and you can see that it is this
46
00:03:49,530 --> 00:03:50,750
may harm your device.
47
00:03:50,760 --> 00:04:02,280
But since this would be like a device for testing you ignored that and you click on download link and
48
00:04:02,280 --> 00:04:04,480
it will start downloading.
49
00:04:05,610 --> 00:04:09,790
Once it finished downloading this is Android netbook spoofer.
50
00:04:09,990 --> 00:04:19,290
You can click on it and most of those applications will require to go to the setting and allows installation
51
00:04:19,290 --> 00:04:20,790
of unknown source.
52
00:04:20,790 --> 00:04:29,360
Otherwise it will not be installed and you can now stone and install it installed on my machine.
53
00:04:29,530 --> 00:04:34,160
I just want to go through all the steps and then
54
00:04:38,440 --> 00:04:41,180
and then when it goes everything's just.
55
00:04:41,950 --> 00:04:43,670
And once you start the program
56
00:04:49,570 --> 00:04:53,860
once you start the program it
57
00:04:57,660 --> 00:04:59,460
you click on start.
58
00:05:00,250 --> 00:05:07,120
And as you can see those are all options you may find if you're running for the first time that he's
59
00:05:07,120 --> 00:05:11,400
asking you for installing some additional app install them.
60
00:05:11,650 --> 00:05:22,690
And as you can see you can you know Spoof's the traffic you can change some information as do something
61
00:05:22,690 --> 00:05:23,650
for fun.
62
00:05:24,010 --> 00:05:37,270
Let's for instance redirect anyone to go to a Web site and then redirect him to w w w dot and and as
63
00:05:37,540 --> 00:05:38,580
and an
64
00:05:42,680 --> 00:05:54,200
and click on done and OK and you choose the first one default gateway would you like to redirect one
65
00:05:54,200 --> 00:06:00,760
device or all device let me do all the device right now for the sake of fun and let's click on stuff.
66
00:06:01,280 --> 00:06:05,210
So you start redirecting.
67
00:06:05,360 --> 00:06:07,570
Let me try on my machine here.
68
00:06:07,910 --> 00:06:15,220
So if I go to for instance as you can see it automatically has been directed to this website but it
69
00:06:15,230 --> 00:06:25,800
me go to Google Google.
70
00:06:26,040 --> 00:06:28,380
OK let me try this machine.
71
00:06:42,880 --> 00:06:44,060
I'm going to open the browser
72
00:06:48,230 --> 00:06:50,500
and fuku to for instance Google
73
00:06:55,630 --> 00:06:57,910
it's you often happen.
74
00:07:06,970 --> 00:07:10,860
See it has been redirected to Emerson.
75
00:07:10,990 --> 00:07:13,650
Let's try one more time in our machines.
76
00:07:13,960 --> 00:07:15,190
So let me refresh
77
00:07:21,290 --> 00:07:31,360
school to anything else like this website.
78
00:07:31,890 --> 00:07:37,350
So anyway it seems that you know some machine you go.
79
00:07:37,410 --> 00:07:39,100
It has been redirected.
80
00:07:39,210 --> 00:07:48,180
So this is actually can be mis used especially in public place if you have.
81
00:07:48,260 --> 00:07:53,850
If you are in the coffee shop or something and someone are sitting there and running this application
82
00:07:53,850 --> 00:08:01,080
he can redirect you to some page like fake Facebook page or fake Twitter page or fake bank page and
83
00:08:01,080 --> 00:08:02,030
so on.
84
00:08:02,040 --> 00:08:10,110
So you should not actually trust the network in public places or coffeeshop even if it has a key since
85
00:08:10,470 --> 00:08:16,290
some people are connected that you are not aware of and they may intercept it.
86
00:08:16,470 --> 00:08:17,860
Let's try something else.
87
00:08:18,120 --> 00:08:26,120
So for instance there has been a problem we can take a changing image.
88
00:08:26,350 --> 00:08:38,340
So new one will be like logging to a page that has image all the image will be replaced with the ones
89
00:08:38,340 --> 00:08:40,570
that you choose.
90
00:08:40,800 --> 00:08:42,110
So let's see.
91
00:08:42,710 --> 00:08:49,500
Let me go to our website here and I'll see already.
92
00:08:49,500 --> 00:08:52,200
All the Imogene's the page has been changed.
93
00:08:52,230 --> 00:08:56,290
Let's see in a different image and it works on different platforms.
94
00:08:56,310 --> 00:09:02,010
So even if the user is connected through a mobile device it will take place.
95
00:09:02,010 --> 00:09:09,030
So if you go here to open any website and so on you can sniff for the network.
96
00:09:09,050 --> 00:09:14,900
The fact is the traffic which is unencrypted traffic but the encrypted traffic would be hard to lose.
97
00:09:15,370 --> 00:09:21,520
But you can you know the director you can spoof the traffic you can change the image you can change
98
00:09:21,520 --> 00:09:22,280
the way you do it.
99
00:09:22,300 --> 00:09:27,520
It's plenty of things that you can do using this application
100
00:09:30,020 --> 00:09:31,760
network to spoofer.
101
00:09:32,080 --> 00:09:35,420
So go
102
00:09:41,780 --> 00:09:44,190
there is many application like that as it is.
103
00:09:44,230 --> 00:09:45,130
Yes please.
104
00:09:45,160 --> 00:09:49,300
But actually this is one of the best.
105
00:09:50,190 --> 00:09:51,220
Let's get back
106
00:09:54,210 --> 00:09:55,520
so you can change the video.
107
00:09:55,530 --> 00:10:00,310
So if his user is going to YouTube you can put another video that he's watching.
108
00:10:00,450 --> 00:10:01,740
It's quite fun.
109
00:10:02,090 --> 00:10:05,080
Flip image or flip.
110
00:10:05,110 --> 00:10:18,160
So let's get back images on the page so all page picture will be flipping upside down on all devices.
111
00:10:18,330 --> 00:10:18,600
And
112
00:10:22,830 --> 00:10:24,370
I mean you are getting the point.
113
00:10:24,540 --> 00:10:32,270
So this is actually the network spoofing tool.
10749
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.