Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:12,730 --> 00:00:14,900
Hi, welcome back to another episode on How to Hack.
2
00:00:15,280 --> 00:00:20,080
So today we'll be exploring the use of unlocking an Android device without password.
3
00:00:20,530 --> 00:00:26,620
So what we can do is we can actually get a physical Android device that you have or you could actually
4
00:00:26,620 --> 00:00:32,180
use a virtualization technology like Android studio to boot up the Android virtual device.
5
00:00:32,440 --> 00:00:37,060
So in this case, in today's practical and tutorial, we will actually explore an Android studio that
6
00:00:37,060 --> 00:00:37,870
you can see over here.
7
00:00:38,290 --> 00:00:40,270
So over here, we go to Android studio running.
8
00:00:40,270 --> 00:00:45,790
So Android Studio is a platform for you to develop your app files or applications that can run on Android
9
00:00:45,790 --> 00:00:46,380
devices.
10
00:00:46,930 --> 00:00:52,750
And one great thing is that you can go on to tools under a manager and here we get all your virtual
11
00:00:52,750 --> 00:00:55,870
devices that you can actually run your app files on.
12
00:00:56,380 --> 00:00:59,200
And, of course, we can click on to create virtual device.
13
00:00:59,350 --> 00:01:02,200
And in this case, we can select, say, Pixel three Excel.
14
00:01:02,200 --> 00:01:05,650
So you can have to pick off your different kind of hardware.
15
00:01:05,650 --> 00:01:08,890
So you got TV, you got phone, you go waras and so on.
16
00:01:09,220 --> 00:01:12,820
So for Ossorio select pixel three Excel click next on that.
17
00:01:13,180 --> 00:01:17,590
And here we can select a system image so we have a tree system images.
18
00:01:17,590 --> 00:01:19,450
So we got a lollipop marshmallow in.
19
00:01:19,450 --> 00:01:25,030
Q So we are going to use Android ten point zero Google APIs and we'll click next on that.
20
00:01:25,630 --> 00:01:30,970
And here of course you can name your name, so we will name it as Pixel three Excel API twenty nine
21
00:01:31,420 --> 00:01:36,360
click finish and we can see a new virtual device inside your Android device manager.
22
00:01:37,060 --> 00:01:43,270
So click onto the Green Arrow sign and this would actually launch the Aveda into emulator.
23
00:01:43,270 --> 00:01:44,530
So click go on debt.
24
00:01:45,040 --> 00:01:49,600
And so once you click on add, this will start up the Android emulator and at the same time I want to
25
00:01:49,600 --> 00:01:50,800
open up command prob.
26
00:01:51,280 --> 00:01:58,470
So once you got Android studio running, you would also at the same time actually have your EDB running.
27
00:01:58,480 --> 00:02:04,000
So in this case, for example, if I enter EDB, this would actually shoulder help for ADB.
28
00:02:04,000 --> 00:02:05,460
So of course what is EDB?
29
00:02:05,770 --> 00:02:11,230
EDB is an Android debark breach and this is running on version one point zero point three two.
30
00:02:11,590 --> 00:02:16,180
So it allows you to connect on the back end to your Android devices.
31
00:02:16,450 --> 00:02:18,820
So in this case, on the left side, I got the Android device.
32
00:02:18,820 --> 00:02:21,630
On the right side, I have my Android debark breech.
33
00:02:21,880 --> 00:02:24,520
So if you are not sure what is Android Broadbridge?
34
00:02:24,700 --> 00:02:29,440
We have done a tutorial on that before, so do check it out on a few videos of.
35
00:02:30,550 --> 00:02:35,590
So going back into the Android device, we can actually scroll down and we can actually look at his
36
00:02:35,590 --> 00:02:36,190
settings.
37
00:02:36,490 --> 00:02:41,440
And of course, in this case, if I click onto the power button, we can actually see that this would
38
00:02:41,440 --> 00:02:44,080
actually close off the display screen.
39
00:02:44,350 --> 00:02:46,750
And when we click on it again, this would open it up.
40
00:02:46,750 --> 00:02:48,250
So no password has been set.
41
00:02:48,640 --> 00:02:53,080
So all we got to do is actually go into the settings and into settings.
42
00:02:53,080 --> 00:02:59,340
We can actually see that we have a option to actually change and secure the password.
43
00:02:59,620 --> 00:03:03,310
So this is actually under the setting of security.
44
00:03:03,610 --> 00:03:09,130
So you click on a security and of course, here we got the screen lock, so now it sees none.
45
00:03:09,130 --> 00:03:10,360
So there are no screen lock.
46
00:03:10,840 --> 00:03:13,330
We can lock it with any of this combination.
47
00:03:13,330 --> 00:03:18,430
So we'll use password and when we click on password, we can enter, say, one, two, three, four.
48
00:03:18,430 --> 00:03:19,390
Click next on that.
49
00:03:19,630 --> 00:03:20,890
One, two, three, four.
50
00:03:21,010 --> 00:03:21,820
Confirm that.
51
00:03:22,060 --> 00:03:27,610
So this will lock up the Android device and we can actually select don't show notifications at all.
52
00:03:27,820 --> 00:03:28,630
So click done.
53
00:03:29,050 --> 00:03:33,730
So once you're done with it and when you click the power button, this would actually lock up the screen,
54
00:03:33,730 --> 00:03:35,590
including turning off the display.
55
00:03:35,800 --> 00:03:41,170
So if I click on a power button again and I try to open it up and now I'm prompted for a password.
56
00:03:41,320 --> 00:03:46,350
So the scenario goes like this, a situation goes like this, perhaps you do not have a password or
57
00:03:46,390 --> 00:03:49,930
you forgot your password and you want to reset the password inside the device.
58
00:03:50,320 --> 00:03:56,650
So in this case, the best way out for us is actually to be able to use the Android debark breach to
59
00:03:56,650 --> 00:04:02,800
help us gain access back and to the Android device and be able to change it up the settings inside the
60
00:04:02,800 --> 00:04:06,660
mobile device, helping us ultimately gain access into the device again.
61
00:04:07,420 --> 00:04:13,150
So the first thing I want to do is actually enter devices, and this would actually show us all the
62
00:04:13,150 --> 00:04:15,390
devices they're connected on to the breach.
63
00:04:15,430 --> 00:04:18,820
So in this case, we got emulator dash five five five four.
64
00:04:19,240 --> 00:04:22,180
So what we will do next is actually to go into the system.
65
00:04:22,180 --> 00:04:26,410
So all you gotta do is enter EDB Shell and this would bring us into the device.
66
00:04:26,410 --> 00:04:28,150
So all I got to do is enter who am I?
67
00:04:28,420 --> 00:04:30,280
And it seems that we are shell.
68
00:04:30,280 --> 00:04:31,450
It stays that we are shell.
69
00:04:31,450 --> 00:04:33,520
We're working with the Android devices, a shell.
70
00:04:34,030 --> 00:04:35,310
So of course we can enter ASU.
71
00:04:35,320 --> 00:04:38,440
So as you would give a super user power and privileges.
72
00:04:38,620 --> 00:04:40,710
So hit enter on that and now enter.
73
00:04:40,720 --> 00:04:41,340
Who am I.
74
00:04:41,510 --> 00:04:42,490
It says that we have root.
75
00:04:42,490 --> 00:04:43,930
So we are the super user.
76
00:04:44,140 --> 00:04:46,120
We have a lot of privileges and permissions.
77
00:04:46,480 --> 00:04:48,400
We can control the Android device very quickly.
78
00:04:49,090 --> 00:04:54,370
So the next thing we really want to do is to go into data and then we'll go into system.
79
00:04:54,820 --> 00:04:56,980
And once we're in system, we can enter URLs.
80
00:04:57,190 --> 00:05:02,890
So the most important part for this tutorial is actually to look at this particular file clock settings,
81
00:05:02,890 --> 00:05:03,480
dot DB.
82
00:05:03,730 --> 00:05:09,070
So they actually store all this configuration and information insight, lock settings, dot DB.
83
00:05:09,550 --> 00:05:11,530
So the only way for us to open his up is to.
84
00:05:11,540 --> 00:05:17,450
You enter a school like tree and hit enter on debt, so, of course we can enter open, followed by
85
00:05:17,450 --> 00:05:22,170
the full name and of course lock settings DB hit enter on deck.
86
00:05:22,580 --> 00:05:26,900
So now we are assessing and manipulating and changing the data inside lock settings.
87
00:05:27,260 --> 00:05:33,230
So Eskil Library is a way for us to actually structure data inside a mobile device.
88
00:05:33,500 --> 00:05:39,200
And it is very useful because it is very similar to how you would actually store data inside your Microsoft
89
00:05:39,200 --> 00:05:43,800
school, your MySQL and so on, all those database management systems.
90
00:05:44,060 --> 00:05:45,950
So in this case, we're using it for Android device.
91
00:05:45,950 --> 00:05:46,580
So that's great.
92
00:05:47,330 --> 00:05:52,610
So the commands, the syntax is the queries are all very similar to how you would actually look and
93
00:05:52,610 --> 00:05:55,510
use the Microsoft school or school statements.
94
00:05:55,910 --> 00:05:58,370
So the next thing we want to do is to enter help.
95
00:05:58,380 --> 00:06:03,470
So if you're not familiar with Eskdale like Tree Enter help and will show you the commands that you
96
00:06:03,470 --> 00:06:06,730
can use, final table information, updatable and so on.
97
00:06:06,950 --> 00:06:10,330
So very useful way of controlling the database details.
98
00:06:11,060 --> 00:06:15,750
So what we will do is right now we can enter tables to see all the tables inside the database.
99
00:06:16,190 --> 00:06:20,540
So here we've got to table so adroit metadata and log settings.
100
00:06:20,750 --> 00:06:23,360
So we are more concerned today about WLOX settings.
101
00:06:23,690 --> 00:06:29,210
So in future tutorials will look at how we could actually control Eskil like we look at how we can manage
102
00:06:29,210 --> 00:06:32,660
the data and details and an information insight as a light.
103
00:06:33,230 --> 00:06:36,340
So, of course, in today's tutorial, we'll look at clock settings.
104
00:06:37,100 --> 00:06:42,890
So the next thing we can do is select or from lock settings, followed by semicolon to pull all the
105
00:06:42,890 --> 00:06:44,030
data from lock setting.
106
00:06:44,070 --> 00:06:45,500
So go ahead and hit enter on debt.
107
00:06:45,890 --> 00:06:47,540
And of course, now you see the commands.
108
00:06:47,540 --> 00:06:50,400
The queries are very similar to your SQL statements.
109
00:06:50,510 --> 00:06:56,180
So in this case, we can see the lock screen disable is true and we can see lock screen, password type
110
00:06:56,180 --> 00:06:56,750
alternate.
111
00:06:57,230 --> 00:07:00,250
And of course we can also see lock screen, password type.
112
00:07:00,560 --> 00:07:07,160
So all these are some of the key points that will be changing and updating in order for us to be able
113
00:07:07,160 --> 00:07:10,450
to remove the lock screen inside the Android device.
114
00:07:11,030 --> 00:07:15,590
So, of course, the next thing we want to do is enter update followed by lock settings.
115
00:07:16,040 --> 00:07:20,270
And once we got that, we can enter set value and we'll set it to one.
116
00:07:20,960 --> 00:07:27,500
So this would actually set the particular column on a particular roll off the lock screen, disable
117
00:07:27,500 --> 00:07:33,830
and wear name, equal lock screen door disable.
118
00:07:34,760 --> 00:07:38,450
And of course we can put a semicolon at the end to end the quarry.
119
00:07:38,450 --> 00:07:39,070
Got a statement.
120
00:07:39,080 --> 00:07:44,150
So he enter on that and it would update the lock settings value for a lock screen disable.
121
00:07:44,360 --> 00:07:48,470
So of course on a top you can see that our previous query shows that it was a one.
122
00:07:48,830 --> 00:07:51,830
And of course now we have updated to chool.
123
00:07:51,830 --> 00:07:53,240
There is a lock screen is disable.
124
00:07:53,540 --> 00:08:00,080
Then the next thing we want to do is to update the lock settings, set value equal zero
125
00:08:04,550 --> 00:08:05,600
and we set it to zero.
126
00:08:05,600 --> 00:08:13,400
And next thing I want to do is wear name equal lock screen dot.
127
00:08:15,030 --> 00:08:23,520
Password underscore type, and we can put a hyphen as well as a semicolon or a single court in a single
128
00:08:23,520 --> 00:08:25,410
court and a semicolon hit, enter on that.
129
00:08:25,480 --> 00:08:27,030
So don't update a table again.
130
00:08:27,370 --> 00:08:37,190
And in last one that we want to do is to actually update lock settings, set value equal zero where
131
00:08:37,260 --> 00:08:38,430
name equal.
132
00:08:39,000 --> 00:08:46,410
And of course, in this case, we're going to set this lock screen dot password followed by underscore
133
00:08:46,410 --> 00:08:53,050
type, underscore, alternate, and we put a single, quote, semicolon on that and hit enter.
134
00:08:53,340 --> 00:08:59,050
So this would update all of those roles that we see inside the table when we pull a query on it.
135
00:08:59,070 --> 00:09:04,860
So if you go in and select or from lock settings again and you hit, enter, indebt debt, so this would
136
00:09:04,860 --> 00:09:10,200
again see the changes in update to lock screen, disable, lock screen, password type, alternate,
137
00:09:10,560 --> 00:09:13,740
as well as the use of the lock screen password type.
138
00:09:13,980 --> 00:09:15,840
So all this has been disabled right now.
139
00:09:16,020 --> 00:09:18,330
So all we gotta do is enter or exit.
140
00:09:18,940 --> 00:09:23,160
But then of course after that we could actually exit from the system and we can exit again from the
141
00:09:23,160 --> 00:09:23,630
system.
142
00:09:23,880 --> 00:09:28,800
So of course over here all we got to do is actually reset the computer or reset a phone.
143
00:09:29,010 --> 00:09:31,800
And once we we started phone, it would actually restart.
144
00:09:31,830 --> 00:09:35,390
We've all lock screen and immediately we could gain access into the system very quickly.
145
00:09:35,760 --> 00:09:41,140
So once it restarts, all of this has been disabled and immediately we gain access into the mobile device.
146
00:09:41,580 --> 00:09:44,710
So right now we are restarting the Android device so you can take a while.
147
00:09:45,000 --> 00:09:49,830
So once it restarts, we can actually gain direct access into the Android device.
148
00:10:21,330 --> 00:10:27,180
OK, so right here we see that pixel is starting and all you got to do is actually pull down and you
149
00:10:27,180 --> 00:10:34,740
see that we actually can go under settings and under settings, we can actually go back into the security.
150
00:10:34,920 --> 00:10:39,720
So in security, we can click on it and we can see that the screen lock is now not.
151
00:10:39,960 --> 00:10:45,000
There means we have actually removed a screen lock capability inside the Android device and we'll be
152
00:10:45,000 --> 00:10:48,960
able to perform all sorts of actions into the Android device very quickly.
153
00:10:49,500 --> 00:10:52,350
So once again, I hope you learned something valuable in today's tutorial.
154
00:10:52,590 --> 00:10:56,460
And if I have any questions, feel free to leave a comment below and I'll try my best to answer any
155
00:10:56,460 --> 00:10:57,240
of those questions.
156
00:10:57,570 --> 00:11:01,890
And we'll like, share and subscribe to the channel so that you can be kept abreast of the latest cyber
157
00:11:01,890 --> 00:11:02,250
security.
158
00:11:02,250 --> 00:11:02,570
Tarryl.
159
00:11:02,880 --> 00:11:04,380
Thank you so much once again for watching.
16994
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.