How to control Someone's mobile without them knowing?


How to control Someone's mobile without them knowing?

Today I'm showing, How people are hack someone's mobile without touching it.There are plenty of ways to hack a mobile. You could have access someone's personal information, Monitor the GPS, Reading text messages,download a file from their mobile or upload your own file, access a camera and many more without allowing them to recognize. Quite interesting right lets go,

Step 1: Download a Software that generates a payload. Here I'm using SpyNote software 

SpyNote is a light weight Android remote administration tool (RAT) to hack into a smartphone device remotely. It gives you the power to establish control over android devices with an easy to use GUI and all the features you need to monitor them. Build a custom APK or bind the payload to an already existing APK such as a game or social media app. After the great introduction of spynote v3.2 and spynote v4, a newer version is available. Download spynote v5 full version free of cost.

Download SpyNote v5 Full Version:

Click here to download spynote v5 full version. Password is EHT.
 
Step 2: Turn Off Anti-Virus on your system. Then launch Spynote software which was look like this,


 Step 3: Now click on Build Client, a small window is pops-up, click on Client Info tab. Enter Client Name, App Name(enter bind App name), Service Name and Version.


Step 4: Click on Dynamic DNS tab and enter your IP Address and Random port Number. In my case my IP address is 192.168.31.158 and port number is 4545.


Step 5: Click on Properties tab and choose the properties whichever you want.


Step 6: After selecting properties, Next click on Merging App tab. Here select a app you wish to bind with payload. In may case, I've choose Facebook Lite app.


 Step 7: Click on build which are in left top corner, Its ask to Build Apk click on that. A open Window is pops-up Select any one patch and click on open.


Step 8: Share this payload to target mobile.There are so many ways to share a App such as Share it, Bluetooth, Whatsapp, Upload on wesendit.com then share a link etc...



Step 9: Make sure that Victim/Target should install the payload. Try to do some social Engineering tricks to install a payload on Victim's mobile.


 Step 10: Click on Listen Port which located in left bottom corner. Add port number which you used early while creating a payload. In my case, I've used 4545 then click on add and press OK.

Step 11: Open SpyNote window, You will get a Victim's mobile client.


Step 12: Right click on that you will get more options to control a victim mobile without them knowing.


You Can do on Victim's mobile -

  • Explore Files with full access.
  • Read/Write Messages.
  • Make a call, record a call and browse call logs.
  • Read and write contact list.
  • Capture photos and videos.
  • Listen live conversation through mic, record mic sound live.
  • Check browser history.
  • Get GPS Location.
  • Check installed apps.
  • Change Wallpaper.
  • Stop user Functionality.
  • Make a Toast.
  • Chat with Victim Anonymously.
  • Access Front and Back Camera.
  • Capture usernames and passwords. 
  • Get phone’s information (IMEI, WIFI MAC, PHONE CARRIER).
  • Fun Panel (Show messages, shake the phone etc). 

Countermeasures:

  • Don't trust any one to share mobile Passwords or pin.
  • Download apps From PlayStore or AppleStore only.
  • Don't download anything from on Unknown Sources.
  • Keep updating your Device.
  • Install Anti-virus Software or Keep Turn on Play protect feature in Android mobile.

***LEGAL DISCLAIMER***



This site contains materials that can be potentially damaging or dangerous.

If you do not fully understand something on this site, then GO OUT OF HERE! Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials.

These materials are for educational and research purposes only.The blogger or author is not responsible for any illegal activities. If you want to learn hacking techniques to attack systems without authorization, stole data, etc... please get out of my blog right now.It is your responsibility if you decide to use the information of this blog to make illegal actions. If you do that, you will be in jail.

We do NOT promote Hacking! We are documenting the way hackers steal and performs activities. So it can be useful to Protect yourself.

If you have any doubts please free to comment below. I'm happy to help you.😊


Comments

Post a Comment

Popular Posts

How to Hack FILMORAGO On PC | No WaterMark | Unlock all Features for FREE!!!

How to install Kali Linux on Windows 10, 8, 7 (Easiest way)

How to restore permanently deleted files on windows