Ehacking Tutorial

Control a Remote Phone via Webserver - Android Security

An app that can record phones, sms, track location changes, silently take pictures etc. and watch all the fun beeing uploaded to a webconsole from where you control the smartphone with dynamic updates using WEBVIEW.

This software consists of three parts: source for installing app on android device (in AndroidAntiTheft folder) webserver with all necessary scripts/files to control remote phone (in admin_panel folder) DB (in folder DB) additionally a older compiled apk file is attached a swell - ready to download and install on your device.

what it does

the application "acts" as an antitheft software. The moment you install it it helps you track your phone. with an IMEA code displayed after staring you can log into the webserver and see where your phone is. This is the non malicious part. The malicious part: the admin (hacker) in this security demo can also log into another part of the webserver and enable installed features within the app (hidden to the user). He can activate features like phone recording, sms recording etc. all enabled features result in an stealth upload of all data to the webserver, where the admin can take a closer look at the data.

Most Influential Women in Infosec Around The Globe

Infosec (Information security) is a field dominated by the men around the world. A rough idea is only 10 to 15 percent Female infosec are active in the world right now. Here we screened out some of the Top females from the field of Information security and rank them according to their skills in the world of Infosec.

Jennifer Leggio

At the top of our list is Jennifer Leggio, she is from Austin,Texas. She is the worlds most known Infosec women right now. She worked with ZDNET and Forbes tech contributor. She is a hockey lover. 

VoIP Hacking: Past, Present, Future and You!

VoIP technology does not need my words to prove its superiority over traditional mode of communication. The edge that this technology has, made it to become the number1 mode of communication, but at the same time it increased the risk of data theft and hijacking. Your words, your data and the past, present and future of hacking is matter but the industry is quite reluctant to discuss VoIP hacking and its security.

On Sep,24, 2014 we have seen a news where a man was sentenced to 10 years in prison for stealing and then reselling more than 10 million minutes of Internet phone service. There are so many other incidents out there, on Oct,19,2014 phone hackers dial and redial to steal billions. VoIP security can be costly if not addressed properly. PBX and VoIP hacking, taken together, can lose companies a large amount of money. VoIP hacking is like most other forms of hacking -- if you don’t pay attention to your security, you really will get what you deserve.

Hacking attack on VoIP network is the real threat that organizations are facing, top management of any company worry about their meeting that they done over IP telephony, the meeting, finalizing any deal, coordination with other team and all of above data of future plans, financial secrets and organizational secrets, etc. all of these information are at risk.

Organizations are willing to spend their $$$ to save their data and information but to whom they should spend their money? There seems to be nobody or a specific group of people who takes care of VoIP security and conduct penetration testing; otherwise the infosec industry is quite reluctant to produce more professionals for VoIP penetration testing. Hence the result is market gap, where potential are not interested, not available of simply they are not capable for VoIP environment.

The bad news is that training is not something that we can get over a single night. It takes time, effort and focus to learn and practice the art of VoIP penetration testing to secure the VoIP environment at your work place. There are some certification bodies who give certification but they are too costly and most of the courses are outdated. 

You are reading this because somehow you are the part of Infosec industry and its time for us to think about it, to think about the future of this industry; what we have achieved so far and where the industry is heading towards?

Well, at this time I am not willing to give my final words of what I am thinking about the VoIP security and its future, I want you to consider yourself in place and think about it. Its about you and the past, present and future of VoIP hacking and its security.

Ehacking took an initiative to provide the world class VoIP Penetration Testing Training, the course has been designed to create engineers having skills to create VoIP network with server and phone configuration and the second objective of the course is to teach everyone to conduct pen-testing on VoIP environment. The course is available for FREE of cost.

Greatest Hacking Movies of All Time

Blackhat hit the theaters this week and with some high profile hacking attacks on the biggest corporations like Sony the movie became one of the most anticipated movies of this decade. Some are suggesting that this movie will bring some of the hacking realism to the Hollywood.

Detekt to Resist Government Surveillance

It has been well documented that governments are using surveillance technology to target human rights defenders, journalists, NGOs, political opponents, religious or ethnic minorities and to conduct countrywide surveillance.

In recent years we have witnessed a huge growth in the adoption and trade in communication surveillance technologies. Such spyware provides the ability to read personal emails, listen-in skype conversations or even remotely turn on a computers camera and microphone without its owner knowing about it.

Some of this software is widely available on the Internet, while some more sophisticated alternatives are made and sold by private companies based in industrialized countries to state law enforcement and intelligence agencies in countries across the world. 

There is little to no regulation currently in place to safeguard against these technologies being sold or used by repressive governments or others who are likely to use them for serious human rights violations and abuses.

What is Detekt?

Detekt is a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS, commercial surveillance spyware that has been identified to be also used to target and monitor human rights defenders and journalists around the world.

If you suspect you are at risk of targeted surveillance you should always seek and follow security advice to ensure you protect yourself and others in your digital communications. 

It is important to underline that if Detekt does not find trace of spyware on a computer, it does not necessarily mean that none is present. Some spyware will likely be updated in response to the release of Detekt in order to avoid detection. In addition, there may be existing versions of spyware, from these or other providers, which are not detected by this tool.

Downlaod detekt from github

VoIP Hacking & Penetration Testing

VoIP has become an integral part of today's business environment and organizations. The rising importance and usage of VoIP technology has created the security risk that created an exceptional opportunity for infosec professionals. However the market need was not properly responded by the infosec professionals, as they failed to create competitive VoIP security engineers / penetration testers. 

Ehacking brings a world class VoIP Penetration Testing Course with an aim to spread the knowledge and skills to create the required competitive professionals to fulfill the market need.

The course will be FREE of cost for the early birds.

You will:

  • Understand the technology, architecture and its protocols
  • Learn the various communication modes, server configuration and VoIP phone configuration
  • Understand the process to create a lab environment to practice hacking and pen-testing
  • You will be applying various attacking vectors to test the security of VoIP network
  • Understand the hacking concept from intelligence gathering to vulnerability finding and exploitation
  • Man-in-the-middle attack, DOS attack, authentication cracking, spoofing and other attacking vectors are included
It's your time to learn and practice VoIP pen-testing to enhance your capabilities in order to outperform in the competitive job market.

First 100 early birds will get the course for FREE
Next 200 will get 50% OFF

* indicates required