Wednesday, October 2, 2019

Cyber Security Device Exploitation

Mobile devices are the targeted by hackers for device Exploitation and for gathering important information on  below  purposes,
  • Mobile Banking
  • Spying
  • Malware exploits
  • Services set identifier(SSID)
Popular War driving tools used for hacking,
  • Kismet 
  • Wireshark 
  • Fern WiFi wireless cracker
  • Common view for WiFi
  • Omnipeek
  • Airjack
  • INSSIDER
  • KISMAC
Some of the tools used to automate Robo calls to all possible numbers.

Man in Middle attack:



  • Man in middle attack is a medium through attacker interrupts and disrupts attack. 
  • Picture archive and communication systems(PACS) used for Med Jacking. 
Signal Spillover:


  • Signal spill over is used to broadcast beacon characteristics. 
  • Signal spillover is used allowed pedestrian walking by public hotspots.
  • To signing guest network without signing in. 
Packet In Packet Vulnerability:

This vulnerability is used by hackers to de-authenticate clients connected to WiFi and inject malicious beacon frames, perform host scan and port scan. Bypass firewall rule and conduct ARP spoofing.


Due to this type of attack by hackers resistance from this to ensure cyber security end to end to be secure.


Hill Station view:



1 comment:

felisha green said...


If you ever want to change or up your university grades contact cybergolden hacker he'll get it done and show a proof of work done before payment. He's efficient, reliable and affordable. He can also perform all sorts of hacks including text, whatsapp, password decrypt,hack any mobile phone, Escape Bancruptcy, Delete Criminal Records and the rest

Email: cybergoldenhacker at gmail dot com

Explore Me

Networking- Cisco IOS XR

Cisco IOS XR found in service providers routers like 12000 series cisco IOS XR. Cisco IOS XR originally designed for 64 bit operations....