Unconventional Phone Hacking

Currently reading:
 Unconventional Phone Hacking

zohn

Member
LV
1
Joined
Oct 20, 2023
Threads
10
Likes
2
Awards
4
Credits
813©
Cash
0$
Today I’ll be doing (as the title says) unconventional hacking with a phone. I will be using some tool(s), the most complicated of which being radare2 and with the power of an android I will use radare2 to reverse engineer something in order to obtain a password. I won’t go through the whole thing, just a simple demo. First thing’s first, fire up our terminal and get started:

Screenshot_20231020-182933
Screenshot_20231020-182933720×1600 95.6 KB


Ok, now after entering that command, we will begin our decent into the disassembly process
Screenshot_20231020-183046
Screenshot_20231020-1830461600×720 56 KB


We can see the word “radare2” printed in plain text at 0x9fd and since the program asks us to enter a password, we will try this for the first key.
Now the program asks us for a second password, I won’t give the exact answer but I will show where to locate it and go on to say that you may open a new session to again use radare2 to obtain the second key. As for the third key, find that on your own
Screenshot_20231020-183112
Screenshot_20231020-1831121600×720 54.1 KB


For those who don’t know assembly language too well, we know the password has something to do with the above highlighted section as it is comparing our input which is the [var_64h] and we know this is a string of comparison because of the cmp at the beginning of it.
Good luck, and hope all can have fun and learn not only hacking with a conventional PC or laptop, but also take the time to learn the unconventional and more difficult challenges of using a cellular device to do so
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips

Similar threads

Top Bottom