How to Turn your Mobile Phone Into a Hacking Device

Top 10 Android Apps That can turn your Phone into a Hacking Device


1.SpoofApp

SpoofApp is a Caller ID Spoofing, VoiceChanging and Call Recording mobile app foryour iPhone, BlackBerry and Android phone.It's a decent mobile app to help protect yourprivacy on the phone. However, it has beenbanned from the Play Store for allegedly beingin conflict with The Truth in Caller ID Act of2009.


2. Andosid


The DOS tool for Android Phones allowssecurity professionals to simulate a DOS attack(an http post flood attack to be exact) and ofcourse a dDOS on a web server, from mobilephones.


3.Faceniff


Allows you to sniff and intercept web sessionprofiles over the WiFi that your mobile isconnected to. It is possible to hijack sessionsonly when WiFi is not using EAP, but it shouldwork over any private networks.


4. Nmap


Nmap (Network Mapper) is a security scanneroriginally written by Gordon Lyon used todiscover hosts and services on a computernetwork, thus creating a "map" of thenetwork. To accomplish its goal, Nmap sendsspecially crafted packets to the target host andthen analyses the responses.


5. Anti-Android Network Toolkit


zANTI is a comprehensive network diagnosticstoolkit that enables complex audits andpenetration tests at the push of a button. Itprovides cloud-based reporting that walks youthrough simple guidelines to ensure networksafety.


6. SSHDroid


SSHDroid is a SSH server implementation forAndroid. This application will let you connectto your device from a PC and executecommands (like "terminal" and "adb shell") oredit files (through SFTP, WinSCP, Cyberduck,etc).


7. WiFi Analyser


Turns your android phone into a Wi-Fianalyser. Shows the Wi-Fi channels aroundyou. Helps you to find a less crowded channelfor your wireless router.


8. Network Discovery


Discover hosts and scan their ports in yourWifi network. A great tool for testing yournetwork security.


9. ConnectBot


ConnectBot is a powerful open-source SecureShell (SSH) client. It can manage simultaneousSSH sessions, create secure tunnels, and copy/paste between other applications. This clientallows you to connect to Secure Shell serversthat typically run on UNIX-based servers.


10. dSploit


Android network analysis and penetration suiteoffering the most complete and advancedprofessional toolkit to perform networksecurity assesments on a mobile device


Post a Comment