CS Seminars and Educational Trips 2
Almario, Jhon Chedric K. CS Seminars and Educational Trips
Reflection Report BSCS – 4B
Webinar Title: “Ethical Hacking- How to hack a phone”
I. Details of the event
The first webinar that I attend was called “Ethical Hacking – how to hack a phone”. In this webinar the speaker teach us on how to hack a phone like see the call history, hacking someone text message, spying someone through their own camera and track phone without touching their phone. The one who organized this webinar was Team Upskill and the speaker that time was Mr. Happy Rafols. This webinar held on March 26, 2022 Saturday 2:00pm.
II. Reflection on webinar / Activity Learnings
For this webinar’s objective is to know the package needed to install to hack someone’s phone, install the app needed to hack, what are the command needed to execute the attack, what is a web server and lastly tips to avoid your phone from being hacked. In this webinar they will teach us step by step on how to hack someone else’s phone without knowing the owner. What it needed first is virtual box and linux, you can download it in google. Before that take note that this webinar didn’t intended to promote cyber crimes, it’s created for the sake of learning and understanding different aspects of cyber security. After installing the linux and run it in virtual box they open a terminal emulator to execute the command. The first command is “sudo apt install –y default-jkd” this command is to install java development kit. Jdk, zipalign and apktool is the tool they are using. (msfvenom) this is the command that they are using to copy a template from the application they are downloading, it will create a new copy of application and will send it to the target. Next one is (msfconfig) it’s like a gui based so that it can perform the attack using msfconfig. After installing the jdk next is install the zipalign “sudo apt-get install zipalign”. After it we can now download any app like flappy bird and configure the local port and ip config. Once the target download and play the game that the hacker send it will automatically access his/her phone without knowing, it is a malware. You can type “dump_calllog” to see the history of the call like number, date, type and duration of the call. We can also type “dump_sms” to see the conversation of your target. This command “geolocate” once you type this it will send a coordinate number and you can track it by searching in google map given by “geolocate” command. It helpful to those people who lost their cellphone you can just type “geolocate” in terminal. The other command that can send sms is “send_sms –d +639466429403 “ Your phone has been hacked!!!” after execute the command the target will send a message to the number you write in command. “webcam_snap i:1” using that command you can capture an image through the target phone and “webcam_stream –i 2” you can spy your target, it is a live recording so you can see what he’s doing. When it comes to protecting yourself against the hacker always update your device, I’d also strongly advise against using unofficial tools to root your phone known as “jailbreaking” on ios, unless you know what you’re doing. Be careful what you’re installing. Be prepared to track and lock your phone, be aware of open wifi because not all public wifi are safe. That was the thing that I learned in the webinar that I attend.
III. Reflection on possibilities on implementing some of the webinar input on a practical level
With the knowledge or ideas that I learned in webinar I can prevent myself from being hack by someone and to aware what application I will install in the future, because not all the application is safe and some of it maybe a malware. So to avoid that install only the legitimate application and also install anti-virus and keep updated. Always check the url if its correct and think before you click. Lock individual application you’re using to avoid accessing your data against hacker. Always review your application you’re using. Don’t use a suspicious application that can cause your application to be hacked as much as possible.
IV. Feedback on the event organizer
I can say that the webinar is worth it, not only it gave us a knowledge it also gave us a prevention act on how to protect your device from the hacker. It will helpful to us specially that the technology is keep improving and wrong action can cause you to become victim of hacking. As much as possible refrain yourself from using unwanted app, install only those recommended by google app store and make sure that review all the application you’re using. This webinar gave us an information how scary is hacking, just clicking and downloading the application will cause your application to be exploit.
V. Suggestion for improvement to be made / consider for future activities
The webinar they organized is perfect, it gave us a knowledge and information regarding the topic
VI. Photos
taken/ Proof of attendee




Comments
Post a Comment