Legal Disclaimer
Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking
Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking
- No tags were found...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Hacking For Beginners – Manthan Desai 2010<br />
7. Mobile hacking – SMS & Call forging<br />
It was bound to happen - they have hacked just about everything else. Now it's the cell phones. Cellphone hacking has<br />
just recently surfaced and been made public ever since some one did some cellular phone hacking on Paris Hilton's cell<br />
phone.<br />
This article will give you some information about what is going on out there and what you can do to better protect your<br />
cell phone information.<br />
What Does It Involve<br />
The fact of someone hacking cell phone became public knowledge when Paris Hilton's cell phone, along with her<br />
information was recently hacked. Unfortunately for her, all her celebrity friends and their phone numbers were also<br />
placed on the Internet - resulting in a barrage of calls to each of them.<br />
Cell phone hackers have apparently found a glitch in the way the chips are manufactured. The good news, though, is that<br />
it only applies to the first generation models of cell phones that use the Global System for Mobile communications (GSM).<br />
Another requirement is that the hacker must have physical access to the cell phone for at least three minutes - which is a<br />
real good reason not to let it out of your sight. Currently, although the problem has been remedied (at least for now) in<br />
the second and third generation phones, it seems that about 70% of existing cell phones fall within the first generation<br />
category.<br />
Another way that mobile phone hacking can take place is for a hacker to walk around an area with people that have cell<br />
phones and a laptop that has cellphone hacker programs on it. Through an antenna, and a little patience, his computer<br />
can literally pick up your cell phone data - if it is turned on. This is more applicable to cell phones that use Bluetooth<br />
technology.<br />
What Can A Hacker Do?<br />
Surprisingly, there are quite a number of things that can be accomplished by the hacker. Depending on their intent here<br />
are a few of them.<br />
<br />
<br />
Steal Your Number<br />
Your phone number can be accessed and obtained by cellphone hacking. This allows them to make calls and have<br />
it charged to your account.<br />
Take Your Information<br />
Mobile hacking allows a hacker to contact your cell phone, without your knowledge, and to download your<br />
addresses and other information you might have on your phone. Many hackers are not content to only get your<br />
information. Some will even change all your phone numbers! Be sure to keep a backup of your information<br />
somewhere. This particular technique is called Bluesnarfing.<br />
w w w . h a c k i n g t e c h . c o . t v Page 72