Тёмный

Mind Blowing: Change Process Credentials, Escalate Privileges! 

Mobile Hacking Lab
Подписаться 1,2 тыс.
Просмотров 895
50% 1

Unlock the secrets of mobile hacking with our mind-blowing tutorial on changing process credentials to escalate privileges! In this video, we dive deep into the world of mobile kernel exploitation, showing you step-by-step how to modify process kernel tasks and credentials for ultimate control. Whether you're focused on iOS or Android mobile hacking, this guide will take your skills to the next level. Don't miss out on these pro hacker tips to gain more power on your mobile device!
🔍 What You'll Learn:
Understanding mobile kernel exploitation
Step-by-step process of changing process credentials
How to escalate privileges on your mobile device
Modifying process kernel tasks and creds for maximum impact
Tips for both iOS and Android mobile hacking
📱 Keywords:
Mobile Hacking, iOS Hacking, Android Hacking, Kernel Exploitation, Process Credentials, Privilege Escalation, Mobile Security, Pro Hacker Tips, Kernel Task Modification, Creds Modification
🚀 Stay Connected:
Subscribe for more hacking tutorials and mobile security tips. Leave a comment below if you have any questions or suggestions for future videos. Don't forget to like and share this video with your fellow hackers!
📱 Black Hat USA Course:
🚀 Android Userland & Kernel Fuzzing and Exploitation
www.blackhat.c...
📱 Checkout Free Android Application Security Course:
www.mobilehack...
🔍 Want to Learn Advanced Android Mobile Hacking?
🚀 Android Userland Fuzzing and Exploitation
www.mobilehack...
Want to pre-register for the Android Kernel Fuzzing and Exploitation course? Register on our website to get notified!
www.mobilehack...
Subscribe to our channel for more free mobile hacking content!
‪@MobileHackingLab‬
Song: Punch Deck - Neon Underworld
License: Creative Commons (CC BY 3.0) creativecommon...
/ @punchdeck
Music powered by BreakingCopyright: breakingcopyri...

Опубликовано:

 

8 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 19   
@freark92
@freark92 Месяц назад
Hey Umit, Nice channel! Really weird to be bored scrolling through RU-vid shorts and see a classmate from informatica 😂 Good luck, Freerk
@MobileHackingLab
@MobileHackingLab Месяц назад
Hahaha that’s amazing to hear Freerk! Amazing to year from you again!
@albertobarbieri8280
@albertobarbieri8280 Месяц назад
Some huge contents.. Keep like this Umit 🤘
@MobileHackingLab
@MobileHackingLab Месяц назад
Thanks Alberto! Is there something you would like me to create videos about?
@dxsp1d3r
@dxsp1d3r Месяц назад
Fantastic content, nice keep it up!! Huge fan
@MobileHackingLab
@MobileHackingLab Месяц назад
Thanks the for support and being part of the community!
@mrpi230
@mrpi230 Месяц назад
Awesome video , please also make a video on how to build android kernel image . Thank You
@MobileHackingLab
@MobileHackingLab Месяц назад
@mr Pi thanks for commenting! We are currently working on that video and will be uploaded in the coming days.
@KishorKumar-re2rs
@KishorKumar-re2rs Месяц назад
Great video... but i think i need understanding about the basics of kernel and how to compile it, someone please give me some references for this
@MobileHackingLab
@MobileHackingLab Месяц назад
Thanks for kind words! We are currently working on the video for that. It should come online in the coming days.
@iliyashahedi
@iliyashahedi Месяц назад
Awesome video 🙏🏼
@MobileHackingLab
@MobileHackingLab Месяц назад
Thanks @iliyashajedi!
@0xcrypto
@0xcrypto Месяц назад
🙌
@MobileHackingLab
@MobileHackingLab Месяц назад
Thanks for the support @0xcrypto!
@DommageCollateral
@DommageCollateral Месяц назад
can you make a video about how one would store userdata safely? i really want to learn how oauth2 and encryption work together in modern industry standarts. but you are more into android security than distributed systems right?
@MobileHackingLab
@MobileHackingLab Месяц назад
We have actually a video in our schedule to discuss oAuth and the usage by mobile apps. We will showcase how this can be abused if tokens are not stored correctly. We also have a lab that is based on insecure token storage, see www.mobilehackinglab.com/free-mobile-hacking-labs
@DommageCollateral
@DommageCollateral Месяц назад
i actually just learned about ebpf and asked myself to use it to process sensible data in kernel space, but kernel can get compromised so you would need tpm or other hardware based solutions for your encryption stuff...thats why i watch this video
@MobileHackingLab
@MobileHackingLab Месяц назад
Android and iOS both provide hardware solution for that see the following for more information Android see mobile-security.gitbook.io/mobile-security-testing-guide/android-testing-guide/0x05d-testing-data-storage And iOS see mobile-security.gitbook.io/mobile-security-testing-guide/ios-testing-guide/0x06d-testing-data-storage
@mirangoekpinar
@mirangoekpinar Месяц назад
👏🏼👏🏼
Далее
3 Levels of WiFi Hacking
22:12
Просмотров 1,9 млн
I Bought a $5000 PC in a Random Asian Tech Mall
22:12
Самый БОЛЬШОЙ iPhone в МИРЕ!
00:52
Просмотров 257 тыс.
iOS 18 Hands-On: Top 5 Features!
12:47
Просмотров 6 млн
let's hack your home network // FREE CCNA // EP 9
30:16
100+ Docker Concepts you Need to Know
8:28
Просмотров 947 тыс.
How I'd Learn AI (If I Had to Start Over)
15:04
Просмотров 793 тыс.
How to self-host and hyperscale AI with Nvidia NIM
6:44
F-16 Strafe
0:34
Просмотров 3,4 млн
Password Cracker with Notepad!
11:41
Просмотров 563 тыс.
find social media accounts with Sherlock (in 5 MIN)
5:01