Hak5 – Extreme Android and Google Auth Hacking with Kos, 1205.1



Kos of kos.io joins us to demonstrate his lethal Android hacking toolkit – P2P-ADB. Taking advantage of USB Debug Mode, Root, and some crafty hacks Kos’ toolkit enables the bypassing of lock screens, making system changes and even “backing up” Android profiles, all from one phone to another. Kos goes on to perform an Auth token cloning attack, enabling an attacker to gain access to a victims Google account, change the password, or even setup a one-time-password for themselves if…

46 Comments

  1. ๐‘ฎ๐‘ฌ๐‘ป ๐‘ป๐‘ฏ๐‘ฌ ๐‘ฌ๐‘ฝ๐‘ฐ๐‘ซ๐‘ฌ๐‘ต๐‘ช๐‘ฌ! ๐‘บ๐’•๐’‚๐’“๐’Œ ๐‘ฉ๐’“๐’Š๐’‚๐’ {๐‘พ๐’‰๐’‚๐’•๐’”๐’‚๐’‘๐’‘: +1(409)344-5982 ๐’๐’“ ๐’„๐’š๐’ƒ๐’†๐’“๐’”๐’‘๐’š๐’‰๐’‚๐’„๐’Œ๐’†๐’“2017@๐’ˆ๐’Ž๐’‚๐’Š๐’๐’„๐’๐’Ž } ๐’Š๐’” ๐‘บ๐‘ฐ๐‘ด๐‘ท๐‘ณ๐’€ ๐‘ป๐‘ฏ๐‘ฌ ๐‘ฉ๐‘ฌ๐‘บ๐‘ป! ๐‘ฐ ๐’ˆ๐’๐’• ๐’‡๐’–๐’๐’ ๐’‚๐’„๐’„๐’†๐’”๐’” ๐’•๐’ ๐’Ž๐’š ๐’ƒ๐’๐’š๐’‡๐’“๐’Š๐’†๐’๐’… ๐’˜๐’‰๐’‚๐’•๐’”๐’‚๐’‘๐’‘, ๐’Ž๐’†๐’”๐’”๐’‚๐’ˆ๐’†๐’” ๐’‚๐’๐’… ๐’„๐’‚๐’๐’๐’”. ๐‘ฐ ๐’˜๐’‚๐’” ๐’”๐’–๐’”๐’‘๐’Š๐’„๐’Š๐’๐’–๐’” ๐’‚๐’• ๐’‡๐’Š๐’“๐’”๐’• ๐’˜๐’Š๐’•๐’‰๐’๐’–๐’• ๐’…๐’๐’Š๐’๐’ˆ ๐’‚๐’๐’š๐’•๐’‰๐’Š๐’๐’ˆ ๐’ƒ๐’†๐’„๐’‚๐’–๐’”๐’† ๐‘ฐ ๐’๐’๐’—๐’†๐’… ๐’‰๐’Š๐’Ž. ๐‘ฐ๐’• ๐’˜๐’‚๐’”๐’'๐’• ๐’–๐’๐’•๐’Š๐’ ๐’Ž๐’š ๐’‡๐’“๐’Š๐’†๐’๐’… ๐’Š๐’๐’•๐’“๐’๐’…๐’–๐’„๐’†๐’… ๐’Ž๐’† ๐’•๐’ ๐’”๐’๐’Ž๐’†๐’๐’๐’† ๐’˜๐’‰๐’ ๐’‰๐’†๐’๐’‘๐’†๐’… ๐’‰๐’†๐’“, ๐’•๐’‰๐’‚๐’• ๐‘ฐ ๐’”๐’‚๐’˜ ๐’‰๐’๐’˜ ๐’๐’‚๐’Š๐’—๐’† ๐‘ฐ ๐’˜๐’‚๐’”. ๐‘ฎ๐’†๐’• ๐’•๐’‰๐’† ๐’„๐’๐’๐’”๐’–๐’“๐’† ๐’š๐’๐’– ๐’…๐’†๐’”๐’†๐’“๐’—๐’†! ๐‘ฎ๐’Š๐’—๐’† ๐’š๐’๐’–๐’“ ๐’‰๐’†๐’‚๐’“๐’• ๐’‚ ๐’„๐’‰๐’‚๐’๐’„๐’† ๐’•๐’ ๐’Œ๐’๐’๐’˜!

  2. Can it go into any victim Phone or the phones need To activitรฉ something
    Sorry i'm not good with english.

  3. that tablet balancing on the netbook is giving me anxiety .. why not place on the table next to it ! ! ! ohh.. 24 minutes in. moved it !

  4. adb is not working to push app into the victim device.Sir, is there any solution to this??

  5. Interesting…so, say you are using your buddys computer and their cmd is disabled on guest. Could this work

  6. im running a rom that cant be rooted (long story), any tips for something like this, or maybe a modification to this to make it nonroot?

  7. i downloaded the whole code from github , but when i run the run.sh in android rooted terminal it says that 'adb is not in ur path' please help with the same

  8. anyone tell me which mobiles are they using i've tried with moto Mobiles and Mi Mobiles for those not working i have tried with lenova micromax samsung they working good

    And Please tell me when i'm connecting to another mobile from my phone its not generating RSA fingerprint authentication . Save me from these things ๐Ÿ™

  9. hey..so I wanna please know if I learn this device, what features or skills do I get that help me in finding a job in this field ?

  10. Another question, why does not read fasebook yemail gmail alone can break and very much a Russian website, I can tell you why odnoklassnki'ru??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

  11. can you tell me who broke the code name for this project is very much Telephones Please help????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

Leave a Reply

Your email address will not be published. Required fields are marked *