These are the top 10 Android Apps That Turn Your Phone into a Hacking Device

Double Click Here To Get Links

The Changing Landscape of Cybercrime

In the last two decades, we have witnessed the rapid growth of the Internet, mobile technology and the correspondingly rapid growth of online crimes or cybercrimes.
With this growth, there has been a spike in the rate of cybercrimes committed over the Internet.
This has resulted into some people condemning the Internet and partner technologies as responsible for creating new crimes and the root causes of these crimes. However, there is hardly any new crime resulting from these new technologies.
What has changed, as a result of these new technologies, is the enabling environment. Technology is helping in the initiation and propagation of most known crimes.
As we get rapid changes in technological advances, we are correspondingly witnessing waves of cybercrimes evolving.
Figure 1.1 shows the changing nature of the cybercrime landscape since 1980.
The period before 1980 was an experimental period.
Then, the Internet was new and required sophisticated and specialized knowledge that very few people back then had.
There was very little valuable information and data stored in online databases as there is today, and there were no free online hacking tools available.
If one wanted to hack, one had to develop the tools to do the job — a daunting task that required expertise.
The easiest way to do it was to join hacking groups. Ganglike groups like the Legions of Doom, the Chaos Computer Club, NuPrometheus League, and the Atlanta Three were formed.
Most of these groups were led by notorious individuals like Kevin Mitnick (“The Condor”), Ian Murphy (“Captain Zap”), and Patrick K. Kroupa (“Lord Digital”). At the tail end of the 1980s, computers had become smaller.
The personal computer (PC) had been introduced and was becoming very successful. Businesses were buying these computers at a rapid pace.
Schools of varying standards were opening up and filling with students interested in becoming computer programmers. More computers started getting into the hands of young people through their schools, libraries, and homes as it was becoming more and more possible for affluent families to afford a home PC.
Curious young people got involved with the new tools in large numbers.
As their numbers rose, so did cybercrimes.



1.SpoofApp
SpoofApp is a Caller ID Spoofing, Voice Changing and Call Recording mobile app for your iPhone, BlackBerry and Android phone. It’s a decent mobile app to help protect your privacy on the phone. However, it has been banned from the Play Store for allegedly being in conflict with The Truth in Caller ID Act of 2009.

2.Andosid
The DOS tool for Android Phones allows security professionals to simulate a DOS attack (an http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.

3.Faceniff
Allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks.

4.Nmap
Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon used to discover hosts and services on a computer network, thus creating a “map” of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyses the responses.

5.Anti-Android Network Toolkit
zANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. It provides cloud-based reporting that walks you through simple guidelines to ensure network safety.

6.SSHDroid
SSHDroid is a SSH server implementation for Android. This application will let you connect to your device from a PC and execute commands (like “terminal” and “adb shell”) or edit files (through SFTP, WinSCP, Cyberduck, etc).

7.WiFi Analyser
Turns your android phone into a Wi-Fi analyser. Shows the Wi-Fi channels around you. Helps you to find a less crowded channel for your wireless router.

8. Network Discovery
Discover hosts and scan their ports in your Wifi network. A great tool for testing your network security.

9.ConnectBot
ConnectBot is a powerful open-source Secure Shell (SSH) client. It can manage simultaneous SSH sessions, create secure tunnels, and copy/paste between other applications. This client allows you to connect to Secure Shell servers that typically run on UNIX-based servers.

10.dSploit
Android network analysis and penetration suite offering the most complete and advanced professional toolkit to perform network security assesments on a mobile device.


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *