Mind Blowing: Change Process Credentials, Escalate Privileges!

Поділитися
Вставка
  • Опубліковано 5 вер 2024
  • Unlock the secrets of mobile hacking with our mind-blowing tutorial on changing process credentials to escalate privileges! In this video, we dive deep into the world of mobile kernel exploitation, showing you step-by-step how to modify process kernel tasks and credentials for ultimate control. Whether you're focused on iOS or Android mobile hacking, this guide will take your skills to the next level. Don't miss out on these pro hacker tips to gain more power on your mobile device!
    🔍 What You'll Learn:
    Understanding mobile kernel exploitation
    Step-by-step process of changing process credentials
    How to escalate privileges on your mobile device
    Modifying process kernel tasks and creds for maximum impact
    Tips for both iOS and Android mobile hacking
    📱 Keywords:
    Mobile Hacking, iOS Hacking, Android Hacking, Kernel Exploitation, Process Credentials, Privilege Escalation, Mobile Security, Pro Hacker Tips, Kernel Task Modification, Creds Modification
    🚀 Stay Connected:
    Subscribe for more hacking tutorials and mobile security tips. Leave a comment below if you have any questions or suggestions for future videos. Don't forget to like and share this video with your fellow hackers!
    📱 Black Hat USA Course:
    🚀 Android Userland & Kernel Fuzzing and Exploitation
    www.blackhat.c...
    📱 Checkout Free Android Application Security Course:
    www.mobilehack...
    🔍 Want to Learn Advanced Android Mobile Hacking?
    🚀 Android Userland Fuzzing and Exploitation
    www.mobilehack...
    Want to pre-register for the Android Kernel Fuzzing and Exploitation course? Register on our website to get notified!
    www.mobilehack...
    Subscribe to our channel for more free mobile hacking content!
    ‪@MobileHackingLab‬
    Song: Punch Deck - Neon Underworld
    License: Creative Commons (CC BY 3.0) creativecommon...
    / @punchdeck
    Music powered by BreakingCopyright: breakingcopyri...

КОМЕНТАРІ • 19

  • @freark92
    @freark92 Місяць тому

    Hey Umit,
    Nice channel!
    Really weird to be bored scrolling through UA-cam shorts and see a classmate from informatica 😂
    Good luck, Freerk

    • @MobileHackingLab
      @MobileHackingLab  Місяць тому

      Hahaha that’s amazing to hear Freerk! Amazing to year from you again!

  • @dxsp1d3r
    @dxsp1d3r Місяць тому

    Fantastic content, nice keep it up!! Huge fan

    • @MobileHackingLab
      @MobileHackingLab  Місяць тому +1

      Thanks the for support and being part of the community!

  • @albertobarbieri8280
    @albertobarbieri8280 Місяць тому

    Some huge contents.. Keep like this Umit 🤘

    • @MobileHackingLab
      @MobileHackingLab  Місяць тому

      Thanks Alberto! Is there something you would like me to create videos about?

  • @mrpi230
    @mrpi230 Місяць тому

    Awesome video , please also make a video on how to build android kernel image . Thank You

    • @MobileHackingLab
      @MobileHackingLab  Місяць тому

      @mr Pi thanks for commenting! We are currently working on that video and will be uploaded in the coming days.

  • @iliyashahedi
    @iliyashahedi Місяць тому +1

    Awesome video 🙏🏼

  • @KishorKumar-re2rs
    @KishorKumar-re2rs Місяць тому

    Great video... but i think i need understanding about the basics of kernel and how to compile it, someone please give me some references for this

    • @MobileHackingLab
      @MobileHackingLab  Місяць тому

      Thanks for kind words! We are currently working on the video for that. It should come online in the coming days.

  • @DommageCollateral
    @DommageCollateral Місяць тому

    i actually just learned about ebpf and asked myself to use it to process sensible data in kernel space, but kernel can get compromised so you would need tpm or other hardware based solutions for your encryption stuff...thats why i watch this video

    • @MobileHackingLab
      @MobileHackingLab  Місяць тому

      Android and iOS both provide hardware solution for that see the following for more information
      Android see
      mobile-security.gitbook.io/mobile-security-testing-guide/android-testing-guide/0x05d-testing-data-storage
      And
      iOS see
      mobile-security.gitbook.io/mobile-security-testing-guide/ios-testing-guide/0x06d-testing-data-storage

  • @0xcrypto
    @0xcrypto Місяць тому +1

    🙌

  • @DommageCollateral
    @DommageCollateral Місяць тому

    can you make a video about how one would store userdata safely? i really want to learn how oauth2 and encryption work together in modern industry standarts. but you are more into android security than distributed systems right?

    • @MobileHackingLab
      @MobileHackingLab  Місяць тому

      We have actually a video in our schedule to discuss oAuth and the usage by mobile apps. We will showcase how this can be abused if tokens are not stored correctly. We also have a lab that is based on insecure token storage, see www.mobilehackinglab.com/free-mobile-hacking-labs

  • @mirangoekpinar
    @mirangoekpinar Місяць тому

    👏🏼👏🏼