Mind Blowing: Change Process Credentials, Escalate Privileges!

แชร์
ฝัง
  • เผยแพร่เมื่อ 13 ต.ค. 2024
  • Unlock the secrets of mobile hacking with our mind-blowing tutorial on changing process credentials to escalate privileges! In this video, we dive deep into the world of mobile kernel exploitation, showing you step-by-step how to modify process kernel tasks and credentials for ultimate control. Whether you're focused on iOS or Android mobile hacking, this guide will take your skills to the next level. Don't miss out on these pro hacker tips to gain more power on your mobile device!
    🔍 What You'll Learn:
    Understanding mobile kernel exploitation
    Step-by-step process of changing process credentials
    How to escalate privileges on your mobile device
    Modifying process kernel tasks and creds for maximum impact
    Tips for both iOS and Android mobile hacking
    📱 Keywords:
    Mobile Hacking, iOS Hacking, Android Hacking, Kernel Exploitation, Process Credentials, Privilege Escalation, Mobile Security, Pro Hacker Tips, Kernel Task Modification, Creds Modification
    🚀 Stay Connected:
    Subscribe for more hacking tutorials and mobile security tips. Leave a comment below if you have any questions or suggestions for future videos. Don't forget to like and share this video with your fellow hackers!
    📱 Black Hat USA Course:
    🚀 Android Userland & Kernel Fuzzing and Exploitation
    www.blackhat.c...
    📱 Checkout Free Android Application Security Course:
    www.mobilehack...
    🔍 Want to Learn Advanced Android Mobile Hacking?
    🚀 Android Userland Fuzzing and Exploitation
    www.mobilehack...
    Want to pre-register for the Android Kernel Fuzzing and Exploitation course? Register on our website to get notified!
    www.mobilehack...
    Subscribe to our channel for more free mobile hacking content!
    ‪@MobileHackingLab‬
    Song: Punch Deck - Neon Underworld
    License: Creative Commons (CC BY 3.0) creativecommon...
    / @punchdeck
    Music powered by BreakingCopyright: breakingcopyri...

ความคิดเห็น • 19

  • @dxsp1d3r
    @dxsp1d3r 2 หลายเดือนก่อน

    Fantastic content, nice keep it up!! Huge fan

    • @MobileHackingLab
      @MobileHackingLab  2 หลายเดือนก่อน +1

      Thanks the for support and being part of the community!

  • @mrpi230
    @mrpi230 2 หลายเดือนก่อน

    Awesome video , please also make a video on how to build android kernel image . Thank You

    • @MobileHackingLab
      @MobileHackingLab  2 หลายเดือนก่อน

      @mr Pi thanks for commenting! We are currently working on that video and will be uploaded in the coming days.

  • @DommageCollateral
    @DommageCollateral 2 หลายเดือนก่อน

    i actually just learned about ebpf and asked myself to use it to process sensible data in kernel space, but kernel can get compromised so you would need tpm or other hardware based solutions for your encryption stuff...thats why i watch this video

    • @MobileHackingLab
      @MobileHackingLab  2 หลายเดือนก่อน

      Android and iOS both provide hardware solution for that see the following for more information
      Android see
      mobile-security.gitbook.io/mobile-security-testing-guide/android-testing-guide/0x05d-testing-data-storage
      And
      iOS see
      mobile-security.gitbook.io/mobile-security-testing-guide/ios-testing-guide/0x06d-testing-data-storage

  • @KishorKumar-re2rs
    @KishorKumar-re2rs 2 หลายเดือนก่อน

    Great video... but i think i need understanding about the basics of kernel and how to compile it, someone please give me some references for this

    • @MobileHackingLab
      @MobileHackingLab  2 หลายเดือนก่อน

      Thanks for kind words! We are currently working on the video for that. It should come online in the coming days.

  • @DommageCollateral
    @DommageCollateral 2 หลายเดือนก่อน

    can you make a video about how one would store userdata safely? i really want to learn how oauth2 and encryption work together in modern industry standarts. but you are more into android security than distributed systems right?

    • @MobileHackingLab
      @MobileHackingLab  2 หลายเดือนก่อน

      We have actually a video in our schedule to discuss oAuth and the usage by mobile apps. We will showcase how this can be abused if tokens are not stored correctly. We also have a lab that is based on insecure token storage, see www.mobilehackinglab.com/free-mobile-hacking-labs

  • @albertobarbieri8280
    @albertobarbieri8280 2 หลายเดือนก่อน

    Some huge contents.. Keep like this Umit 🤘

    • @MobileHackingLab
      @MobileHackingLab  2 หลายเดือนก่อน

      Thanks Alberto! Is there something you would like me to create videos about?

  • @freark92
    @freark92 2 หลายเดือนก่อน

    Hey Umit,
    Nice channel!
    Really weird to be bored scrolling through TH-cam shorts and see a classmate from informatica 😂
    Good luck, Freerk

    • @MobileHackingLab
      @MobileHackingLab  2 หลายเดือนก่อน

      Hahaha that’s amazing to hear Freerk! Amazing to year from you again!

  • @iliyashahedi
    @iliyashahedi 2 หลายเดือนก่อน +1

    Awesome video 🙏🏼

  • @mirangoekpinar
    @mirangoekpinar 2 หลายเดือนก่อน

    👏🏼👏🏼

  • @0xcrypto
    @0xcrypto 2 หลายเดือนก่อน +1

    🙌

    • @MobileHackingLab
      @MobileHackingLab  2 หลายเดือนก่อน

      Thanks for the support @0xcrypto!