ANDROID MOBILE HACKS WITH ANDROID DEBUG BRIDGE(ADB) — PART II
Earlier in we have shown adb hacks which are used in testing or foot printing phases. That how adb (android debug bridge) can be used in gathering information of any mobile device. Type of companies who manufacture chip using ARM instructions. adb has various uses specially if the device is rooted. According to ethical hacking researcher of International of Cyber Security If you are using adb on non-rooted devices many features won’t work. Today we will show some another adb uses.
Byass Android Lock Screen :-
- For testing we are using Samsung I9060 with flashed ROM of Android 4.4 Kitkat version. Configure your mobile device with computer.
- Earlier we have set pattern of lock screen. Below you can see that we set screen lock with pattern.
- Above you can see the mobile is unlocking with different patterns. In the background lock screen key configuration file is removed. As we removed config file. Screen lock is just a palette which is running without any configuration file or any blackend code.
- If you develop any android application. You will notice android palette in android studio. Android studio palette contains different buttons, views which are used in designing any android application.
List Ongoing Processes in adb :-
Get Details of Any Running Process :-
Drop Down the Status Bar With Adb Command :-
Wake Up Or Sleep Your Mobile Device :-
Run Netstat To Display TCP Connections :-
Connect Wirelessly With Mobile Device Throught adb :-
- For connecting your mobile wirelessly. You need to connect your computer & your mobile device on same network.
- Type adb connect <Your IP address>
Originally published at https://www.securitynewspaper.com on July 30, 2019.