Enjoy Better Technology!: Tech Geek Tutorial - Android Hacking BOOK 1 Hi-Tech
Enjoy Better Technology!: Tech Geek Tutorial - Android Hacking BOOK 1 Hi-Tech
http://www.facebook.com/HitechPh
1
3 AUDIOBOOK COLLECTIONS
6 BOOK COLLECTIONS
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
Table of Contents
Introduction .................................................................................................................................................. 4
About Hi-Tech ............................................................................................................................................... 4
Part 1: Tweaking Android - Boost ................................................................................................................. 5
Part 2: Android Rooting – Gain Root............................................................................................................. 7
How to Root? ............................................................................................................................................ 7
My Device is Rooted, Now what? ............................................................................................................. 7
Part 3: The Busybox & Terminal Emulator .................................................................................................... 8
Terminal Emulator Commands ................................................................................................................. 8
Part 4: Block unwanted Wi-Fi users .............................................................................................................. 9
Detailed Steps for blocking unwanted Wi-Fi users ................................................................................... 9
Part 5: Virtual Private Network (VPN)......................................................................................................... 10
Easy VPN installed!.................................................................................................................................. 10
What is VPN and how does it work? ....................................................................................................... 10
Part 6: The Deep Web – TOR Network ....................................................................................................... 14
Why Should I use TOR? ........................................................................................................................... 14
Wait, what is Deep web anyway? ........................................................................................................... 14
How to connect to TOR and access Deep Web? ..................................................................................... 15
Let the fun begin!........................................................................................................................................ 15
Part 7: Control a computer using Android .................................................................................................. 16
Part 8: Unlimited Game Resources ............................................................................................................. 18
Where to download GameGuardian ....................................................................................................... 18
How to use Game Guardian? .................................................................................................................. 18
Part 9: The Lucky Patcher............................................................................................................................ 19
Part 10: Android Malwares – Ghost push ................................................................................................... 20
How is this part of hacking? .................................................................................................................... 21
Let’s get started! ..................................................................................................................................... 21
Part 11: Recover or Shred deleted files ...................................................................................................... 21
How to recover deleted files? ................................................................................................................. 21
How to shred deleted files? .................................................................................................................... 21
Alternative Recovery apps ...................................................................................................................... 21
Part 12: Fixing bootloop (soft brick) ........................................................................................................... 22
2
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
What is bootloop?................................................................................................................................... 22
What is the cause of Bootloop? .............................................................................................................. 22
How to fix? .............................................................................................................................................. 22
Warning: This tutorial may not be compatible with all Android devices. ...................................... 22
Requirements.................................................................................................................................... 23
About the author ........................................................................................................................................ 23
3
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
Introduction
Almost everyone in the today wants to know hacking and almost 70% of the population
are using android. That’s why I created this tutorial for everyone who wants to learn
hacking using their Android Smart phones. Android is based on the Hacker’s Favorite OS:
Linux, that’s why it is possible to use android as your new hacking device. This tiny device
can become deadly if misused. This book however, deals with simple tricks that many
people must have already known.
So, you are reading this book huh? Do you want to be a hacker? Well, after reading the
entire book, you will learn a lot of tricks your tiny device can do. This book is your stepping
stone to become an Android enthusiast.
No one is Perfect, even android. This book will also deal with the security flaws of android
and how to use them in hacking and how to fix these flaws to prevent others from hacking
you. I really hope that you will enjoy reading and learning from this book.
Why do you want to be a hacker? Of course! Why not? Hackers are the ninjas of the 21st
Century! We can do a lot of things which normal people can’t. There are 2 different types
of hackers though: The Ethical and the Unethical. Ethical Hackers are hackers who hack
to help people. Unethical Hackers on the other hand are the opposite of helping; they can
destroy lives and are the reason why the word “Hacker” gained bad reputation. This book
combined the both ethical and unethical way of hacking for you to learn how both hackers
work. It is then up to you if you want to be ethical or unethical type of hacker. Me? I’m an
ethical hacker, and I want to help you learn hacking too! Well, hacking is a broad word.
In order to be a hacker, one must be knowledgeable enough about computer’s flaws and
fixes. I want you to learn hacking in order for you to help people around the world too!
Because I want everyone to enjoy better technology the way it supposed to be…
About Hi-Tech
Hi-Tech is a business partnership that aims to help people enjoy technology the way it
supposed to be, located at: Capitol University, Philippines. Visit our Official Facebook
page to get InTouch with us! Visit our Website to download and install our Softwares!
4
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
Before learning hacking, let’s make sure that your device is responsive and free
from lags. To do this, you need to tweak your device. This tutorial is for non-Rooted
devices. First things first, let’s ask: what causes android to lag? “Your Android phone was
probably fast when you first bought it, right? Then over time it began running more slowly.
This is a common problem and nothing to worry about.” -Scott Adam Gordon
(www.androidpit.com). There are common reasons why your device is lag such as: It can
be cause by an App, Too many applications running on background, and/or the system
itself.
HOW TO FIX
You need to sacrifice your apps to gain speedy performance for your device.
If you have Facebook app or Facebook messenger installed, you need to
say goodbye to them (Unless if you’re not ready to move on...).
If you don’t want to uninstall applications, you might consider stopping these
applications from running on background. To do this, go to settings>Apps>
then choose any app then tap “Force stop”.
Freezing applications/Disabling can be useful if you think that you’re not
using a system app often. Go to settings>apps>System Apps> then select
any apps then tap on Disable. NOTE: Some System Apps cannot be
disabled because if they do, you might end up bricking your device. These
methods are completely safe to do.
5
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
Disabling animations could help your device run faster. To do this, you need to enable
Developer Option. On Android 4.2 and higher, you must enable this screen as
follows:
Note: If your device is lower than version than 4.2, search online on how to enable
Developer Option.
There you go! Your device should be faster now! If you still don’t feel any difference, don’t
worry this is not hacking yet. Later, we’ll going to hack your device’s system.
6
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
WARNING: Search online on the Pros and cons of Rooting before rooting your device!
Rooting may void your warranty and worst? You may end up bricking your
device!
“Rooting is a process that allows you to attain root access to the Android operating
system code.” - www.bullguard.com
How to Root?
The easiest way to Root your android device is to install a 3rd party application on
your android. I recommend KingRoot Download Kingroot app on their official website at
https://kingroot.net/. The alternative app for KingRoot is KingoRoot which is also
available for download on their official website at http://www.kingoapp.com/. Choose any
of this two Rooters then install the apk file to your device then open the app and enjoy!
NOTE: You need to be connected to a Wi-Fi upon the process of rooting.
Let’s check if your device is rooted, Download Root Checker on Google play and run,
then allow Root checker to gain Root permission (if prompted).
However, Root alone doesn’t do any functionality unless you install apps that use Root
permissions.
7
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
Install Busybox and Terminal Emulator from Google Play. Open Busybox and press the
install button.
NOTE: The Busybox is not the app but the file that has been extracted by the Busybox
app to your device’s /system/bin or /system/xbin. After pressing the install button of
Busybox, you can uninstall the app from your device but keeping the app installed will
notify you for new versions of Busybox.
Now, let’s see if Busybox in installed in your device, open Terminal Emulator app then
type busybox. It should look like this picture below.
Reference: https://forum.xda-
developers.com/wiki/Guide:Using_the_Terminal
Tip: How to remove lag/boost your device using terminal emulator
8
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
To protect yourself from Netcut, install “Arp Guard” on Play Store and set your
preferences then activate Arp Guard. Netcut users will not be able to block you anymore
NOTE: Don’t use Netcut on public Wi-Fi because it is easy for the authorities to trace you
if you do! This Tutorial may be illegal in your country, please proceed with caution.
WARNING! In no instances will Hi-Tech nor will the author of this tutorial be held liable if
you use this tutorial the wrong way.
9
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
On some countries like as Turkey, China, and Iran are blocking Facebook, Twitter, and
YouTube and if you are in any of this countries, you may not be able to access your
favorite sites. The only way to unblock them is by using VPN. For this Tutorial I
recommend using Easy VPN, here’s the link:
https://play.google.com/store/apps/details?id=easyvpn.free.vpn.unblock.proxy&hl=en
NOTE: Some VPN apps gives free Internet access but not for this tutorial.
Source: https://gizmodo.com/5990192/vpns-what-they-do-how-they-work-and-why-
youre-dumb-for-not-using-one
For as ubiquitous as connectivity has become and how reliant we've grown on it, the
Internet is still a digital jungle where hackers easily steal sensitive information from the
ill-equipped and where the iron-fisted tactics of totalitarian regimes bent on controlling
what their subjects can access are common. So instead of mucking around in public
networks, just avoid them. Use a VPN instead. Between Wi-Fi spoofing, Honeypot
attacks, and Fire sheep, public networks really are cesspools. But if you're working
remotely and need to access sensitive data on your company's private servers, doing so
from an unsecured public network like a coffee shop Wi-Fi hotspot could put that data,
your company's business, and your job at stake.
VPNs, or Virtual Private Networks, allow users to securely access a private network and
share data remotely through public networks. Much like a firewall protects your data on
your computer, VPNs protect it online. And while a VPN is technically a WAN (Wide
10
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
Area Network), the front end retains the same functionality, security, and appearance as
it would on the private network.
For this reason, VPNs are hugely popular with corporations as a means of securing
sensitive data when connecting remote data centers. These networks are also becoming
increasingly common among individual users—and not just torrenters. Because VPNs
use a combination of dedicated connections and encryption protocols to generate virtual
P2P connections, even if snoopers did manage to siphon off some of the transmitted data,
they'd be unable to access it on account of the encryption. What's more, VPNs allow
individuals to spoof their physical location—the user's actual IP address is replaced by
VPN provider—allowing them to bypass content filters. So, you may live in Tehran but
appear to live in Texas, enabling you to slip past the government filters and commit the
treasonous act of watching a YouTube video. The horror.
Establishing one of these secure connections—say you want to log into your private
corporate network remotely—is surprisingly easy. The user first connects to the public
internet through an ISP, and then initiates a VPN connection with the company VPN
server using client software. And that's it! The client software on the server establishes
the secure connection, grants the remote user access to the internal network and—
Bing, bang, boom—you're up to your elbows in TPS reports. The horror.
11
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
Many security protocols have been developed as VPNs, each offering differing levels of
security and features. Among the more common are:
Secure Sockets Layer (SSL) and Transport Layer Security (TLS): SSL and
TLS are used extensively in the security of online retailers and service providers.
These protocols operate using a handshake method. As IBM explains, "A HTTP-
based SSL connection is always initiated by the client using a URL starting with
https:// instead of with http://. At the beginning of an SSL session, an SSL
handshake is performed. This handshake produces the cryptographic
parameters of the session." These parameters, typically digital certificates, are
the means by which the two systems exchange encryption keys, authenticate the
session, and create the secure connection.
12
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
eclipsed by new methods, the protocol remains a strong one, albeit not the most
secure.
Secure Shell (SSH): SSH creates both the VPN tunnel and the encryption that
protects it. This allows users to transfer information unsecured data by routing
the traffic from remote fileservers through an encrypted channel. The data itself
isn't encrypted but the channel it’s moving through is. SSH connections are
created by the SSH client, which forwards traffic from a local port one on the
remote server. All data between the two ends of the tunnel flow through these
specified ports.
These SSH tunnels are the primary means of subverting the government content filters
described earlier. For example, if the filter prohibits access to TCP port 80, which
handles HTTP, all user access to the Internet is cut off. However, by using SSH, the
user can forward traffic from port 80 to another on the local machine which will still
connect to the remote server's port 80. So as long as the remote server allows outgoing
connections, the bypass will work. SSH also allows protocols that would otherwise be
blocked by the firewall, say those for torrenting, to get past the wall by "wrapping"
themselves in the skin of a protocol that the firewall does allow.
To actually create the VPN tunnel, the local machine needs to be running a VPN
client. Open VPN is a popular—and free—multi-platform application, as is LogMeIn
Hamachi. Windows users also have the option of using the native OS VPN client.
So whether you're a cubicle monkey, file pirate, or just don't want The Man getting all
grabby with your personal data, virtual private networks are the best means of securing
traffic short of copying it to a flash drive and driving there yourself.
13
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
- https://en.wikipedia.org/wiki/Tor_(anonymity_network)
14
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
15
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
Note: If you noticed, Websites that are only reachable through TOR ends with .Onion
extensions.
Yes! It is possible! But not without the help of softwares though. In this Tutorial, we are
going to use “Splashtop.” First things first, open your computer then download and install
Splashtop on your PC, here’s the link: https://www.splashtop.com/downloads
Note: You PC and Android device must be connected to the same Network/Internet in
order to work. You might need to create an account to use Splashtop.
Well, figure it out yourself! I wanted to surprise you of what else Splashtop can do.
The ability to control on Android device with another can be helpful in many situations.
For example, if you're streaming something to your Android TV stick, you might want to
control it from your Android tablet or phone. Well, Android doesn’t disappoint. There are
apps for Android that can let you control one Android device with another. You can easily
download apps like Tablet Remote or RemoDroid to do so.
16
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
6. Link the two devices. Tap the back button of the controlling device and tap
“Stream.” A notification “RemoDroid server started” will appear. This means your device
is ready as the controller. An IP address of the phone will be displayed at the bottom of
the screen. Take note of the IP address.
17
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
Tap “Connect” in the device you want to control. A menu will pop up. Here, enter the IP
address and port of the controller device in the space provided. Afterwards, tap
“Connect” to link the two devices.
7. Begin controlling the other Android device. Exit the apps on both devices by
tapping the Home button. The screen on the controlling device will display the screen of
the device being controlled. Swipe across the screen, and use your controlling device
as you would normally do. You will see the same functions occurring in the device being
controlled.
To disconnect the devices, tap “Stop streaming” in the controlling device.
Source: https://www.wikihow.tech/Control-One-Android-Device-with-Another
2. Go to https://gameguardian.net/download
Some Android Games are hard to hack, if you are on that case, you might consider
downloading modified version of your Game at https://www.apklover.net
18
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
The first and foremost features of Lucky Patcher are its proficiency to remove
and delete all the advertisements from the Android apps.
This tool also allows you to modify apps permission.
It also allows you to remove license verification from the specified apps which
mean downloading apps from other sites instead of Google Play Store will lead to
license verification failed.
With the help of this tool, you can remove all the pre-installed apps on your
Android devices.
You can have rooted and un-rooted devices to make use of all the features. You
can get all the list of your installed apps once you install and use Lucky Patcher.
It is very easy to use, and on a single screen, you can control all your apps that
are available on your device.
19
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
Ghost Push is a family of malware that infects the Android OS by automatically gaining
root access, downloading malicious software, masquerading as a system app, and then
losing root access, which then makes it virtually impossible to remove the infection even
by factory reset unless the firmware is reflashed. The malware hogs all the system
resources, making the phone unresponsive and draining the battery. Advertisements
continually appear either as full or partial screen ads or in the status bar. Unwanted
apps and malicious software are automatically downloaded and installed when
connected to the internet. The malware is hard to detect.
Source: https://en.wikipedia.org/wiki/Ghost_Push
20
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
I am a victim of this malware too and it took me a week before I discovered the tool to
remove this malware.
21
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
2. Photo Recovery
6. GT Recovery
8. Undeleter (This one is the most effective but the recovery features are paid)
What is bootloop?
It is when your Android device is stuck on device’s boot a.k.a stuck at Logo problem. This
often happens when you tampered something on your device’s system files. On some
cases, there are unrooted Android devices that experience bootloop because of factory
defect; but normally, bootloop happens only on rooted devices. Some people call this
problem as soft brick, because the device is not totally bricked at all, it is half dead
though…
- https://www.smallbusiness.chron.com
How to fix?
Warning: This tutorial may not be compatible with all Android devices.
For this tutorial, we are going to use SP flash Tool. SP Flash tool is an application you
could find very useful in fixing extreme cases of a bricked MTK Android (e.g
22
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
Tecno, Gionee, Infinix, Opsson, Innjoo etc) like the phone not coming on at all or not
booting into recovery mode etc.
Requirements
Your Android Smartphone should have at-least 40-50 percent of battery to perform the
Flashing Process.
Bitcoins address:
36vLdoJg835eia62f3MyncLHr4rNsiCzz
NOTE FROM THE AUTHOR: All of the tutorials of this books are mostly taken from
website tutorials and are inspired by an ethical hacker named Xeus. This ebook also deals
with unethical hacking which can be illegal to some countries, I will hold no responsibility
on what will happen to you if you use the tutorial the wrong way!
This ebook does not deal with serious hacking yet. It is only an introduction to the real
hacking thing. You are allowed to modify and edit the contents of this file. You can share,
print and/or reproduce the file if you like.
23
Tech Geek Tutorial – Android Hacking BOOK 1 Hi-Tech
You can donate any amount to the author by scanning the QR code below with Coins.ph
app
24
This book was distributed courtesy of:
For your own Unlimited Reading and FREE eBooks today, visit:
http://www.Free-eBooks.net
Share this eBook with anyone and everyone automatically by selecting any of the
options below:
COPYRIGHT INFORMATION
Free-eBooks.net respects the intellectual property of others. When a book's copyright owner submits their work to Free-eBooks.net, they are granting us permission to distribute such material. Unless
otherwise stated in this book, this permission is not passed onto others. As such, redistributing this book without the copyright owner's permission can constitute copyright infringement. If you
believe that your work has been used in a manner that constitutes copyright infringement, please follow our Notice and Procedure for Making Claims of Copyright Infringement as seen in our Terms
of Service here:
http://www.free-ebooks.net/tos.html
3 AUDIOBOOK COLLECTIONS
6 BOOK COLLECTIONS