Главная
Study mode:
on
1
Countdown
2
Intro
3
Hidden WiFi Networks
4
Generating QR Codes
5
Wireshark Tracking
6
Huhnitor
7
Rogue Access Point
8
Closing Thoughts
Description:
Explore the vulnerabilities of smartphones through QR code exploitation in this comprehensive video. Learn how hackers can embed Wi-Fi backdoors into QR codes, enabling them to track targets and hijack data connections. Dive into topics such as hidden Wi-Fi networks, QR code generation, Wireshark tracking, Huhnitor usage, and rogue access point creation. Gain insights into the potential security risks associated with smartphone convenience features and understand the techniques used by malicious actors to compromise mobile devices.

Hacking Smartphones with QR Codes

SecurityFWD
Add to list
00:00
-09:51