Apple How can multiple phones be tapped and used remotely?

Nerdtendo

Your friendly neighborhood idiot
OP
Member
Joined
Sep 29, 2016
Messages
1,768
Trophies
1
XP
4,628
Country
United States
No, I'm not looking to stalk someone. My friend and her family just had their phones hacked and I'm wondering how it was possible. There are 4 phones total. All of them were on the same plan. They started noticing weird things happening to their phones. For example, my friend's phone would unlock itself, navigate to random apps and/or begin typing. The tracking app they all have showed their phones in the same location very far from where they actually were. They went to the place shown and they found this kid from my friend's, sister's, school who admitted to hacking their phones. He's buying new ones for all of them, but I'm extremely curious to know what happened. I don't know all the details. All I know is that all 4 phones were hacked in some capacity. Some Google searching shows that to have one iPhone, you need to jailbreak it or duplicate the Sim card but I don't see how the kid could've gotten his hands on all 4 phones...
 

The Real Jdbye

*is birb*
Member
Joined
Mar 17, 2010
Messages
23,252
Trophies
4
Location
Space
XP
13,805
Country
Norway
No, I'm not looking to stalk someone. My friend and her family just had their phones hacked and I'm wondering how it was possible. There are 4 phones total. All of them were on the same plan. They started noticing weird things happening to their phones. For example, my friend's phone would unlock itself, navigate to random apps and/or begin typing. The tracking app they all have showed their phones in the same location very far from where they actually were. They went to the place shown and they found this kid from my friend's, sister's, school who admitted to hacking their phones. He's buying new ones for all of them, but I'm extremely curious to know what happened. I don't know all the details. All I know is that all 4 phones were hacked in some capacity. Some Google searching shows that to have one iPhone, you need to jailbreak it or duplicate the Sim card but I don't see how the kid could've gotten his hands on all 4 phones...
It's pretty easy if you can get physical access to the phones, even if just for a minute, to install some sort of backdoor. I'm pretty sure he must have had physical access to the phones at some point.
Weird that it showed the location pointing to him though.
 

Nerdtendo

Your friendly neighborhood idiot
OP
Member
Joined
Sep 29, 2016
Messages
1,768
Trophies
1
XP
4,628
Country
United States
It's pretty easy if you can get physical access to the phones, even if just for a minute, to install some sort of backdoor. I'm pretty sure he must have had physical access to the phones at some point.
Weird that it showed the location pointing to him though.
According to her "there is no way he could've gotten my phone." Is there some way to do it remotely? Maybe through the phone line?
 
Last edited by Nerdtendo,

FAST6191

Techromancer
Editorial Team
Joined
Nov 21, 2005
Messages
36,798
Trophies
3
XP
28,321
Country
United Kingdom
"He's buying new ones for all of them"
If it can be installed it can be uninstalled.
Equally you know the thing where some scammer pretends to be... your bank and gives you a number to call back on to be sure it is them? If they are going to go to a shop, have others pick them out and slap some cash/cards down then OK, otherwise it might become one of those "fool me once"/"I told you so" situations.

Also "there is no way he could've gotten my phone." is about as reliable coming from the average person as "I don't know how it broke" or "I tried everything to fix it", which is to say always assume the person before you (even if it is was you) was an idiot or lying. Now prying a phone from a modern teenage girl's hands is no mean feat but it is far from impossible.
 
  • Like
Reactions: Jiehfeng

Nerdtendo

Your friendly neighborhood idiot
OP
Member
Joined
Sep 29, 2016
Messages
1,768
Trophies
1
XP
4,628
Country
United States
"He's buying new ones for all of them"
If it can be installed it can be uninstalled.
Equally you know the thing where some scammer pretends to be... your bank and gives you a number to call back on to be sure it is them? If they are going to go to a shop, have others pick them out and slap some cash/cards down then OK, otherwise it might become one of those "fool me once"/"I told you so" situations.

Also "there is no way he could've gotten my phone." is about as reliable coming from the average person as "I don't know how it broke" or "I tried everything to fix it", which is to say always assume the person before you (even if it is was you) was an idiot or lying. Now prying a phone from a modern teenage girl's hands is no mean feat but it is far from impossible.
All valid points, but keep in mind that 2 out of the 4 people have never even seen this kid. The "buying new phones" struck me as odd though. I suppose the parents were paranoid or maybe the hacker's parents enforced it as a punishment.
 

LineoftheDead

Well-Known Member
Newcomer
Joined
Oct 24, 2015
Messages
84
Trophies
0
Age
33
XP
216
Country
United States
Knowing exactly what method was used is up in the air. if you are interested in hacking I would suggest downloading "Kali" and trying it out. Getting on the same network is key, SET or Metasploit can be easily used to compile device updates///Push APKs that allow functionality like taking snapshots of a victim or grabbing all contacts. MitM attacks are favorable... bypassing https to cleartext credentials, setting landing page to hooks.......... yeaaaaahhhhh..... pineapples are great for spoofing a network the phone is looking for (like a home network) if wifi is left enabled

I've only hacked android phones, but im sure its gonna be similar for iPhones.
-----
How its generally gonna work...
Hmmmm, I wonder if I can..... (5 hours later), IT WORKED!
Well now I wonder if I can..... (5 hours later), holy shit, it worked!
*go mad with progress

at a certain point in time you will want to repeat your method on someone elses device for lulz

Blackhat = if you do it without permission (illegal)
Whitehat = if you do it with permission (legal)
-----
The reason they got new phones was because the hacker did not want to lose in court (cuz he still can)

for iPhone maybe a MitM with a hook, redirect to a site to sideload an .ipa, all 4 then stupidly hit trust? maybe an MDM profile? I haven't hacked any iPhones, so I really dont know.... metasploit would be used for generating payloads, but I think you could only use this if it was jailbroken. MitMf is popular to redirect traffic from you (the Host/AP) to the Internet, this will work without jailbreak. BeEF for hooks, landing pages are created on the Attackers machine that redirect to BeEF hooks where you can do fun stuff

Old video, same concept - waaaaay too many possibilities man
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    ZeroT21 @ ZeroT21: probably watched one too YT vids bout old grannies