Skip to content

Hacking

Hacking Android 12 - Motorola Edition (FRP Bypass)

Screenshot

In this guide, we will explore a method to bypass the Factory Reset Protection (FRP) on Motorola devices running Android 12. Specifically, we will focus on devices that have the GBoard app from Google pre-installed as the default keyboard. I have discovered a unique solution for this particular scenario, which has proven successful multiple times before

Please note that I have conducted all the procedures mentioned in this guide using a Motorola G50 device

Now, let's proceed with the method to bypass the factory reset protection on any Motorola device with the Google GBoard app installed as the default keyboard. By exploiting vulnerabilities in the GBoard app, we can crash it and gain access to the device's settings, effectively bypassing the protection. It's important to note that this method is specific to the current Android version (as of 2023-02-09) on the Motorola G50 device.

Tilgin TG275X Router Hacking Guide

Screenshot_20221111_205015

This guide provides step-by-step instructions on hacking the Tilgin TG275X Router from Bredband2. By following these procedures, you will gain access to advanced features and settings of the router. Please note that hacking or unauthorized access to routers without proper authorization is illegal and unethical. This guide is for educational purposes only.

Please note that attempting to hack or gain unauthorized access to any device or network is against the law and can result in severe legal consequences. Always ensure that you have proper authorization and follow ethical guidelines when conducting any security-related activities.

Police vs Hackers: Debunking Misconceptions

Screenshot

Being a programmer does not make you a hacker. The term "hacker" actually refers to a playful cleverness and appreciation for creativity. One can be skilled in programming without possessing this playful cleverness, just as one can exhibit playful cleverness in domains unrelated to programming. For instance, consider Ingram Marshall's composition titled "My end is my beginning," which is a palindrome. This piece of music showcases cleverness and serves as a true hack.

Have you come across news headlines that conflate hackers with criminals? Unfortunately, such headlines present a poor example and should be dismissed. It's crucial to differentiate between hackers and black hats. The term "hacker" is often misused to describe individuals engaged in phishing, trickery, or data forgery without genuine technical skills. These individuals, referred to as "Black Hats," may misuse user data similar to how a hacker manipulates a system, but they lack the true essence of hacking driven by skill and a love for computers. A hacker applies their skills either for malicious purposes or to test the limits of individuals. However, being a hacker encompasses more than just being an adept administrator or a knowledgeable gamer.

Harnessing Random Devices: Stay Invisible

How we could use random devices to stay under the radar and shift blame onto others, and everyone is responsible for their own setups, right?

It has never been easier to utilize random devices to protect ourselves from various threats or to remain unnoticed by installing proxies or simply forwarding them. Nothing surprises me anymore, as I have been around for too long to be surprised. This demonstration involves around 10-15 devices, just to give a glimpse of what is possible and how easily we can utilize any router out there to conceal ourselves from malware hunters and make our adversaries accountable for something they have no knowledge of as the device owners.

Malware hunters should really consider the implications before providing IP addresses to random servers during their analyses.

Hacking Inteno XG6846

Screenshot

The Inteno XG6846 is installed in millions of Swedish homes and sits between the router and the switch. With some operators, it's a requirement for watching TV. Now it's time to take control of this device!

In 2022, a new law was introduced in Sweden allowing the government to hack people's devices regardless of whether they are criminals or not. I don't think this is a good thing, so I took on this challenge as a fun project. Here are the results