DEV Community

Bpass25
Bpass25

Posted on

Is it actually possible to hack a device without privileges? And at the same time, is it possible to hack a device without pressing install? (Android)

Yes, it's possible, but how? Look, my friend, yes, it's possible, and this depends on whether the system is being targeted. But we'll talk about the Android system because most people like to exploit or manipulate it, and this is common. Anyway, we'll discuss it in two ways:

1- You need to be a programmer who knows how to program Android applications (and this is important; the most important thing in the world of technology in general is programming, the most important point). For example, (Java, Kotlin, Dart, etc.). So, you either create a complete payload but with a vulnerability (what does that mean?). You make the payload you created vulnerable, but it won't have any control at the moment (you upload the control files to an external server). Then you get a legitimate version specific to Android (like Chrome or another browser). The important thing is that it's something known to the system and documented. Then you merge this payload application with Chrome (and ideally, a version that's already vulnerable, meaning the browser version or other version has a serious vulnerability that was discovered previously). Here, you won't get a security logo or anything. You need permissions because they're already granted to the program you're going to download, and many people use it because it will be updated regularly. Therefore, you'll be downloading files online to this application, and your situation will become "full."

2- Via a payload exploiting another program (what does that mean?) This means that you have a popular or well-known application that has been granted all or certain permissions. Instead of requesting permissions from the user to use that application's permissions, as soon as the person installs the payload, they will gain access to your device. (You might say this is a given for everyone.) I say no. (It could be a corrupted version, a zero-day vulnerability, or an application that allows sharing with other applications.)

  • Regarding the question of whether a device can be hacked without (pressing the install button and without anything related to the IP address or anything else)

Theoretically, it's possible, but practically, in our current era, from the beginning of technology until now, no one has spoken about it or A method has been published, but there's ongoing research by his team. We can say, as a preliminary principle, that it has a general idea:

1- By finding a vulnerability in the system (Now you're asking, "How can a system install an application that you've simply saved on your device or downloaded and placed in a specific location?") It's possible, but under certain conditions. You need to find a vulnerability in the system itself. Currently, the company has the ability to download any application to the system without your knowledge, or even with your knowledge, and install it on your device without your permission, while also granting full privileges (this is something we can say is very difficult).

2- Through system updates. This idea is also possible. You could install a program that requests a fake device update, but through it, the application is installed (this is practically possible, but it requires expertise).

3- Through an application that already has the capability and that you've granted permission to install on your device, such as sharing applications and hacking applications like Lucky Patcher, etc. (This is theoretically and practically possible, but more difficult compared to option 2.)

I hope this information has been helpful. If there are any problems or specific points, please excuse me; we are all seekers of knowledge. Thank you.

Top comments (0)