exploiting mobiles

18 views
Skip to first unread message

praveenkum...@gmail.com

unread,
Apr 11, 2020, 12:23:07 PM4/11/20
to noc19-cs6...@nptel.iitm.ac.in
Hi,

I have a question about what is happening in this video at 00:23:31 -

http://www.youtube.com/watch?v=chU9BJSFjcg#t=1411s.

by using these process can i exploit mobiles? is this applicable for devices present in different network?.

Thanks!



Reference Key - ahlqfnN3YXlhbS1ub2RlMS1wcm9kdWN0aW9uciILEhVTdHVkZW50UXVlc3Rpb25FbnRpdHkYgIDAk9S-3QgMogENbnNfbm9jMTlfY3M2OA
Reply all
Reply to author
Forward
0 new messages