Overview
Explore the vulnerabilities of smartphones through QR code exploitation in this comprehensive video. Learn how hackers can embed Wi-Fi backdoors into QR codes, enabling them to track targets and hijack data connections. Dive into topics such as hidden Wi-Fi networks, QR code generation, Wireshark tracking, Huhnitor usage, and rogue access point creation. Gain insights into the potential security risks associated with smartphone convenience features and understand the techniques used by malicious actors to compromise mobile devices.
Syllabus
Countdown
Intro
Hidden WiFi Networks
Generating QR Codes
Wireshark Tracking
Huhnitor
Rogue Access Point
Closing Thoughts
Taught by
SecurityFWD