Professional Documents
Culture Documents
• You can view and manage any function a phone does, including
Facebook messenger.
• Spy on chats
• Go to http://twitterhacking.com/hack‐twitter.
• Information Gathering
• Passive reconnaissance
• Active reconnaissance
• Calling help desk, daily routines, port scans and checking for
flaws to produce errors.
• System Administrator
• Network Attacks
• Host Attacks
• Mobile Attacks
• Escalate Privileges:
DrSuggs@DuchessofCybersecurity.com