Skip to playerSkip to main content
Watch how a simple fake notification can give a hacker full access to your phone — and how to stop it.
In this video I demonstrate a real-world notification hack and explain step-by-step how a malicious push notification can trick you into granting permissions or opening a backdoor. You’ll learn how notification hack techniques work, what signs to watch for.

Key phrases: notification hack — fake notification — device access via notification

Do this now: Check your browser notification settings, revoke suspicious permissions, and enable two-factor authentication. Share this video with friends — it could save someone’s data.

👍 Like — 🔁 Share — ✅ Subscribe for more mobile security tips
➤ Follow for updates: https://linktree.com/syedmhatim

Download Link: https://drive.google.com/file/d/1kZkDY-opxeN_N1nnu7UD9cVMyEy7lAVJ/view?usp=drive_link

More resources: Check your settings → Notifications → App permissions. If you see anything suspicious, revoke it immediately.

#notification #fake #mobilesecurity #cybersecurity #phone #hackers #ethicalhacking #hackingtips #viral #trending #trendingvideo #trendingshorts #viralvideos

How a Fake Notification Lets Hackers Take Control of Your Phone

Category

🤖
Tech
Transcript
00:00How can a browser notification you can hack your device?
00:07Today I will tell you that if a browser notification comes in your system
00:11If you click on it, then how can your device access to a hacker?
00:16But if you don't have a new channel, you can subscribe, then like and start the video.
00:20I have made a project that will be found in the description.
00:24First of all, we will open CMD here.
00:28After this, there will be an interface here.
00:31First of all, we have a virtual environment here.
00:34So, what do we need to do?
00:35Python-m-whenv
00:37So, I have my environment name is whenv.
00:40So, enter and click on it.
00:41There will be a little bit of environment here.
00:43Now, we will activate this environment.
00:45Here, we will type whenv.
00:48We will type whenv.
00:50Here, we will type the environment here.
00:53After this, we will install some requirements.
00:55So, we will use the tip to command here.
00:58install requirements.txt
01:00Then, we will use the type-r requirements.txt
01:04Then, we will type here.
01:06Enter and press enter.
01:07Here, there are some requirements.
01:08Requirements have been installed.
01:09Requirements have been installed.
01:10After this, we will have to do local to net.
01:12We will use the HTTP port.
01:14So, we will type for the remote to our сет.
01:17Local to net here.
01:18I will do local to net here.
01:20we will own the dashboard to get here.
01:21Local to net.
01:21Local to net.
01:22I have to open the dashboard to open.
01:22Local to net.
01:22I have to open the dashboard for these.
01:24We have to run the HTTP port here.
01:26So, I have to run the everything on which you can do.
01:27So, I have to run the 3000 port for this.
01:29If I have to use the new port to run.
01:30If I move the port for this.
01:31I will be the port for this.
01:32Delete after this.
01:32It will make the logout to a logout.
01:34Then, this has to load out
01:35After this, I have to create a new port.
01:36Then, it will find the port.
01:37Create HTTP.txt
01:38to be a not even as I've been यहां पर हमने जो प्रेब करने वह ए क्रेयर पर कर देंड़
01:47अब यहां पर हो चुक है अभी हमने अपना टोकन यहां से और पिक करना है अपना जो और यहां से को कॉपी करने लोकॉल टून
02:06now we have to go to add dot pipe and note pad
02:11here we have the keys to use the keys
02:16if it does not do work then we will go to our browser
02:18here we have to type the keys
02:19we have to type the keys to type the key
02:23we have to type the keys and we have to select email
02:25or email or click on internet
02:26so we have to replace this
02:31if you have to open admin panel
02:33I will open my admin credentials here, where we will know which victim has opened this link
02:40admin user, admin you can change it, or possibly you can change it
02:45I will give it all, after doing this, we will run it
02:49I will type python app.py, after doing this, it will start
02:54After starting, I will open it here, I will open it
02:57I will open it here, I will copy this link
03:01I will open it to you
03:04If there is a domain, you can use a hacker or domain, you can use a hacker
03:08You can use this, you can use this
03:10Like this, you can have a do you want to allow notifications
03:12I will use this in another system
03:14I will open it here, I will open it and this is a do you want to allow notifications
03:18After doing this, you will open it, you will open it
03:21We will open it to the system and type it
03:23It will be the admin panel
03:25We will use username and password
03:27has been made of my dash board to try to put on my own dashboard with my own
03:30dashboard now I will be able to send me the notification victim to
03:36be here with the title of my school in the school that will be the title of
03:40the description in the year I can upload this image from the upload of the
03:44information is the text now I will place the URL here on place and the URL
03:48malicious website or he has a link to this system in which the system
03:53a file injected which the system of the system will give us.
03:57Just example, I will give you a link.
03:59After this, I will tell you who has opened this link.
04:03Here we will list all the locations, the device information,
04:06which date has happened, which city and country,
04:09all the details of IP and location.
04:12After this, I will click to send to all.
04:16Here there is a notification that I will click.
04:19Here we will open it.
04:22Here we will open it.
04:24There will be a malicious website or file in your download register system,
04:28which you will know about the system of the hacker.
04:32You can use the wrong information.
04:35So, this is for today's video.
04:37Please do subscribe.
Be the first to comment
Add your comment

Recommended