The following description comes from the Google Play Store description of the app:Your "how-to" searches stop here!
The HackBook offers more than 50 of the most reliable step-by-step hacking tutorials for users of all skill levels.
Some popular HackBook tutorials include, how to:
• Crack a Gmail, Hotmail, and Microsoft Live password
• Perform a DoS attack
• Crack WEP and WPA/WPA 2 encryption
• Crack a Mac OS X administrator account password
• Sniff usernames and passwords
• Eavesdrop on VoIP phone calls
• Install BackTrack 5 on an Android device
• Perform a phishing attack over a LAN and a WAN
• Crack a password-protected zip file
• War drive with an Android device
• Install BackTrack 5 on a virtual machine
• Create a wordlist or dictionary file
Unlike other hacking tutorials and references apps, the HackBook provides a list of prerequisites at the beginning of each tutorial so you don't have to question whether or not you're equipped to complete a tutorial.
• Dozens of video tutorials and written tutorials
• Useful resources and guides for beginners
• An easy-to-use Linux command dictionary and terminology guide
• Get notified when a new tutorial or guide is added to the HackBook
• Stay connected with the HackBook and its author through built-in social media such as Facebook, Twitter, and Wordpress
• Submit feedback and tutorial requests from within the app
• Download HD wallpapers and images from the photo gallery
|Precise location (gps and network-based)||Can use user's precise location||Internal|
|Can use user's precise location||It appears this app uses this data for market/customer analysis|
|Full network access||Can access the internet||It appears this app uses this data for internal use within the app's functionality|
|Can access the internet||It appears this app uses this data for mobile analytics|
|Can access the internet||It appears this app uses this data for social networking services|
|Can access the internet||It appears this app uses this data for targeted advertising|
|Can access the internet||It appears this app uses this data for utility purposes|
|Directly call phone numbers||Can call phone numbers||Not analyzed yet|
|Write call log||Can change your device’s call log including incoming and outgoing calls data||Not analyzed yet|
|Mock location sources for testing||Create mock location sources for testing or install a new location provider. This allows the app to override the location and/or status returned by other location sources such as GPS or location providers.||Not analyzed yet|
|Modify or delete the contents of your usb storage||Can write to your phone's USB storage||Not analyzed yet|
|Read call log||Can read your device’s call log, including incoming and outgoing calls||Not analyzed yet|
|Modify your contacts||Can edit contacts on device||Not analyzed yet|
|Read your contacts||Can read user's contact list (phone book) and phone call history||Not analyzed yet|
|Read phone status and identity||Can read phone's current state information like in-phone call, phone signal, carrier, device ID, and phone number||Not analyzed yet|
|Add or modify calendar events and send email to guests without owners\' knowledge||Allows an application to write the user's calendar data.||Not analyzed yet|
|Read calendar events plus confidential information||Allows an application to read the user's calendar data.||Not analyzed yet|
Version of the app analyzed:
App was last analyzed by Privacy Grade on:
Why does this app have this grade?
Our method for grading apps uses a privacy model that we built. This model is based on crowdsourced surveys that we conducted to capture people’s expectations and comfort levels with various app behaviors.
See the sensitive permissions table below the app description to see the permissions that made users of the app uncomfortable.
If you have issues about the information on this page, click the button below to send us feedback.Send Us Feedback