Continue to Site

Welcome to EDAboard.com

Welcome to our site! EDAboard.com is an international Electronics Discussion Forum focused on EDA software, circuits, schematics, books, theory, papers, asic, pld, 8051, DSP, Network, RF, Analog Design, PCB, Service Manuals... and a whole lot more! To participate you need to register. Registration is free. Click here to register now.

Android Phones Remotely Accessed.

Status
Not open for further replies.

Prashantakerkar

Member level 4
Joined
Apr 19, 2018
Messages
71
Helped
0
Reputation
0
Reaction score
1
Trophy points
8
Activity points
479

I would like to know whether once the Android phone is remotely accessed from the above methods, one can also call phone numbers using the phone dialler keypad of that Android phone?

Thanks & Regards,
Prashant S Akerkar
 

Attachments

  • images - 2021-08-10T221216.523.jpeg
    images - 2021-08-10T221216.523.jpeg
    7.5 KB · Views: 144

Thanks.

My requirement was as follows.

Steps

1 Installing TeamViewer on both the Android smartphones say users
A & B.

2 Taking remote access of Android Smartphone by User A from User B. i.e. User A accesses User B' s Smartphone remotely.

3 Access the phone app of the Android of User B remotely and call different phone numbers from the contacts list.
The User A should be able to hear the ring tones of User B' s Smartphone when the dialling took place and the receiver who picks up the phone calls from User B' s Smartphone which was accessed remotely by User A.

i.e. User A accessing User B' s Smartphone remotely and then dialling people using the phone app of User B' s Smartphone .

Thanks & Regards,
Prashant S Akerkar
 
Last edited:

Hi,

May I ask why User A would want or need to do that?

It doesn't sound ethical the way it is described, suspicious - certainly, it sounds like hacking and spoofing and causing User B a lot of problems.
 
Hi,

May I ask why User A would want or need to do that?

It doesn't sound ethical the way it is described, suspicious - certainly, it sounds like hacking and spoofing and causing User B a lot of problems.
Thanks.

Note: User A is taking the permissions to access Smartphone from User B. User B is giving the consent for access to User B. This is not classified as Hacking by User A.

Thanks & Regards,
Prashant S Akerkar
 
Status
Not open for further replies.

Part and Inventory Search

Welcome to EDABoard.com

Sponsor

Back
Top