Cerberus, anti-theft application / location resistance reset

Hi friends, in this video tutorial I will present Cerberus, an Android app that provides superior protection burglar / location / gathering evidence for cases where your phone is lost or stolen, even if a factory reset of your phone or tablet. Bonus Cerberus application can function as a genuine Keylogger if you want it.
Cerberus app is very well designed and virtually impossible to get rid of it unless you flash another rom uiesti. The owner will have more time to locate stolen phone more tool to gather evidence against the thief and learn his route. Promises tough times for thieves, they must learn to flash ROMs uiasca if they want to stay in business.
Other similar applications can not provide such protection, were removed immediately cease to provide data. It is normal for a person to buy a stolen phone to reset it or change google account, so such applications are totally useless. Cerberus is different.
Cerberus location and anti-theft software can be found in the Google Play Store, but that version does not offer protection beyond the "Factory Default" reset. For total protection you must install the .zip version by recovery, a version that sticks to the space protected by the system and cannot be deleted even in case of a total reset.
Understood is that you must have rooted phone and a custom recovery.
Cerberus needs root to execute certain tasks remote, I mean remote wipe the phone memory and SD card.
With the web interface you can take pictures of the thief, you can record audio, you can shoot everything remotely via a simple web page.
How to install?
1. Make sure you have your phone rooted and a custom recovery installed.
2. Enter the google play store and download / install cerberus
3. Open Cerberus and create an account
4. Go to the Cerberus website and log in with the account you created
5. Make sure your phone is visible in the web interface on Cerberus site
6. Set your dialer password (the one that wakes up the application)
7. Uninstall Cerberus
8. Go to the cerberus site and zip download site suitable for your version of android.
9. Enter recovery and flash the cerberus zip
10. Turn on the phone and make sure that your phone is detected on site Cerberus
11. Check the "cerberus awakening" in the dialer
11. Wait for the thief….
Cerberus Official Site
Help Page Cerberus
Zip Cerberus sites (For flash in recovery) (resist reset)
Cerberus in play store (Not withstanding reset)
UPDATED August 30 2014
ART execution mode to tracking mobile net 2G / 3G or 4G, Cerberus works strange, instead it is the wifi works well. We recommend using only DALVIK for your peace. Probably will fix soon, probably with the first update. Until then it is best to keep DALVIK execution mode.


Cristian Cismaru: I like everything related to IT&C, I like to share the experience and information I accumulate every day. I'm learning to teach you!

View Comments (59)

  • Hello . I want to add to your presentation which is incomplete .. and please study and make a continuation that you did not present the true value of the program ..
    In the settings of the SIM card configuration (it is the most important thing of the program) 3 phone numbers will be entered which when the thief changes the sim (the one that everyone does for the first time) Cerberus sends SMS to the 3 set phone numbers by you the new phone number of the SIM card entered by the thief in the phone.
    After finding out the phone number of the card entered by the thief you can communicate with your phone via SMS without the need for an INTERNET connection (there is a list of SMS commands) and without the thief seeing that you send SMS to your phone and ask for it to do some things .. EX: to turn on GPS, to turn on wifi or 3 g connection, etc (the one you do through the WEB page) .. SO THE MOST IMPORTANT THING IS THAT THE PHONE DOES NOT NEED AN INTERNET CONNECTION TO COMMUNICATE WITH HIM ...

  • Very good tutorial!
    I use this app for a long time, I paid about £ 14 we licensed life and assure you it's worth all the money.
    If I may, I would complete the tutorial with some information:
    -of an account can be monitored a maximum 5 android devices (which may be atibuite account at the same time)
    -in the settings, the section "Configure SIM check" can be set up to 3 phone numbers that will receive alerts (in the form of an SMS) if the SIM card is changed (thus obtaining the new phone number of the "thief")
    - holding the phone number can be sent commands via SMS, through which, unlike (or rather in addition) to the commands in the web interface we can activate / deactivate WiFi, mobile data and even data roaming. and their meaning, can be found on the page cerberusapp.com-Help- "Which commands are available by text / SMS messages")
    At the moment all I wanted to say, even though the application offers many Options but they must be experienced by each of them during the trial.
    PS The application can be used on devices nerootate but some commands (screen capture, restart the device, etc) will not work, and commands sent by SMS, although most will run, they will get on the phone in the form of normal SMS (visible) desconspirand so aplicatia.In root devices, SMS commands are visible only executed discreetly without using the phone at noticing anything!

    • I will definitely buy the app myself, is one of the few apps worth paying more, especially as it time payment (no subscription).
      Thanks for compketari!

    • Well yes that's the root of the problem with this
      glad you like the root Yorkers do better smart and beautiful gift! with this open Pandora's box

      • I think "someone" really wants to know people's identities (intimacies)
        we give up, we give smartphone etc.

  • Stefan you're wrong even without root sms are not visible .. only that the application can be easily deleted and does not have all the functional options

    • I used the first time on a mobile app without root (apk installed.) Then the same phone, at root (flash app looks in recovery) I noticed this difference when SMS commands.
      Course will be used on both sides that will clarify after testing the application.
      Even I ask those phones without root to rtimita SMS command (obviously from another phone) to see what happens, because it's a pretty important detail.

  • I think the only security solution if you can tell the future so it may be that self-destruct
    that is, the phone to recognize fingerprints and if someone wants to access it "unauthorized"
    he immediately enters either the fast encryption of memory or a mode of "erase" self-destruction, so
    can not be used by anyone unless you root it was again.

    • and of course before that to be done server synchronization, ie the owner to be able to recover
      data and possibly to close the account immediately as it happens with sim cards

      • costelini well you don't keep your data in the cloud. ? Please stop talking nonsense here this is not a back-up program it is a security program .. But you got the wrong place to post the comment

  • Good evening.
    Mr. Cristi, I recently bought a smartphone, more precisely a Samsung galaxy note 3 neo, and I want to say that I can't make phone calls, he tells me. [Call ended, or invalid mmi code] I want to believe that the phone was stolen and the phone was locked in the box when I bought it I paid 250 euros now I would like to know if anything can be done to work according to the information on the internet was blocked by imei what I can do in this case. Thanks a lot apple helps your advice

  • So is the application can not be removed from the system through a factory reset, but you lost your account information, so that the application is clean as has just been installed, without which data can not be located through the web interface and of course no SMS commands not working. Follow all the steps in the tutorial to make sure you are installing correctly then give yourself a factory reset and try to locate.

    • I tested this feature just before the tutorial. The location works right after the reset, without adding anything.
      Of course you have to follow the installation steps in the tutorial text.

  • I have been using the application for two years. I recovered my phone twice (lost). I don't understand how you can give important sums for a device and not protect it with ... 3 euros, it's like.

  • Cristi, I noticed that it is the standard version and Hidden version zip archive, are there any differences and which ones?

    • I think it's pretty clear. Standard is a version that shows the apps drawer immediately after installation or when the reset phone, although it can be made invisible, as a possible reset of the phone it is visible in the application drawer.
      Stealth version is invisible after installation or reset, this version can be awakened format code in dialer or web interface site Cerberus.

  • I would have a request for more and more applications asking for root to be more efficient to do some tutorials on how to root a phone, namely in a tutorial to be for example samsung xyz models rotate with .... and so on to be more categories and for low budget phones like allview lenovo etc because they also sell well especially lenovo ones. even if you do several tutorials on this topic to include as many phones and tablets as possible. because for example I and more did not find anything to root for some models. maybe maybe you cristi or adrian having more experience find something. or if not when it appears for certain models to do tutorials for root. and it is useful not only for applications but also for deleting certain programs that come installed with the tablet or phone as it is known. please do tutorials like I'm sure not only I ask and others will

  • Hello,

    I searched the site but did not find what I sought, my problem is this.

    I have internet from Romtelecom, also a router from them. From this router, I pulled a network cable and plugged it into another router (a Sweex), but here I run into the configuration problem, I don't know how to configure it, I read that I have to uncheck DTHC, I unchecked it, but he still doesn't want to ... Any HELP?

    • I'll make a tutorial with connections between two routers.
      There are some very important things that you need to follow depending on the connection type. There are several types of connections you'll explain in detail.

      • Great, look forward. In my somewhat conflicting LAN Static IP settings, will not let me put the same class C IPs. For example I 192.168.1.x Romtelecom and the Sweex router I 192.168.16.x, well, never mind, I look tutorial and hope to solve.

Related Post

This website uses cookies.