Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 404 Vote(s) - 3.53 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Hack Android Smartphone using Metasploit - Kali Linux

#1

Learn how to hack Android smartphone using Metasploit on Kali linux.

Some of the options which you can use:
-SMS_Dump
-Calllog_Dump
-Contacts_Dump
-Geolocation
-Record microphone
-Camera screanshot
-Download files
-Upload files
and more...
Reply

#2
Nice tutorial you are quicker than me :') ♥
Reply

#3
This is great! def better than messing with adb and some random scripts of the web.
Reply

#4
Another good rat/tool is pupy -->

[To see links please register here]

It's pretty easy to use and self-explanatory.
Reply

#5
Quote:(06-16-2017, 01:20 AM)d0ntjump Wrote:

[To see links please register here]

Another good rat/tool is pupy -->

[To see links please register here]

It's pretty easy to use and self-explanatory.

I will give it a try that's for sure. Thank you d0ntjump.
Reply

#6
I enjoyed viewing every bit of the video.

It's very well made, legible and easy to follow and comprehend.
A job well done.
Reply

#7
Looks awesome! Is it possible to geolocate while phone is on mobile data and not connected to the same WiFi network?
Reply

#8
May I ask, what is Metasploit? How do you use it? How do you download it? What does it do?
Reply

#9
Quote:(06-17-2017, 03:07 PM)Kshishiu Wrote:

[To see links please register here]

Looks awesome! Is it possible to geolocate while phone is on mobile data and not connected to the same WiFi network?
This attack can be conducted on LAN.
Reply

#10
Looks like some interesting concepts in regard to features, and the video is definitely informative. I'll be giving everything a shot when I get a pentesting distro installed.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through