I'll be waiting for Your Likes and Comments, If the Victim's Android system is Rooted and your Public IP is Static, then:ġ)The Persistence will remain forever on WAN!Ģ)The Persistence will remain forever on LAN Obviously Good-Bye Hackers!.Remember to reboot the android to eliminate the running script, if you are testing on you own Android System.If you are hacking on WAN and you have a dynamic Public IP, then, the persistence will only remain until your router reboots/your IP changes.The persistence of the backdoor will only remain until a reboot of the android system.Yes! Finally a persistent backdoor has been created successfully for Android systems. (I know that the above picture shows that I am hacking on LAN instead of WAN as my Public IP is dynamic and my router had some technical problems, so it kept rebooting itself, so I showed t on LAN, BUT no worries I have tested it on WAN, works Fine ) The END: Wow! It happened so Fast that 3 sessions got opened one after another. Now you should be in the ROOT directory, you can check by typing: To do this, navigate to the directory using the following commands: You need to upload the shell script to etc/init.d/ so that it is persistent even after Reboot! (So a total of 5 lines) Step 3: Upload It to the Hacked Android System: There is a 'space' between 'while' and ':' (Don't ask me why.)ĭo am start -user 0 -a -n /.MainActivity I guess, you will have to write it on your own. Updated Script v3 (Compatible with any android version)ĬRITICAL: DO NOT COPY/PASTE THE SCRIPT DIRECTLY, OR IT (may) WON'T WORK /!\ Move/Copy this to the Home/Root folder of KALI.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |