I already tried backdooring with internal ip address and it worked well. Now, Im trying to backdoor my android over the internet, so i gave my pc's public ip address as the lhost and 8080 as lport. I also did the port forwarding in my router config. The problem arises when i listen to the port through msfconsole, when i execute 'exploit' command, it gets stuck at 'Started Reverse TCP handler on 192.168.0.6:8080. Related screenshots have been uploaded. Please help me setup the listener. Please...
Sorry. It is Bruteforce again. If you saw my tutorial on getting Instagram accounts passwords, there were lots of complains that the script was no working well. Well, that was not my script, so I decided to make one myself instead.
Hi My Fellow H4CK3Rs Today, I`m gonna show you: "How To Sign the APK File with Embedded Payload". The following Methods work 100%. So, Follow the steps carefully. But before getting started, if you are a beginner, then read the following Answers first...
NEW VERSION : https://Null-byte.wonderhowto.com/Forum/Hacking-Facebook-Twitter-Instagram-Account-Passwords-with-Bruteforce-0181808/
i have a android phone and im wondering if i could get remote access to it with just the ip of the device and being able to look to whatsapp etc . i would like to preform actions like in a metasploit session but just without an file that needs to be installed on the device
msfconsole Metasploit Park, System Security Interface
hello, i followed the steps about the google exploit database. i am in the page in pastebin where i can see something like this:
Use One of the best Regain EML to PST Converter which can easily convert EML file into PST format without losing any data and convert single as well as multiple EML file at a one time.It also convert Windows Live Mail, Outlook Express, Mozilla Thunderbird and Apple email and uses EML to PST file format.This software is well compatible with Outlook Outlook 97, 98, 2000, 2002, 2003, 2010, 2007 and 2013 and 2016.
Yo fellas! This is my first null byte writing,so any errors or mistakes regarding post are welcome. I have seen in the post of HOW TO HACK ANDROID WITH KALI. But many people are facing problems on hacking the android which is not on the same network as of that of the attacker. So today i am gonna show you how to hack android with port forwarding with portmap.io. So lets get rollin'!!!
so my isp is always changing ip address which is a deal breaker for me because I won't be able to access previous payload i created ...pls is there a way out
Bros I really tried but I can't . I have tried all methods of Gmail hacking I tried phising, social engineering, bruteforcing. But I heard something about John the Ripper is it really work? How do you get hash of gmail? Bros please if you know any %100 working method (like mr.robot ehuheh) tell me I dont wanna use social enginnering. If anybody knows i can buy from him. Thanx...wanna
In this article we will learn about phishing and how to phish people using Hidden Eye phishing tool.
I'm trying to hack my school website to change it's banner and text and stuff. It has no login. Please tell me how?
I've successfully generated a standard android/meterpreter/reverse-tcp payload and manually injected it into an apk. It works, but the session dies often and then it only start anew once the infected app is launched again.
Hi, I am a Kali Linux user, and I used metasploit to get access of the webcam.
Hi My Fellow H4ck3Rs Wanna do some WATCH_DOGS style H4cK1nG...!!! (Over your WLAN Hotspot), then you are at right place! , but this time, we are not HACKING over the World Wide Internet. But we are going to do HACKING over WLAN Network.
i couldn't run msfconsole after msfupdate. it give's me a error: "Could not find i18n-0.7.0 in any of the sources"
Someone is sms bombing me again and again who can i track may be i can get sender's ip address(if he is using kali machine or termux) or mobile no.( i dont think i could get it
Hi Friends. Now a days CCTV cameras are used many place like shops, malls, offices, warehouse etc and more. for security reason and for many more purposes. This articles show you how to hack CCTV cameras. If search on Google for CCTV camera hacking , you will be find tricks for public CCTV camera hacking tricks. But here you will be hack private CCTV cameras .
I have the wifi password of my neighbour's router. Now I need to get the PIN of the router so that in case he changes the password, I'll be able to crack the newly set password through the PIN. I could have retrieved it through the default gateway IP but there's a dialogue box demanding username and password. I've tried all possible combinations but none of them works.
Hi there my hacking mates, I recently fell in love with metasploit and currently I'm into pentesting Android devices. I already managed to drop an android meterpreter shell with help of an .apk, but I'd like to take it a step further.
SORRY, THIS WEB-PAGE IS NOW (Almost) CLOSED...!!!
I installed kali linux last week and started a new tutorial on Ethical hacking, Everytime I try to get proxychains to work it timesout I tried different Wi-Fi but just the same. Thats what it type for me.
Tried making some .apk payloads but every single one I made is not working properly. I tried making payloads and remaking original .apk files using msfvenom. When I try to install it it says: Parse error: There is problem parsing the package. I also tried it using some ruby script but same problem occurred. It happens on multiple devices. Anyone knows what I'm doing wrong?
Hi, Metasploit was updated recently (or, at least, since the last time I used it), and one large thing, is msfpayload was removed, and replaced with msfvenom. I used to be able to just do msfpayload android/meterpreter/reverse_tcp LHOST=ip R > /root/name.apk
Hi , I've played around with a lot of android payloads(raw) recently with msfvenom on LAN without any problems. But this time i decided to try it over WAN . I made a reverse-tcp backdoored android payload using fatrat , i had some issues with port forwarding so i used ngrok for that purpose. I download a valid apk application and decompiled it with apktool , embedded my payload into it and also inserted the hook. Then i recompiled it and successfully signed it with jarsigner. I started the li...
If you are reading this , you too probably aspire to become a hacker. That's good. Hacking is rapidly becoming one of the most sought after skill sets by IT security firms, pentesters, militaries, spy and espionage organizations, and military contractors. Right now, most of these organizations cannot get enough well-trained hackers, so now is a great time to train as a hacker. That having been said, let's take a moment to look at what makes a good hacker.
Hi all I've searched the web for a similar problems but haven't had any luck with this in particular.
Forum Thread: PROBLEM After Installing KALI LINUX on MY LAPTOP WHICH Has NOW AFFECTED MY WINDOWS 7 OS (I Wanted to Dual Boot Kali Woth
Hello I have been reading on null byte a lot.
Hello, There are a couple of ways to track someones location. We can do it by grabbing there IP or we can just use the metadata stored in an image.
Hello there, Recently I have come across many guides about creating phishing pages. Although the principles behind each guide is similar, most of the hosting solutions provided in the guide does not work anymore due to an increase in the crackdown of phishing pages by the hosting companies. In this guide, I will go through every step necessary to create and host a phishing page of your choice. Enjoy!
Hey guys! I've seen here are a lot of Kali tutorials and i'm wondering if its worth to use it as a main OS?
How can I find out if there's a backdoor in my computer or in my iphone or android?? And how do I get rid of it without formatting the computer or restoring the iphone?
Greetings My Fellow Hackers, It is with sadness that I bring to you this little revelation I came across while doing my normal Internet News surfing. Our own Hacking Team who got hacked recently have been discovered to be engaged in Drone Weaponry.
Hi My Fellow H4ck3Rs! In this Thread, I`m gonna show you how to install Metasploit Framework in UserLAnd. UserLAnd is new in LinuX industries. You can use it for Android to Android/Windows hacking. It actually works in CHROOT Environment.
Instagram wants me to confirm my email address but I do not have access to it anymore, I've been contacting Instagram for months but no hope. my only hope is to somehow break the 6 digit code that it sends to my old email, is there any way for that? I tried over 100 code at the same time manually and it didn't stop me so it might do the same thing for a cracker? thanks
Hello everyone, this is my first post so play nice with me. We are going to create an undetectable (meterpreter/shell/vnc) executable in under 15 minutes.
I've been trying to get the full 30 db out of my wireless adapters and I can't seem to find a way to actually get it to work. I have tried changing the ISO 3166-1 alpha-3 code via "iw reg set BO" etc. and it doesn't do anything, in iwconfig it still says "txpower = 20db". I guess my question would be is there actually a way to do this? Ive tried a few other methods as well with no results.
Android phones are very easy to break into if the victim can be Social Engineered into doing so. If you use Kali, you may have done this but probably in your own network. This guide shows you how to do so but over HTTP tunneling to a phone anywhere in the world.