#programminglife Instagram Photos & Videos

programminglife - 109.5k posts

Top Posts

Latest Instagram Posts

  • Credit: @hackergirlofficial
• • • • •
How can an attacker take control of your device remotely?
.
Let me tell about how I hacked my Android device and got remote access to the webcam, sms messages, call logs, file system. Scary, huh?
.
◼️THE RUDIMENTS◼️
A firewall usually blocks incoming connections on open ports, but does not block outgoing traffic.
.
A reverse shell (vs bind shell) is a type of shell in which the victim machine acts as a client and initiates a connection to the attacker machine. The attacking machine acts as a server and has a listener port on which it receives the connection.
.
Instead of the attacker initiating connection to the device, which gets blocked by firewall, a backdoor running on the victim's device can easily initiate an outbound connection to a remote host on the Internet.
.
◼️THE HOW◼️
Step 1: Create the payload.
MSFvenom is a combination of Msfpayload and Msfencode. It creates your payload and encodes the code to avoid bad characters and evade IDS.
.
Step 2: Install on victim's machine.
Once the payload is generated, some social engineering is required to get the victim to run the application on their device.
.
Step 3: Meterpreter.
Once the payload is running on the victim's machine, it's time to set up the Meterpreter session.
.
Meterpreter is a command line post exploitation tool by Metasploit.
Meterpreter does not create a new process which helps avoid AV. It uses in memory DLL injection. This means source code is run within an already running process. It uses encrypted communication between attacker and victim.
.
◼️THE OBSTACLE◼️
Getting the victim to install an untrusted android APK is tricky. They need to explicitly allow it.
.
A solution is to inject the meterpreter into an existing APK to make it easier to convince the victim to install the APK and  harder for AV to detect the payload.
.
What can you teach me about steganography?
.
#software #playstation #ai #computer #like4like #python #instagood #follow4follow #technology #tech #php #blog #programmer #programmersday #coding #java #engineer #developer #xbox #softwareengineering #code #codinglife #programminglife #animation #coder #repost #hack #hacker #2019
  • Credit: @hackergirlofficial
    • • • • •
    How can an attacker take control of your device remotely?
    .
    Let me tell about how I hacked my Android device and got remote access to the webcam, sms messages, call logs, file system. Scary, huh?
    .
    ◼️THE RUDIMENTS◼️
    A firewall usually blocks incoming connections on open ports, but does not block outgoing traffic.
    .
    A reverse shell (vs bind shell) is a type of shell in which the victim machine acts as a client and initiates a connection to the attacker machine. The attacking machine acts as a server and has a listener port on which it receives the connection.
    .
    Instead of the attacker initiating connection to the device, which gets blocked by firewall, a backdoor running on the victim's device can easily initiate an outbound connection to a remote host on the Internet.
    .
    ◼️THE HOW◼️
    Step 1: Create the payload.
    MSFvenom is a combination of Msfpayload and Msfencode. It creates your payload and encodes the code to avoid bad characters and evade IDS.
    .
    Step 2: Install on victim's machine.
    Once the payload is generated, some social engineering is required to get the victim to run the application on their device.
    .
    Step 3: Meterpreter.
    Once the payload is running on the victim's machine, it's time to set up the Meterpreter session.
    .
    Meterpreter is a command line post exploitation tool by Metasploit.
    Meterpreter does not create a new process which helps avoid AV. It uses in memory DLL injection. This means source code is run within an already running process. It uses encrypted communication between attacker and victim.
    .
    ◼️THE OBSTACLE◼️
    Getting the victim to install an untrusted android APK is tricky. They need to explicitly allow it.
    .
    A solution is to inject the meterpreter into an existing APK to make it easier to convince the victim to install the APK and harder for AV to detect the payload.
    .
    What can you teach me about steganography?
    .
    #software #playstation #ai #computer #like4like #python #instagood #follow4follow #technology #tech #php #blog #programmer #programmersday #coding #java #engineer #developer #xbox #softwareengineering #code #codinglife #programminglife #animation #coder #repost #hack #hacker #2019
  • 18 0 29 minutes ago