1. How to setup Metasploit payload the same way you did to your laptop at this video( Virtual Machine like VMware for example are preferred just to be safe 2. How did you connected your android phone to your laptop so it updates when script runs 3. If we have a Lightning male USBA-A female adapter can we also attack iphones with Nethunter ?
Bro how can we add our pay load or apk URL in this keystrokes and is it possible to do the same using a usb. Please bro replay as soon as possible...🇮🇳🇮🇳🇮🇳
Bro also make a video on hot to root a phone that u done....because we r beginners and didn't know much more ....and keep it up u r doing good job...LOVE FROM INDIA..🇮🇳
Hello to India! For rooting you need to unlock bootloder, flash recovery, flash magisk...There are dozens of such tutorials, I don't think it is necessary to create another one. Best regards!
@@mobilehacker thank you so much u at least replied...to me and guided me as well .....bro u r owsem ...doing great.....but can u plz also make a series or a Playlist....from the begning ...so that we can understand everything.....I m following u on Instagram also...and we want all that skills ..because it is little difficult to understand.
Two questions that this video didn't answer even if they are crucial: 1. Does target device needs to be in debugging mode? 2. Is it working if target device is android 11 or above?
Wow this is quite interesting but how would this be used in a real life scenario? If it was a real scenario is there other better wayd to get you into a phone?
Ever charged or connected your device to unknown places like train station, airport charge station or just a friend computer? If user has easy to guess PIN or someone will shoulder surf to catch an eye on device while unlocking or if there is no lock screen protection at all, such script could be automatically executed and it might compromised within couple of seconds. However, this video is not about hacking other devices but rather making people aware of this.
@@theikeamafia1347 more less...however, there is one more variable - time. If you have enough time, you can try to slowly brute-force it, but of course it will be difficult and long lasting process
Hey i did all the steps but when i launch the attack nothing happens and yes do i have to attach the otg to the target device or can it be attached to my device (the attacker )
the thing is the kernal i got is 4.4. and there is no hid enabled or configfs, how can i do this without flashing a kernal.i got ubnutu win11 and redhat on my systems
on my s7edge HID interface not found and when i open USB arsenal; it said your kernal dosen't support USB configFS ????????????????????????????????????????
Brother ye Pyphisher ki website only kali lenux ke browser main hi open ho rahi hai . Whatsapp pr send krne ke baad phone ke chrome main open nhi ho rahi hai. bahut baar cheak kar liya par login page open nahi ho raha hai phone main. " Deceptive Site Ahead" ka massage dikha raha hai har baar . toh main es problem ko kese thik karu?????? please give me reply.......
I have a question please answer.I rooted my phone(s8+) using twrp and magisk but I don't know how to get the HID kernel.Should i install something?Ive been looking for a while but could not find a way to do it.Please somebody answer.
Hello! Answer for you question will be published in video part 2, where I will explain how to enable HID on devices without patching kernel and nethunter.