Комментарии:
One thing to ask.. if the person deletes that apk and the installed one, will the connection will be severed?
ОтветитьThis Application Not Working In Android Version 6+
ОтветитьHey loi how to get a persistence backdoor in meterpreter shell android
Ответитьnothing is happening after started reverse tcp handler. what should i do
ОтветитьHi, Mr Loi please can you help me something apart from this tutorial, I have the question and my question is that what other way can I use to get username and password by exploiting ssh port if I'm trying to Bruce force ssh port and fail to get username and password? Plz help me
ОтветитьI want to try this with my own phone, but am unable to direct the directories, the commands, how do I use google drive? Please help.
Ответитьi cant install the payload file can anyone help
ОтветитьSir my reverse TCP handler is not starting 😢
Ответитьgys i don't understand what happened after exploit tag can someone explain to me
ОтветитьI want to be the best hacker in the world
ОтветитьNo 1's gonna download an APK file to their phone when they didn't initiate it being sent there unless They are really stupid. a lot to learn here. What is something you would actually click on. You have to be something like update available for Google security phone number Have to be for a spoof text or something.That's already trusted
ОтветитьWhat if you are on a Kali Live version and you want to reconnect on another Kali OS, won’t the IP address inserted on the APK change ?
ОтветитьBra can this work even after unplugging the physical mobile
Ответитьthanks you for your help i come from of quebec and we dont have a lot of information about that for ma courss in school !
Ответитьbruh stop using bots for s scary
comments` it
We can put that apk hidden into photo? Now-a-days no one can click unwanted links 🔗
ОтветитьThis process is highly dependent on social engineering. Without it you probably couldn't get access to the phone.
ОтветитьYour video is great sir. But please can you upload the commands needed?
ОтветитьSir lio how do I get an android device running on my chromebook to do this task
ОтветитьIf im on android would i pick wlan0 or do i have tonchoose etho
ОтветитьCan i still do it if i dont use the apache webserver instead i copied the file to my devices internal storage and give it to somebody??
Ответитьman I'm trying so hard on installing the android 14 nested into a kali Linux with Oracle and something is not allowing me at all.
Ответитьmy ip address is not corect show in kali linux
ОтветитьHow do you make wifi work in android?
ОтветитьI did everything in this vedio but meterpreter doesn't hold the connection long enough to do alot, the connection is only possible if the victim keeps pressing the apk file, if you loose connection and the victim doesn't press it won't work and most of the post exploitation modules don't work
ОтветитьIn any other browser except kali one whenever I tried to download it from ip address the link does not open
Help me
Is it working on same network ?
ОтветитьHey loi, amazing videos , but as much as i enjoy them , you only hack your own devices with access already to them. How can you do so to clients with no access?
ОтветитьIt says handler failed to bind the address is already in use or unavailable
ОтветитьHow I hacking android phone throw link create ( property link ) I use phone, I have no laptop or PC
Ответитьcan u get account password with this ?
ОтветитьCan’t exploit when the attacked device is connected to any other network, like mobile data or other wifi, any help?
ОтветитьWho saw in june 2024 🎉
ОтветитьGreat video, though I found out that the payload badly works on new Androids (no camera, screenshots, etc.). Did you find any solutions by chance?
Ответить@
ОтветитьI need help with this
ОтветитьWho saw in August 2024🎉🎉
ОтветитьBut sir please I need answers what if the user uninstall or delete the app can I still have access to the Android device or if the app is already installed can not be uninstall or delete?
Ответитьfrom India 🇮🇳...😀
ОтветитьGreat video...but there is always one thing i just don't get it. Why are so many Cybersecurity pros using Google Chrome? It is just contradictory. Google and Security? There are not much more things that are a greater threat to your (data) security than google right?
ОтветитьIT didn't work to me.... After I type "exploit" it was stacked on "starting reserve TCP handler on {my ip}"
Ответитьहेलो भाई युटुब मेरा कालीलाइनेक्स अलग नेटवर्क से जुड़ा हुआ है मेरा मोबाइल अलग नेटवर्क से जुड़ाहुआ है तबीयत काम करता है या नहीं
ОтветитьIts is showing that my meterpreter session 1 is not valid and is closed
ОтветитьLaunch front camera from Linux machine on android
ОтветитьSir what to do if Apache2 status is dead 😢
Ответитьgood video
Ответитьcan i do this on android 11 or 12?
Ответитьmy ip address is not the same as the inet addresses that show up... i am seeing several different inet addresses as well so how do i know which phone is mine?
ОтветитьWhat about android > 11 ?
ОтветитьRemember to subscribe to the channel so that you can be kept abreast of the latest cybersecurity tutorials.
Ответить