• We just launched and are currently in beta. Join us as we build and grow the community.

ADBSploit – Managing and Exploit Android Devices

ucmarco

AR Application Designer
U Rep
0
0
0
Rep
0
U Vouches
0
0
0
Vouches
0
Posts
39
Likes
19
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
Violet-Employee-On-Boarding-Professional-Presentation.png


Hey Folks, In this tutorial we will discuss android exploiting tools called “adbsploit“. The tool is designed to exploit and manage Android smartphones through ADB. The ADB (Android Debug Bridge) is an android communication tool between our smartphone and PC that runs on port 5555. ADB command facilitates a variety of device actions, such as installing and debugging apps, similarly this tool offers us all the features that are already in ADB but through this tool we can manage and exploit Android smartphones easily and without much effort.

Lets take a look 🙂 !!

Installation

First we’ll install this tool from the github by using the following command. After done the downloading we will go to directory of this tool and configure it by using the python tool.

git clone https://github.com/mesquidar/adbsploit.git
cd adbsploit
python3 setup.py install123git clone
https://github.com/mesquidar/adbsploit.gitcd adbsploitpython3 setup.py install

1-24.png


Done 🙂 Seen how easy !! After executing above all the commands and successfully configuring it we can start this tool using the following command.

adbsploit1adbsploit

2-25.png

Usage

The most difficult is how to find the features or usage of any tool, but to find all the features we can use the help command. When we execute the help command, you can see how beautifully the command is arranged in the box.

3-25.png

Connect

Let’s see how we can control android smartphone after connecting to it. Before doing all this, we need to open the ADB port by going to the developer settings in android smartphones and then connect it via USB cable. Come back to the terminal, we will enter the connect command and then the IP address of the android smartphone.

4-24.png

Devices List & Interact

After executing the above command, we feel that we are connected to it. lets check it again by executing the given command. If the device appears, then we need to mention the serial number of the connected device to successfully interact with it.

5-21.png

Wifi Setting

The image below mentions that how we can set the WiFi on / off in the target smartphone.

6-21.png

App List

Below you can see that we can see the installed application list of the target smartphone.

7-19.png

AppInfo

Sometimes it can be useful for us to enumerate the services which are running on the target machine.

8-15.png

Redirect Victim

This feature can redirect the victim to another webpage, even when we execute the command the browser will open automatically.

9-15.png


HAHA 🙂 we always give you proof of concepts.

10.jpeg

Process List

Through this features we can check the process currently running in android smartphones.

11-13.png

Send SMS

These features will definitely make you experience metasploit meterpreter because through both features we can send sms anonymously to someone else.

12-13.png

Delete SMS

Also after sending the message we can erase the proof by executing the following command from android smartphone.

13-10.png

Device Info

The most important thing we are discussing at the end is the device information.

14-9.png


The tool has a lot of features that we cannot cover at the same time so you can use it yourself and get more information from the android smartphones.

About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

436,452

314,393

314,402

Top