Jump to content

Search the Community

Showing results for tags 'termux'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 3 results

  1. NOTE : THIS IS COMPLETELY FOR EDUCATIONAL PURPOSES AND I AM NOT TRYING TO HACK ANY DEVICE RIGHT NOW TO CREATE PROBLEM FOR SOMEONE .THE PHONE I AM TRYING TO EXPLOIT IS MY OWN SECOND DEVICE. I'm working with metasploit on TERMUX. So, My meterpreter session is open . I am able to access the SDCARD of the phone I am trying to exploit, but everytime I need to exploit the device, one needs to tap the app icon everytime for my meterpreter session to start. I want to create my payload persistent . So that, I don't have to wait for the user of the device to tap the icon again . So , I successfully created a bash file through "nano" which is named "syslogs.sh" and is placed in my sdcard. It works completely fine ; It contacts the device for my meterpreter session to start after a delay of every 20 seconds. So, I want to upload my syslogs.sh file from my SDCARD to sdcard of the device which I'm trying to exploit ; but it's just not happening!. I am getting an error like this >>>>> [-] 4 : Operation failed: 1 You can refer this image here . you can see here that I've also tried adding backslashes but it didn't seem to work. The location of my file is absolutely fine . If someone wants to exactly know what I'm trying to implement they can check this . I've honestly tried searching for solutions , I've seen previous solutions and posted my question on subreddits, stackoverflow, github but I'm not getting anything . I am really positive that you can guys can help me. I would highly appreciate ANY KIND OF SUGGESTION . I am absolutely new to this forum so if I've posted something wrong or I'm at a wrong place you can always let me know and I'll delete this post. Hoping for your replies.
  2. Hi im new programmer and I'm only training step now. But i do every day tutorial videos in youtube! Android, Kali Linux , and Windows program installing, how use programs and what u can do the programs what i use. I need audience comments how i can make better videos and to become better at programming!! This is my youtube channel link. If you need help videos or something help i do them for you and upload videos in youtube. And sorry my bad english im from Finland and i learning english now so so hard!!
  3. bro i made a payload in metasploit by using ngrok without portforwarding so that i can go WAN...but in ngrok the port get changed everytime i open it...so ineed to make the payload again and again and send it to the victim...is there any way i can overcome this
×
×
  • Create New...