HackerofTR Posted May 30, 2018 Share Posted May 30, 2018 Can i run a payload(meterpreter)(metasploit) on android with rubber ducky or bash bunny over (wan) Quote Link to comment Share on other sites More sharing options...
barry99705 Posted May 30, 2018 Share Posted May 30, 2018 Do you mean actually running metasploit on the android device, or have the android device be the target? Quote Link to comment Share on other sites More sharing options...
HackerofTR Posted May 31, 2018 Author Share Posted May 31, 2018 @barry99705 i mean having the target pls help Quote Link to comment Share on other sites More sharing options...
0phoi5 Posted May 31, 2018 Share Posted May 31, 2018 (edited) 2 hours ago, HackerofTR said: @barry99705 i mean having the target pls help Sorry, the context of your English isn't too clear here. Do you; a.) wish to attack an Android device using Meterpreter, using another device as the attack platform (https://null-byte.wonderhowto.com/how-to/create-persistent-back-door-android-using-kali-linux-0161280/) b.) wish to use the Android device as the attack platform? (https://www.kali.org/tutorials/kali-linux-android-linux-deploy/) Edited May 31, 2018 by haze1434 Quote Link to comment Share on other sites More sharing options...
HackerofTR Posted May 31, 2018 Author Share Posted May 31, 2018 11 hours ago, haze1434 said: Sorry, the context of your English isn't too clear here. Do you; a.) wish to attack an Android device using Meterpreter, using another device as the attack platform (https://null-byte.wonderhowto.com/how-to/create-persistent-back-door-android-using-kali-linux-0161280/) b.) wish to use the Android device as the attack platform? (https://www.kali.org/tutorials/kali-linux-android-linux-deploy/) It’s “a” but i want to run an exploit by plugging a rubber ducky or bash bunny to an android device Quote Link to comment Share on other sites More sharing options...
Bigbiz Posted June 1, 2018 Share Posted June 1, 2018 (edited) Run a metasploit payload from a rubber ducky to android device? Edited June 1, 2018 by Bigbiz Auuoto correct annoying Quote Link to comment Share on other sites More sharing options...
HackerofTR Posted June 1, 2018 Author Share Posted June 1, 2018 29 minutes ago, Bigbiz said: Run a metasploit payload from a rubber ducky to android device? Yep Quote Link to comment Share on other sites More sharing options...
0phoi5 Posted June 1, 2018 Share Posted June 1, 2018 (edited) The Ducky is simply a HID emulator. You'd basically need to know exactly what keyboard shortcuts do what on the specific phone you want to attack. Plug an actual keyboard in to the android device (or Bluetooth on to it) and experiment with the keys, to work out which ones do what. Then, play around with the best method to do what you want to achieve; pressing a series of buttons on the 'keyboard' until you navigate around on the phone and do what you need to do. Copy this same key press series to a Ducky script. You can buy USB to Micro USB adapters to then plug the ducky in to the victim phone. Honestly though, I think a Rubber Ducky to attack an Android phone is probably not the best method. Perhaps a fake AP or Bluetooth attack would be better. Edited June 1, 2018 by haze1434 1 Quote Link to comment Share on other sites More sharing options...
HackerofTR Posted June 1, 2018 Author Share Posted June 1, 2018 10 hours ago, haze1434 said: The Ducky is simply a HID emulator. You'd basically need to know exactly what keyboard shortcuts do what on the specific phone you want to attack. Plug an actual keyboard in to the android device (or Bluetooth on to it) and experiment with the keys, to work out which ones do what. Then, play around with the best method to do what you want to achieve; pressing a series of buttons on the 'keyboard' until you navigate around on the phone and do what you need to do. Copy this same key press series to a Ducky script. You can buy USB to Micro USB adapters to then plug the ducky in to the victim phone. Honestly though, I think a Rubber Ducky to attack an Android phone is probably not the best method. Perhaps a fake AP or Bluetooth attack would be better. Thank you for your help and can you explain the other methods that you suggested? Quote Link to comment Share on other sites More sharing options...
Basudev Posted April 17, 2019 Share Posted April 17, 2019 Hi there you can kali linux on android step by step tutorial Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.