cooltech Posted January 21, 2022 Posted January 21, 2022 Hi After being the middle man using pineapple. what can i use or do to access the phone. base on this example thank for your advice
cooltech Posted January 21, 2022 Author Posted January 21, 2022 sorry about that - i taught it was just a general question because we already pass the pineapple part where by i am the middle man now and need to access the phone. thank
dark_pyrro Posted January 21, 2022 Posted January 21, 2022 What type of phone is the intended target in the scenario? What do you want to do with the phone? Access in what way? Any particular functionality/information?
cooltech Posted January 21, 2022 Author Posted January 21, 2022 7 hours ago, dark_pyrro said: What type of phone is the intended target in the scenario? What do you want to do with the phone? Access in what way? Any particular functionality/information? access file and android phone thank dark_pyrro
NoExecute Posted January 24, 2022 Posted January 24, 2022 When you say access file and phone ? I assume you mean get access to the phones file system, to read / write files, and get access to phone functions ? For that you need some kind of payload on the phone. Metasploit framework can generate these kinds of payloads (for older phones, just for testing), for newer phones / operating systems, well that is up to you to research, and figure out. What you want to do is not easy, but it's possible 🙂
Recommended Posts
Archived
This topic is now archived and is closed to further replies.