cooltech Posted January 21, 2022 Share Posted January 21, 2022 Hi After being the middle man using pineapple. what can i use or do to access the phone. base on this example thank for your advice Link to comment Share on other sites More sharing options...
Irukandji Posted January 21, 2022 Share Posted January 21, 2022 You missed one thing.. Link to comment Share on other sites More sharing options...
cooltech Posted January 21, 2022 Author Share Posted January 21, 2022 sorry about that - i taught it was just a general question because we already pass the pineapple part where by i am the middle man now and need to access the phone. thank Link to comment Share on other sites More sharing options...
dark_pyrro Posted January 21, 2022 Share Posted January 21, 2022 What type of phone is the intended target in the scenario? What do you want to do with the phone? Access in what way? Any particular functionality/information? Link to comment Share on other sites More sharing options...
cooltech Posted January 21, 2022 Author Share Posted January 21, 2022 7 hours ago, dark_pyrro said: What type of phone is the intended target in the scenario? What do you want to do with the phone? Access in what way? Any particular functionality/information? access file and android phone thank dark_pyrro Link to comment Share on other sites More sharing options...
NoExecute Posted January 24, 2022 Share Posted January 24, 2022 When you say access file and phone ? I assume you mean get access to the phones file system, to read / write files, and get access to phone functions ? For that you need some kind of payload on the phone. Metasploit framework can generate these kinds of payloads (for older phones, just for testing), for newer phones / operating systems, well that is up to you to research, and figure out. What you want to do is not easy, but it's possible 🙂 Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.