AdbNet: Exploitation Framework for Android devices

AdbNet is an Exploitation-Framework that lets you search for and exploit vulnerable Android devices around the world.

68747470733a2f2f696d6167652e666c617469636f6e2e636f6d2f69636f6e732f706e672f3531322f3136302f3136303133382e706e67

Specifications

-Post-Exploitation modules to control and configure the device to which you are connected.
- Scanners to search for vulnerable Android devices around the world for exploitation.
- Options for managing the connected devices.
- Options to check if the devices you are connected to are connected or offline.
-IP-Search to retrieve information on a specific IP.
- Options to dump the IP addresses of vulnerable Android devices.

Installation

Obtain the required API keys

Create a free account at censys.io, then go to your account page and get the free api_id and api_secret key, open 'adbnet.py' and edit your api ID and api key as shown in the image below:

key

Create an account at shodan.io and go to your account to get the free api key, once you have copied it, open 'adbnet.py' and edit the api key as shown in the image below:

shodan key

sudo apt install pq
sudo apt install adb
pip3 install colorama
pip3 install requests
python3 adbnet.py or python adbnet.py or py adbnet.py

Use

module 768x197

First, run the "dump shodan" or "dump censy" command (dump shodan is recommended) to dump the IP addresses of vulnerable devices.

Then, after finding an IP address you want to test, run the "connect" command where you will be prompted to enter the destination IP address. Once you enter the destination IP address, you will be given the input command for the port you are trying to connect to. For the port, you can try entering "5555" or "4444", as these are the most common. If you want, you can try to find this port, but it may take a little longer.

AdbNet will now try to connect to the vulnerable Android device.
If it fails to connect, try another IP.

If you can connect to a device, you can check if you are actually connected using the "devices" command.

 You can only connect to one device at a time! Use the 'killall' command to end the sessions!

To open a shell and execute commands on the vulnerable device, use the "terminal" command.

Application Screenshots

124667060 e2f5c280 de7c 11eb 8f69 2443aa7a7bd3 124667104 f30da200 de7c 11eb 9da3 098fa211a910

You can download the program from here.

iGuRu.gr The Best Technology Site in Greeceggns

Get the best viral stories straight into your inbox!















Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).