AdbNet: Exploitation Framework for Android devices


AdbNet is an Exploitation-Framework that lets you search for vulnerable devices Android around the world and take advantage of them.

68747470733a2f2f696d6167652e666c617469636f6e2e636f6d2f69636f6e732f706e672f3531322f3136302f3136303133382e706e67

Characteristics

-Post-Exploitation modules to control and configure the device to which you are connected.
- Scanners to search for vulnerable devices Android around the world for exploitation.
- Options for managing the connected devices.
- Options to check if the devices you are connected to are connected or offline.
-IP-Search to retrieve information on a specific IP.
- Options for dumping the IP addresses of vulnerable devices Android.

Installation

Obtain the required API keys

Create a free account at censys.io, then go to your account page and get the free api_id and api_secret key, open 'adbnet.py' and edit your api ID and api key as shown in the image below:

key

Create an account at shodan.io and go to your account to get the free api key, once you have copied it, open 'adbnet.py' and edit the api key as shown in the image below:

shodan key

sudo apt install pq
sudo apt install adb
pip3 install colorama
pip3 install requests
python3 adbnet.py or python adbnet.py or py adbnet.py

Use

module 768x197

First, run the "dump shodan" or "dump censy" command (dump shodan is recommended) to dump the IP addresses of vulnerable devices.

Then, after finding an IP address you want to test, run the "connect" command where you will be prompted to enter the destination IP address. Once you enter the destination IP address, you will be given the input command for the port you are trying to connect to. For the port, you can try entering "5555" or "4444", as these are the most common. If you want, you can try to find this port, but it may take a little longer.

AdbNet will now try to connect to the vulnerable device Android.
If it fails to connect, try another IP.

If you can connect to a device, you can check if you are actually connected using the "devices" command.

 You can only connect to one device at a time! Use the 'killall' command to end the sessions!

To open a shell and execute commands on the vulnerable device, use the "terminal" command.

Application Screenshots

124667060 e2f5c280 de7c 11eb 8f69 2443aa7a7bd3 124667104 f30da200 de7c 11eb 9da3 098fa211a910

You can download the program from here..


Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News iGuRu.gr at Google news