1 00:00:06,570 --> 00:00:15,450 Welcome in this lecture we are going to see how the hackers get a backdoor in any Android device using 2 00:00:15,700 --> 00:00:27,250 yes played script basically is this is a Linux bash crib or a machine for Sprite which is used to create 3 00:00:27,610 --> 00:00:37,890 payload for multiple platforms like Windows Linux Android and Mac as well as we can start like the police 4 00:00:37,930 --> 00:00:38,830 knows. 5 00:00:39,070 --> 00:00:41,510 As the name. 6 00:00:41,540 --> 00:00:53,550 So now to get a clone of easiest Blyde will open a browser and type easiest plight you'd have now. 7 00:00:53,560 --> 00:00:54,090 Click here 8 00:00:56,870 --> 00:01:03,190 next go to run or download and copy the get eyeblink off. 9 00:01:03,370 --> 00:01:04,120 Yes. 10 00:01:07,250 --> 00:01:16,850 Now when we know and I see the next I'll do that too. 11 00:01:16,880 --> 00:01:28,290 Next up because I want to clone this on text all now I get glowin and Biersch decoder link. 12 00:01:32,070 --> 00:01:37,110 As you can see now we are successfully cloned the all. 13 00:01:37,110 --> 00:01:39,840 Now let's move into the folder. 14 00:01:40,140 --> 00:01:43,250 I see the easiest plate 15 00:01:46,180 --> 00:01:49,540 here is this clip of the plate. 16 00:01:49,600 --> 00:01:56,020 So before going to run this great flush we need to make these exit goodwell. 17 00:01:56,170 --> 00:02:07,310 So I see two more less X easiest blade not as much. 18 00:02:07,320 --> 00:02:10,800 Now this is execrable now. 19 00:02:10,810 --> 00:02:18,720 But on this trip type not slash is displayed not as Edge 20 00:02:25,800 --> 00:02:36,880 arrogancy options of this to buy one as you can see here we can create a pillar for multiple platforms 21 00:02:38,190 --> 00:02:41,570 here we are creating a pillar for Android device. 22 00:02:43,290 --> 00:02:53,990 So selecting the option for now we need to set our local host IP or that a good machine is to connect 23 00:02:53,990 --> 00:03:05,030 to our machine next to a need to set local port on which we are going to listen on the machine no. 24 00:03:05,090 --> 00:03:05,520 And 25 00:03:10,330 --> 00:03:17,400 as again see our payload is greater and zero in damfool for use on desktop 26 00:03:20,250 --> 00:03:20,870 now. 27 00:03:20,880 --> 00:03:26,300 Next we need to send this payload Rubicam to ice. 28 00:03:26,350 --> 00:03:31,190 So before we understand this payload we need to create a handler who listen. 29 00:03:31,210 --> 00:03:40,850 It was connection seeks who grows this because we don't have any other option. 30 00:03:40,910 --> 00:03:43,510 Back to Menomena. 31 00:03:43,720 --> 00:03:48,350 So by not slash easiest blade note as said 32 00:03:52,580 --> 00:03:56,220 No select option 3 was stuck. 33 00:03:56,270 --> 00:04:01,750 S. pl.. 34 00:04:01,950 --> 00:04:12,440 Notice that handler by use the slash handler. 35 00:04:12,620 --> 00:04:25,790 Notice that the payload I said will load Android slash Bredar slash rewords underscore DCB next we need 36 00:04:25,790 --> 00:04:28,830 to set local host and local board. 37 00:04:29,290 --> 00:04:39,760 So to set local host type set host when when do do not 160 it 43 would not be say one. 38 00:04:40,010 --> 00:04:41,240 Similarly to set. 39 00:04:41,410 --> 00:04:57,620 What I said about 9 6 9 6 now bibe run loose dogless not as you can see now we are on an incoming connection 40 00:04:58,670 --> 00:05:02,750 here again see I sent this Baylor to ice. 41 00:05:02,900 --> 00:05:05,420 Now lets install and run this 42 00:05:09,950 --> 00:05:19,840 as you can see here we got a great reception in our Callimachi So that's how the hackers cleared a breadboard 43 00:05:20,300 --> 00:05:23,930 in and ready to access. 44 00:05:24,020 --> 00:05:24,560 Thank you.