1 00:00:00,140 --> 00:00:04,010 In this lecture, we are going to see how we can hack Android phones with phones. 2 00:00:04,010 --> 00:00:09,110 Supplied phone supplied is a framework using which we can exploit Android devices. 3 00:00:09,140 --> 00:00:14,000 It uses the ADB Port Tetra five to connect to a device and run commands on it. 4 00:00:14,420 --> 00:00:20,360 The tool is able to hack into Android phones that have developer mode on and USB debugging enabled. 5 00:00:23,220 --> 00:00:26,240 So you should be having Kali Linux or parrot OS. 6 00:00:28,440 --> 00:00:33,090 So in step one download and install the phone supplied framework with the given commands. 7 00:00:35,910 --> 00:00:38,250 Now fire up the framework with Python three. 8 00:00:42,080 --> 00:00:44,180 Type in the address of the victim. 9 00:00:44,180 --> 00:00:49,100 And once connected, you can use different options to attack the victim as listed. 10 00:00:51,040 --> 00:00:52,960 Now let's move to the demonstration. 11 00:00:55,020 --> 00:00:58,840 So we are on our Android victim machine, first of all. 12 00:00:58,860 --> 00:01:00,330 Go to Developer tools. 13 00:01:01,750 --> 00:01:04,959 And ensure that USB debugging is on. 14 00:01:10,600 --> 00:01:13,720 Now go to the Wi-Fi settings and look for the IP address. 15 00:01:24,070 --> 00:01:27,130 Let's just scan this address from our Kali machine. 16 00:01:28,700 --> 00:01:30,470 Is the command as shown on the screen. 17 00:01:34,990 --> 00:01:38,020 And you can see that Port Tetra five is open. 18 00:01:43,630 --> 00:01:46,380 Now let's first of all install ADB. 19 00:01:53,540 --> 00:01:55,880 Now download the phone supplied framework. 20 00:01:59,550 --> 00:02:00,840 Move it to the directory. 21 00:02:04,810 --> 00:02:06,940 And download the Colorama library. 22 00:02:08,080 --> 00:02:10,330 Which is already installed in my machine. 23 00:02:10,360 --> 00:02:12,760 Now run the framework with Python three. 24 00:02:14,590 --> 00:02:17,470 And the framework will be started now. 25 00:02:17,500 --> 00:02:19,780 Type in the IP address of the Android machine. 26 00:02:21,660 --> 00:02:23,580 And we are connected to our machine. 27 00:02:24,620 --> 00:02:29,390 To get the shell type four and press enter and we have a working shell. 28 00:02:30,080 --> 00:02:34,190 Now we can check the present working directory with command. 29 00:02:35,960 --> 00:02:37,670 We can move to any directory. 30 00:02:44,340 --> 00:02:46,770 And we can copy and download the files. 31 00:02:54,440 --> 00:02:59,570 We can even get the screenshot of the Android machine by selecting the appropriate option. 32 00:03:03,090 --> 00:03:08,160 So in this manner we can exploit Android machine with full supplied framework.