Remotely Control Any Phone and PC with this Free tool!

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
so today in this tutor you'll be learning how you can remotely control any PCs and any mobile devices with this free open source tool you can run it directly on colonic as well as parrot operating system which are both your favorite operating system when it comes to attical hacking or hacking in general now before we get started kids remember hacking is illegal if you get hot hacking do not tell them you know who's Mr hacker Loy and definitely do not tell them that I taught you all of this so before we continue into the tutorial remember to smash the like button so that you don't get hacked and of course turn on subscription through the channel so you know whenever I manage to hack you Sor I mean whenever there's a new hacking tutorial and yes this video is strictly for educational purposes only and with great power comes great responsibility and if you really want to hack hack yourself hack the devices that you own don't go around trying to hack Mr hack aoy to so if you want to monitor what someone is doing you can use this tool and this tool is called amage powered by m sploit and at the end of the video you'll be able to even click one single button and it will sent all this different type of attacks against the devices in the network giving you full remote control to all these devices and the reason why this is so good of a tool is because everything can be done from the click of your mouse and you don't even have to learn any of these complex commands that you anal and terminal looking like a real hacker so you first have a hacking computer so it could either be parrot Os or colinx and you just have to start up Amit from here and once Amit is running it gives you a fantastic graphic user interface that allows you to Target any computers and it could be a say PC over here all right and you can also have a mobile device that we can Target and then after which we're able to remotely control any of these devices and even comes with all right an attack analysis tool that automatically hacks into the device for you so this is crazy stuff as you can see right here we're on col Linux so you need a computer in order to run this this with our computer the tutorial ends here so the first thing you can do is you can go to the top left corner and you click under the menu and you can enter a r m i t a g e all right so you can see right here with Armitage the other option of course if you want to look like a cool hacker is to go ahead and an open up terminal and all you got to do is enter pseudo followed by the Target F which is in this case USR share Armitage Armitage doj go ahead and hit nth and that all right so again this tool is directly out of the box of color Linux and you can run it directly from here once you have that you can see here we're trying to connect over to a backend database system so go ahead and click connect and there'll be an additional popup right here that states start mploy okay so go ahead and click yes and it will start up for you and then after which you will connect over to the backend database using the database to store all the scan information that you are doing as you're running against the computers and you can see right here we're connecting to database we have progress and then once it is cre once it loads fully you see right here a beautiful graphical user interface allowing you to point and click targeting any devices within the network isn't that such a beautiful tool so you can see right here I have done some of this hacking against some of these different devices so we can see the pop up right here so no worries I'll be going through every section of this wonderful tool with you so if you can see onto the top left corner all right we have the tab here so we have Armitage and we have preferences set Target view so for example in this case we have the graph view you can easily change it over to a table view so you can see a table view here highlighting all the different IP addresses that we are targeting or devices top left corner again I'm going to switch it back over to graph View and now from here we have the set exploit rank so if you select underp what it does here is that it allow us to choose what are the different levels minimal level of exploits that we will use as part of targeting all these devices and that comes with the attack part of this tool meaning that that when we're attacking automatically against all these different highlighted devices in the network you can choose what are the exploits that we can use directly against all these different devices next up over here we have listeners so listeners allow us to listen in for hijack the devices for hectic computers and you will be able to directly connect over to them and this gives you a graphical view of what's Happening across the network next up over here we have view so view allow us to see right at the bottom you're able to see the console so if you ever want to switch over and look more like a hacker this is the part where you can start answering against all the different commands all right say you want to start certain sessions you want to choose certain payloads certain exploits you want to customize different type of attacks this is where you go over into moving forward under view so as you have taken certain credentials downloads jobs and so on so forth this is the place for you to click onto and new tabs will show up so say for example I click on credentials all right so this is perhaps some of the US users passwords and a host that we are targeting against the different devices and you can also see under say downloads so if we're downloading different types of files from the targeted devices we can see them right here next up we have host so in Host this is the part where we can specifically at certain IP addresses we can use end map so we are able to connect together a network mapper to help us scan across the network identifying all these devices as well as the specific service versions that are in these devices that we can go go ahead and Target later on using some of these attack tools and we also have msf scan so this uses the Metasploit framework scan that we can directly scan against all these open ports with the devices the NS enumerate allows us to connect over to a domain name server helping us identify all the different domain names as well as IP addresses within the network and finally you can see over here if you want to clean everything up just go ahead and click on the clear database and you can see a popup right here and I click yes on on that and it will clear up all of these different devices and all the different attacks we're doing earlier all right so it clears off the database next up we have attacks so attacks over here is once you have scanned a device youve identified all the different service versions this is where Armitage help you directly look for all the different types of exploits in relation to the service version has been identified and this hill marry button is crazy this is where it automatically exploits the system using any of this identified exploits that's available for us directly from M exploit against all these different devices so you can see over here from the graphical user interface on the left we have auxiliary all right so this allows us to use different type of modules exploits payloads and the least goes on to Target all these devices so as you're using madit when you typically enter into the MPL framework in a terminal so right here you're getting a visualization of all these different payloads exploit auxiliary modules that you can use as part of attacking System including all of this different po most modules that you can use as part of furthering your attack against the devices now the first thing we need to do is to be able to identify all of the different devices within the network so I can use map scan and I can go ahead and click under quick scan all right enter the scan range so in this case 1 21680 sl24 Click okay on that and can see a popup a new tap right here at a bottom that states the following of msf6 and we're using network mapper to help us SC across Network to look up for all the active devices that we can Target later on so we're looking at what other devices are active and done boom you can see a message right here and you see the popup on the top right corner you can see all of this window all of this window of computers right you can see over here so we can see all of the different types of IP addresses so all these are the identified devices that we can go ahead and Target right now beautiful yes I know there's a lot of devices in my network so what we're going to do now is to to specifically Target certain devices in the network so I'll go over to host and I'll clear database go ahead and click yes on that and now we will manually add the host because perhaps there are specific IP addresses that we have already decided to Target so that can be a next step from here so I'll go ahead and click add host and in this case I can enter the IP address I'll say 1 19216801 32 and I click add on that and we have a message here added one host and we can see the host pop up over here so what we can do now is I can select onto this host all right click under host and map scan and this time around we'll do an intent scan so we want to identify the services that we can Target against this device I click onto intent scan and you can see here it automatically plac an IP address for us click okay a new tab pops up right at the bottom and you can see we're doing the scan right here using nmap and initiating service scan at 2223 so now we we have identified the ports as you can see here and then now we're trying to identify the service versions within them all right so just give it a couple of seconds or a minute or so and we'll be able to identify all the different service versions and you can see right here done okay within 60 seconds within a minute message scan complete Okay click okay on that and you can see right here there's a new highlight there's a new input directly from Armitage and you can see that this is a Windows computer because it also does an operating system detection for us so I can do a right click now I can click under say services and you can see right here we have all the services they listed so on the most left we have host name of the service right the port that is open the protocol in use and on the right side you can see here all this s of different information in regards to the services that are open so what you can do from here to take it to the next level is to start hacking okay so but before we do that you can see on the top left corner again this is where we can search for the vulnerability ities so in this case say for example I want to search for I I can enter is which is a web server so we have is off bypass is 75 ftpd and so on and so forth so you can go ahead and double click onto them say for example I double click onto the auxiliary of is off bypass double clicked on that you can see the module information and you can see the options here so for example we are targeting a specific IP address the port number and so on and so forth so all these are different types of information you can place in and launch attacks against a specific service all right so again we can also look out for many different other modules that's available for us to use however that may be time consuming so instead what you can do is you can select under the attacks and click find attacks which automatically maps all the different services for you so you can see right here progressing quering exploits and this is a way where you take the service information all right go back over to all the modules available in mploy and query them and see which one gives a a match and it gives a match then we'll be able to know precisely which of these exploits we can use as part of trying to hack into the system and then we're progressing and boom done attack analysis complete you now see an attack manual attached to each host in a Target window happy Hunting click okay on that now if you do a right click on a Target device you can see a tech right here all right so we have several options and you can see all of these different types of modules is available for us right and you can see lots of that we can use to Target against the system and in this case say for example all right we can see there SAR the SC SMB and what you can do now is you can click onto more and you can click onto this button called check exploits you click on the check exploits it automatically if the module supports it we're able to check the device or the service whether it is going to be vulnerable and if it is then we can directly attack the device using it okay and you can see right here we have an example right I'm going to scroll up a little more as it's running through all these checks and you can see over here using auxiliary scanner SMB SMB ms7 010 is check the target is vulnerable so we can use this to Target against the device this is awesome this saves you so much time and all I got to do right now is do a right click all right click under attack go to SMB and let's go and search for Ms 17 all right so in this case we got Eternal blue we get 010 PSX you see go and clicked on it all right here you can see this is the attch module that we're using we have a description of it and right the bottom we have the option so we can place in say like the AL host which of course in this case is the callix IP address and we have alport and so on so forth and of course we have the r host the rpod and all this different information so once you are ready all you got to do right now is Click onto launch you can see a new tab opening up and it stays def falling exploit Runnings background job one it fills in all of this information for you automatically sending bind TCB Handler sending stage to 1821 168 0132 all right let's see if we get a session pretty soon over our complete system shall obtain and you can see right here the device has turned R there is the lightning sign surrounding it do a right click you can see here we have meterpreter meterpreter one or right interact let's go ahead and click onto MPR shell a new tab opens up now I can enter say sis info let's see what we get all right okay we see right here we are in we have F control of the computer all right I can enter say the following of help to look at all the instructions that we can send over to the computer all right we can see all this details I can also do a right click interpreter one explore and I can click browse fils so over here what it is doing it is listing all the different folders that we're able to access into and you can see we're on C drive with Windows system 32 and we can see all the list of folders files and so on within that folder I can do a right click as well where inter prer one I can click explore I can click show processes and you can see right here all the are different processes that we can list down is the user on say different types of software or I'll be able to hijack into all this different type of software and everything is just within point and click so what I can do now is I can select out to say one drive I click Mig grade okay migrating from 410 to 4720 okay so we are doing that I click okay on that so if migration is successful then we'll be able to say take a screenshot oh you can see here popup migration completed successfully click okay on that now I can do a right click interpreter one explore or take a screenshot let's see what we see boom you can see it right here it's game over we have full control of the Entire Computer now let's see how we can remotely control mobile devices now going back to Armitage what I can do now is use exploit multi Handler or I hit enter on that and I can set payload in this case to Android followed by SL meterpreter SL reverse TCP right done with that and I can in this case set the L port to 4444 so I've already created P earlier to Target a mobile device exploit DJ all right hit enter on that so we have that running all right started reverse TCP Handler and if the mobile device is already compromised and it has installed say for example in this case we're starring up the mobile device over here and once it runs the application we can get all right REM control of the entire mobile device once more so you can see here we're starting up the mobile device it is loading and I was show you right here so previously we were doing all of this from the console from terminal so if I go ahead and and click onto the malicious app in this case we have main activity clicked on that and you can see on the background sending stage all right to 1 1821 16802 13 okay so once we have access to the mobile device you see an additional device listed over here right beside the compromise device okay so we can see right at the bottom sending stage sending stage okay so once we gain access we'll be able to see the device right [Music] here all right you can see over here meterpreter session open and we can see an additional device right here okay so in this case I can say host I can set the operating system in this case it is Android so I change it up or I highlight it as an operating system Android and you can see the change of the icon so what we can do is do a right click select onto meterpreter click interact and click under MPR shell and I can enter sa PR working directory to see which working directory are we in right now within Android and you can see right here we're able to print working directory and we're able to remotely control the entire mobile device too so I hope you've learned something useful something valuable
Info
Channel: Loi Liang Yang
Views: 592,269
Rating: undefined out of 5
Keywords: hacker, hacking, cracker, cracking, kali linux, kali, metasploit, ethical hacking, ethical hacker, penetration testing, penetration tester, owasp
Id: BV5iXRXFYnE
Channel Id: undefined
Length: 17min 15sec (1035 seconds)
Published: Sun Dec 17 2023
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.