1 00:00:07,000 --> 00:00:14,820 In previous letter we saw that holiday hackers hack any Windows machine or whatever and so in this lecture 2 00:00:15,180 --> 00:00:22,260 we are going to see how the hackers hack any Android device from anywhere over the Internet. 3 00:00:23,180 --> 00:00:31,730 This is similar as we saw in Windows hacking lecture but here we are creating a reload in epic extension 4 00:00:32,180 --> 00:00:39,100 and sending that application with new eyes and reasoning that it was a connection with the help files. 5 00:00:39,470 --> 00:00:50,100 And you talk to as you can see here I only configure the euro tool for port forwarding and using port 6 00:00:50,100 --> 00:00:55,820 number 4 4 4 4 4 port forwarding. 7 00:00:55,870 --> 00:01:01,640 So let's create a payload for Android device. 8 00:01:02,610 --> 00:01:14,320 MSF in be Android slash operator slash rewords underscore DCB. 9 00:01:15,190 --> 00:01:22,180 And host icles as you know that here we need to do a lot of auditing 10 00:01:24,910 --> 00:01:29,060 so Abi and be asked here. 11 00:01:30,110 --> 00:01:40,850 Next And the word which is used for what forwarding next to you the name and part of the payload where 12 00:01:40,870 --> 00:01:41,650 you want to sell 13 00:01:46,270 --> 00:01:51,310 as we can see here our payload is created and Scilla on. 14 00:01:51,300 --> 00:01:56,460 Next up next do we need to open a blade. 15 00:01:56,540 --> 00:02:00,370 Listen if it was going to action now. 16 00:02:00,380 --> 00:02:17,060 Was that handler by use dislodges hand hand-lettered now to that payload type set payload Android slash 17 00:02:17,910 --> 00:02:24,440 operator slash rewords underscore DCP. 18 00:02:24,470 --> 00:02:29,680 Now we need to set host and airport police and on the machine 19 00:02:33,380 --> 00:02:35,570 set host. 20 00:02:35,640 --> 00:02:45,890 So here we need to that a lot of local host IP because the underdog is mapping up to a local host type 21 00:02:46,420 --> 00:02:52,510 1 Don't be one dot zero dot dot dot one. 22 00:02:52,560 --> 00:03:06,430 Now Bush said listening would I said port 4 4 4 4 by 1 or exploit godless. 23 00:03:09,200 --> 00:03:16,170 So here I sent our two in the place which is not connected to our network. 24 00:03:17,040 --> 00:03:19,620 Lets install and open these 25 00:03:24,720 --> 00:03:26,150 as you can see here. 26 00:03:26,550 --> 00:03:36,780 We got a decision in our terminal so thats how the hackers hack Android devices which are outside the 27 00:03:36,780 --> 00:03:38,860 network. 28 00:03:38,950 --> 00:03:39,490 Thank you.