Getting Shell Access to ADB Exposed Smart Devices π²πΊβ
Exploiting Exposed ADB ports to get shell access to various smart devices such as smart tvs, cameras, etc.
Introduction
Using Shodan To Find Exposed Devices
Finding devices using search
https://www.shodan.io/search?query=%22Android+Debug+Bridge%3A%22

Installing ADB Tools For Connecting To A Remote Device
Install adb tools on debian based distro
Start server and connect to device


Capturing Screenshots and Recording Screen
Capturing Screenshot and Storing on Attacker's machine
Capturing Screen and Pulling File on Local Machine
Using Above Commands and Capturing Screenshots








Conclusion
PreviousExploiting S3 bucket misconfiguration to dump users emailsNextHacking Mumbai's Metro ChatBot and APIs for FUN π€Έπ»ββοΈ
Last updated