Work plan and scheme
And so, let's look at our action plan:
Imagine this situation. Each of us knows that telecom operators ( Beeline, Tele2, MTS, etc. ) often send regular messages to their users. It can be advertising or messages that the same mobile Internet has ended. It was? Here in one of these cases the message comes to the victim. It indicates something related to the new application or program from the developers. How to do this with an example I will show below. He, as an inexperienced user, decides to download it. Here then the smell of fried. No, he will not detect the virus. Just his data will no longer be his. Now consider the same situation only from the hacker. This will be in the practice section.
Practice
Here, let's look at the details of our work. To get started, take the base of phones. I will give you two bases, and then filter for yourself, I will only show how.
We take all the bases here:
Base 1
Base 2
Base 3
To determine the operator you need, we take the beginning of the phone number. Let's say +79602345678 . After seven comes our operator. They are all listed below:
Beeline : range from 903 to 909 ( old ), from 960 to 976 ( new ).
MTS : range from 910 to 919 ( old ), from 980 to 989 ( new ).
Tele 2: individual numbers 900, 901, 902, 908, 953, 958, 904, 950, 951, 952, 991, 992, 993-999.
Megaphone : range from 920 to 928 ( old ), from 929 to 937 ( new ).
So. For those who do not understand. Take the base above. And look for the operator you need by range. That is, if, for example, after +7 goes 902 then this number has Tele2 . I hope I explained intelligibly. Move on.
Now we need to somehow send out a message like this:
I explain with an example of Beeline. Next, pick it yourself. Just change the Beeline name to whatever you need. Now we pass here .
At sip-system.com we have a number change service. But we need exactly the distribution of messages. I’ll figure out how to act. To get started, go to registration and select an account for the flood ( here you have to pay ). After downloading the software. But to get the password from the archive will have to work hard. I think you’ll figure it out. We are moving towards the creation of our virus. I worked on Windows , so I used a program called AhMyth RAT . I think you know about her. Come hereand download our treasured program. Then we launch. And in the tab that opens, we see this:
So. Enter port 42474 ( you can, without this, of course ) and click Listen . Now go to the 2 tab. There we enter our IP address in Source IP . Yes, detailed instructions for operating this software have already been shown here, but still I will repeat. IP we need external. Not local. You can find it here . This site has successfully established itself, so I advise you to use it. Now after all this turbidity we need to glue our little virus with the program. Need an official application. For example, the same My Beeline. I hope you understand what to look for. After downloading the program to your computer, namely the apk file and click Bind With Another Apk. There you are looking for your program and stick together with the virus. So, I explain right away. There may be problems with the software. If AhMyth Rat does not work for you , then in most cases this is due to an unreduced version of Java or its absence at all. To solve this, go to the site . And download. After reinstalling the program and all over again. How our file is prepared, you need to get hosting. Who does not want to pay, go here and use the temporary free version from RegRu . Create an automatic download of the file to the victim’s device. How? Everything is done easily and simply.
Create a PHP file. Open it through a notebook and write this:
Pour on the site and all. If it doesn’t work, try uploading our virus to the site and indicate in readifile the link as the file path located on our site (https: // file path /). Now it's up to the small. Namely, the spread. Before that, we take our ready-made link to the site with startup and shorten it. Here are three sites for this business:
1. QPS
2. GMY
3. QIL
You can use anything you like. After just enter this link in the message for the flood. I left him higher. I hope I explained it clearly and simply.
Output
This is not a frail way, you can carry out mass hacking phones. It’s impossible to say that it’s very difficult, but still you can’t call it easy either. It all depends on the victim. How smart she is to get involved in this. Yes, all sites submitted by me are not advertising. I use them myself. Well, that’s all for me. Good luck
with codeby
And so, let's look at our action plan:
Imagine this situation. Each of us knows that telecom operators ( Beeline, Tele2, MTS, etc. ) often send regular messages to their users. It can be advertising or messages that the same mobile Internet has ended. It was? Here in one of these cases the message comes to the victim. It indicates something related to the new application or program from the developers. How to do this with an example I will show below. He, as an inexperienced user, decides to download it. Here then the smell of fried. No, he will not detect the virus. Just his data will no longer be his. Now consider the same situation only from the hacker. This will be in the practice section.
Practice
Here, let's look at the details of our work. To get started, take the base of phones. I will give you two bases, and then filter for yourself, I will only show how.
We take all the bases here:
Base 1
Base 2
Base 3
To determine the operator you need, we take the beginning of the phone number. Let's say +79602345678 . After seven comes our operator. They are all listed below:
Beeline : range from 903 to 909 ( old ), from 960 to 976 ( new ).
MTS : range from 910 to 919 ( old ), from 980 to 989 ( new ).
Tele 2: individual numbers 900, 901, 902, 908, 953, 958, 904, 950, 951, 952, 991, 992, 993-999.
Megaphone : range from 920 to 928 ( old ), from 929 to 937 ( new ).
So. For those who do not understand. Take the base above. And look for the operator you need by range. That is, if, for example, after +7 goes 902 then this number has Tele2 . I hope I explained intelligibly. Move on.
Now we need to somehow send out a message like this:
I explain with an example of Beeline. Next, pick it yourself. Just change the Beeline name to whatever you need. Now we pass here .
At sip-system.com we have a number change service. But we need exactly the distribution of messages. I’ll figure out how to act. To get started, go to registration and select an account for the flood ( here you have to pay ). After downloading the software. But to get the password from the archive will have to work hard. I think you’ll figure it out. We are moving towards the creation of our virus. I worked on Windows , so I used a program called AhMyth RAT . I think you know about her. Come hereand download our treasured program. Then we launch. And in the tab that opens, we see this:
So. Enter port 42474 ( you can, without this, of course ) and click Listen . Now go to the 2 tab. There we enter our IP address in Source IP . Yes, detailed instructions for operating this software have already been shown here, but still I will repeat. IP we need external. Not local. You can find it here . This site has successfully established itself, so I advise you to use it. Now after all this turbidity we need to glue our little virus with the program. Need an official application. For example, the same My Beeline. I hope you understand what to look for. After downloading the program to your computer, namely the apk file and click Bind With Another Apk. There you are looking for your program and stick together with the virus. So, I explain right away. There may be problems with the software. If AhMyth Rat does not work for you , then in most cases this is due to an unreduced version of Java or its absence at all. To solve this, go to the site . And download. After reinstalling the program and all over again. How our file is prepared, you need to get hosting. Who does not want to pay, go here and use the temporary free version from RegRu . Create an automatic download of the file to the victim’s device. How? Everything is done easily and simply.
Create a PHP file. Open it through a notebook and write this:
PHP:
<?php
header("Content-disposition: attachment; filename=названия файла.apk");
header("Content-type: application/octet-stream");
header("Content-Description: File Transfer");
readfile("путь к файлу");
?>
1. QPS
2. GMY
3. QIL
You can use anything you like. After just enter this link in the message for the flood. I left him higher. I hope I explained it clearly and simply.
Output
This is not a frail way, you can carry out mass hacking phones. It’s impossible to say that it’s very difficult, but still you can’t call it easy either. It all depends on the victim. How smart she is to get involved in this. Yes, all sites submitted by me are not advertising. I use them myself. Well, that’s all for me. Good luck
with codeby
0 Comments:
Post a Comment