Closed gooldennn closed 5 years ago
you just give me an idea: a module of fake call in nethunter. would interesting to extend vector of social engineering attacks. there is a apk but it is always preferable open source https://play.google.com/store/apps/details?id=com.popularapp.fakecall
you require a android device with a meterpreter session running and a active SIP account
on the other hand is there any way to interact with the dialpad on a exploited device ie carry out USSD commands
Could you explain how to set up this on a nethunter device/phone? Tried to setup a asterisknow server (pbx server) on a virutal machine but ran into some trouble getting a ip adresse. If you know about some easier way to get this to work please let me know. I was going to use asteriskNOW, metasploit and SFLphone. i have Never done this on a computer either, so i dont really have any exp, but liked the idea of beeing able to id caller spoof from the android im using
Device:
Im running on huawei nexus 6p
OS version (KitKat/Lollipop/Marshmallow/Nougat):
marshmallow
Built from repo (date and build command) or downloaded from website (links):
dont have time to find it now. If anyone is interested ill post a link later
Output of
cat /proc/version
in adb shell or NetHunter Terminal:Issue:
Not really a issue. Im just currious to know how the sip_invite_spoof auxiliary work and how to use it correctly. Anyone know about some good tutorials or want to put up some examples on how i get this done. Thanks