offensive-security / kali-nethunter

The Kali NetHunter Project
https://github.com/offensive-security/kali-nethunter/wiki
3.51k stars 889 forks source link

Sip_invite_spoof #536

Closed gooldennn closed 5 years ago

gooldennn commented 8 years ago

Device:

Im running on huawei nexus 6p

OS version (KitKat/Lollipop/Marshmallow/Nougat):

marshmallow

Built from repo (date and build command) or downloaded from website (links):

dont have time to find it now. If anyone is interested ill post a link later

Output of cat /proc/version in adb shell or NetHunter Terminal:

Issue:

Not really a issue. Im just currious to know how the sip_invite_spoof auxiliary work and how to use it correctly. Anyone know about some good tutorials or want to put up some examples on how i get this done. Thanks

vay3t commented 8 years ago

you just give me an idea: a module of fake call in nethunter. would interesting to extend vector of social engineering attacks. there is a apk but it is always preferable open source https://play.google.com/store/apps/details?id=com.popularapp.fakecall

bkr32 commented 8 years ago

you require a android device with a meterpreter session running and a active SIP account

bkr32 commented 8 years ago

on the other hand is there any way to interact with the dialpad on a exploited device ie carry out USSD commands

gooldennn commented 8 years ago

Could you explain how to set up this on a nethunter device/phone? Tried to setup a asterisknow server (pbx server) on a virutal machine but ran into some trouble getting a ip adresse. If you know about some easier way to get this to work please let me know. I was going to use asteriskNOW, metasploit and SFLphone. i have Never done this on a computer either, so i dont really have any exp, but liked the idea of beeing able to id caller spoof from the android im using